Open Access Open Access  Restricted Access Subscription or Fee Access

Implementation of EESCP Protocol in Mobile Adhoc Networks

P. Paruthi Ilam Vazhuthi, S. Parthiban, V. Thiyagarajan

Abstract


Recent year a rapid development and widespread application of mobile ad hoc networks suffer from security attacks and privacy issues which dramatically impede their applications. To cope with the attacks, a large variety of intrusion detection techniques such as authentication, authorization, cryptographic protocols and key management schemes have been developed. Clustering methods allow fast connection, better routing and topology management of mobile ad hoc networks (MANET). This paper, we have introduced new mechanism called Energy Efficiency and Secure Communication Protocol (EESCP) is to divide the MANET into a set of 2-hop clusters where each node belongs to at least one cluster. The nodes in each cluster elect a leader node (cluster head) to serve as the IDS for the entire cluster. To balance the resource consumption weight based leader election model is used, which elected an optimal collection of leaders to minimize the overall resource consumption and obtaining secure communication using diffie- Hellman key exchange protocol.

Keywords


Security; Leader Election; EESCP; Mobile Adhoc Networks.

Full Text:

PDF

References


F. Anjum and P. Mouchtaris. Security for Wireless Ad Hoc Networks. John Wiley & Sons. Inc., USA, 2007.

P. Brutch and C. Ko. Challenges in intrusion detection for wireless adhoc networks. In proc. of the IEEE Symposium on Applications and the Internet (SAINT) Workshop, 2003.

P. Ning and K. Sun. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In proc. of the IEEE Information Assurance Workshop, 2003.

H.safa,Mirza.O ,Artail.H. A Dynamic Energy Efficient Clustering Algorithm for MANET.IEEE International Conference on Wireless and Mobile Computing, 2008.

Tomas Johansson and LenkaMotyˇckov´.On Clustering in Ad Hoc Networks. Division of Computer Science and Networking Lule°a University of Technology August 17, 2003.

S. Buchegger and J. L. Boudec. Performance analysis of the CONFIDANT protocol (cooperation of nodes - fairness in dynamic adhoc networks). In proc. of the ACM MOBIHOC, 2002.

T. Anantvalee and J. Wu. A survey on intrusion detection in mobile ad hoc networks. Wireless/Mobile Network Security, 2006.

Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003

Y. Huang and W. Lee. A cooperative intrusion detection system for adhoc networks. In proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.

Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In proc. of the ACM International Conference on Mobile Computing and Networking (MobiCom), 2000.

L.Hurwicz and S. Reiter. Designing Economic Mechanisms. Cambridge University Press, 1st edition, 2008.M.H.Guo, H.T.Liaw, D.J.Deng H.C.Chao.Cluster based secure communication mechanism in wireless adhoc networks.In proc of the IET Information Security .2010.

P. Krishna, N.H.Vaidya, M.Chatterjee, and D.K.Pradhan. A clusterbased approach for routing in dynamic networks. In proc. of the ACM SIGCOMM Computer Communication Review, 1997.

Ayan Mahalanobis.Diffie-Hellman Key Exchange Protocol,its Generalization and Nilpotent Groups. Florida Atlantic University, August 2005


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.