Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery

Abstract

In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to establish communication between nodes. Here source node will have to generate and store a key called KEY2 and destination node will have to generate and store a key called KEY1. When source node initiates communication with destination-node, source node will send a requestpacket to destination via shortest/less- cost path (PATH1) without any key mentioning in the packet. Now destination node will send the requested packet and KEY1 to source node via different path other than PATH1 (path of received packet). Source will send KEY2 to destination again through the same path (PATH2). In scenario-2, communication of each node is based on the neighbour node’s priority, here, priority-1 being the highest, hence it is highly recommended for communication and priority three is being the lowest and it is rarely recommended for the communication. Nodes in the network classified into 3 types, unknown node, neighbor’s known node, nonneighbors known node. Priority of nodes can be evaluated based on the security measures, energy level and other parameters of the node. It can also consider Trust Value (TV) of each node based on the duration spent in active efficient communication. With help of this strategy, we can achieve highly secured route discovery, which will help network to have smooth communication among its nodes.

Authors and Affiliations

Chandrakant N| Bangalore, Karnataka, India

Keywords

Related Articles

Multipurpose Robot for Patients and Military Applications

This multipurpose robot rover is specially met for the patents having various disabilities to help them to take their own food and medicines without the help from others. The robot rover contain a miniature robotic ha...

A Mathematical Approach towards Mitigating the Effects of Wormhole Attack

Mobile Ad-hoc or spontaneous wireless networks are threatened by a powerful attack known as the wormhole attack. The wormhole attack is very powerful and preventing the attack has proven to be difficult. A strategic plac...

Techniques Adopted for Containment of Polymorphic Worms – A Review

Development in the computer network technology has also widened its application in the field of education, science and business. But for such a media insecurity exists due to polymorphic worms. It is necessary to evade s...

A Novel A2-based Neural Network Model for Voice Prediction

A novel “Multi-Layer Perceptron” (MLP) model, based on the new A2 arithmetic is investigated in this paper. The already implemented A2 arithmetic operators, such as addition and multiplication are used to predict voi...

Design and Implementation of 64-Bit Execute Stage for VLIW Processor Architecture on FPGA

FPGA implementation of 64-bit execute unit for VLIW processor, and improve power representation have been done in this paper. VHDL is used to modelled this architecture. VLIW stands for Very Long Instruction Word. This P...

Download PDF file
  • EP ID EP8384
  • DOI -
  • Views 421
  • Downloads 23

How To Cite

Chandrakant N (2014). Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery. International Journal of Electronics Communication and Computer Technology, 4(1), 565-569. https://europub.co.uk/articles/-A-8384