INTRUSION AWARE GROUP MANAGEMENT SCHEME FOR MANET

Abstract

MANET security has long been an issue for its infrastructure-less nature. The sort of networks gives rise to authentication and key-management problems in MANETs. The absolute TTP based schemes seem to be infeasible for being adopted in MANETs and so are the non-TTP based self-organized schemes which suffer security problems regarding key identity of nodes. A hybrid scheme can serve the purpose. One of the hybrid schemes addressed these issues effectively by pre-assigned logins on offline basis and issuing certificates being online, using 4th generation services. However, the scheme revealed overheads in different scenarios. We have proposed a scheme where the nodes having common interests, once authenticated through external resources, form a group with a single key shared for the whole group. The overlapping nodes sharing different groups facilitate authentication of other nodes communicating from those groups. In this way the external messages for authentication among the nodes of different groups can be reduced to a great extent. Denial of Service (DoS) attacks are the major problem in the MANET, because the attack consumes huge bandwidth and resources. The proposed mechanism also handles the DoS attacks.

Authors and Affiliations

P. Sumathi

Keywords

Related Articles

The Design and Implementation of Land Management Information System (LMIS), Bauchi State Ministry of Lands and Survey

The need to collection, store, process and disseminate information about land availability, ownership and titles is a fundamental task that should be performed by any responsible agency in charge of land administration....

Scale Development for Improving Education Quality: A Survey of Private Institutions Affiliated to U.P.T.U.

Role of scale development is to create a measure of a construct “Education Quality in U.P.T.U. (Uttar Pradesh Technical University) affiliated institutions”. In present scenario, Uttar Pradesh has a credible infrastructu...

Applications of Finite Automata in Lexical Analysis and as a Ticket Vending Machine – A Review

In this paper, we explain the two applications of finite automata. First is about the first phase of a compiler design called as lexical analysis. The lexical analysis used to identify the token with its type. Second is...

Cloud based Data Mining framework for monitoring Healthcare in rural India

Advance Information and Communication Technology (ICT) helps in making healthcare at affordable cost and in improving the effectiveness of healthcare services in remote areas. This paper proposed a framework for monitori...

Energy Cost and QoS based management of Data Centers Resources in Cloud Computing

Cloud computing is the evolutionary step to transform a large part of the Information and Communication Technology industry. It is the result of the efforts to provide the opportunity to focus on hardware and software co...

Download PDF file
  • EP ID EP125444
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

P. Sumathi (2013). INTRUSION AWARE GROUP MANAGEMENT SCHEME FOR MANET. International Journal of Computer Science & Engineering Technology, 4(3), 178-184. https://europub.co.uk/articles/-A-125444