CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Mobile Adhoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of stablished infrastructure. Mobile Adhoc network are vulnerable to attacks compared to wired networks due to limited physical security, volatile network topologies, power-constrained operations, intrinsic requirement of mutual trust among all nodes. During deployment, security emerges as a central requirement due to many attacks that affects the performance of the ad hoc etworks. Particularly Black hole attack is one such severe attack against ad hoc routing protocols which is a challenging one to defend against. The proposed model combines the On demand routing protocol DSR with CCMP-AES mode to defend against black hole attack and it also provides confidentiality and authentication of packets in both routing and link layers of MANET. The primary focus of this work is to provide security mechanisms while transmitting data frames in a node to node manner. The security protocol CCMP-AES working in data link layer keeps data frame from eavesdropping, interception, alteration, or dropping from unauthorized party along the route from the source to the destination. The simulation is done for different number of mobile nodes using network simulator qualnet 5.0. The proposed model has shown better results in terms of Total bytes received, packet delivery ratio, throughput, End to End delay and Average jitter.
Authors and Affiliations
Dr. G. Padmavathi, , Dr. P. Subashini , Ms. D. Devi Aruna
A Comparative study of Forward Secure Publickey Method Using HIBE and BTE
T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this...
A Review of Recent Trends and Issues in Visualization
Visualization is an extensive and diverse area of research which is a combination of various distinct but overlapping areas. The term visualization came into history late but idea of expressing something using graphical...
A Comparative Survey on Symmetric Key Encryption Techniques
Nowadays, the use of internet are growing increasingly across the world, security becomes a prime concern of issue for the society. Earlier security was a major issue for military applications but now the area of applica...
Smart phone Application using Morse Code and Inaudible Frequency
In this paper, the wireless communication using Morse code and inaudible frequency has been discussed. The application of this project is to transfer the limited information with the help of inaudible frequency and AAC....
Secured, Authenticated Communication Model for Dynamic Multicast Groups
Secure Multicast networks forms the backbone for many web and multimedia applications such as Interactive TV, Teleconference etc. The main challenge for secure multicast is scalability, efficiency and authenticity. A co...