Implementation of Network Security in Mobile AD-HOC Networks using Multilevel Encryption Techniques
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 6
Abstract
When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control or centralized administrationis not in this network. Wireless Ad-hoc networks are organized and configured in self mode. Each and every node in this network is set up using a wireless transmitter and a wireless receiver. The networktransmits data with other nodes in its communication range only. When the data are transmitted, the nodes communicate with each other usinga common physical media. The nodes send and receive signals using the same frequency band and by doing so, it follows the same hopping method. If the receiving node is not inside the transmission range, the source node uses the other nodes to transmit the messages hop by hop. For sending a message from one node to another node that is out of its frequency range, it gets the help of other nodes in the network for an effective data transfer. This technique is called as multi-hop communication. Hence, every node acts both as a host and as a router at the same time. Wireless Mobile networks are usually attacked by many sources, such as hackers, intruders and other physical attacks. Creating and configuring a safe and secure wireless ad-hoc network isvery difficult for the reasons such as: the poor quality of communication channels and nodes, poor infrastructure, frequently changing topology and technology.Due to this factors, the wireless channel can be very well and easily accessible by all the network users and the attackers. An attackercan easily break network operations by not following the specifications of network protocol. Hence, a secure protocol is to be created for safe data transfer. Because of frequently varying techniques in the network topology, there is a complexity to routing among the various mobile nodes in a safe way. In this paper, a multi-level encryption methodis suggested for sending the data over a wireless network and this form of methodhelps us to send our secret message in a more secured way over a wireless network.
Authors and Affiliations
Mr. P. Daniel Sundar Raj, Dr. K. Arulanandam
An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment
Abstract: Cloud Computing offers latest computing paradigm where application, data and IT services are provided online over the Internet. One of the significant concerns in Cloud Computing is security. Since data is expo...
Moving ATM Applications to Smartphones with a Secured PinEntryMethods
Abstract: A personal identification number (pin) is a widely used numeric password. The 4-digit pin numericpassword is being used as authentication in many important applications such as, an ATM. An ATM is a placew...
A Secure and Efficient Two-Server Password Only Authenticated Key Exchange
Abstract: Password-authenticated key exchange (PAKE) is an authentication mechanism where a client and a server who share a password and authenticate each other with that password and hence both will agree on a cry...
Challenges In Cloud Computing on Security Issues And Solutions
Cloud computing is a technology concept that enables organizations or individuals to share various services in a seamless and cost-effective manner. Technology innovation and its adoption are two critical successful fact...
Multicast and Unicast Communication in Vehicular Network Using IPv6.
Now a days the research is going on in Vehicular ad-hoc network to make a city as Smart city for the driver and passengers to navigate and to obtain relevant information and avoid the traffic accident. In the proposed sy...