Time Stamp based Cross Layer MANET Security Protocol

1
Gaurav Kulkarni
Gaurav Kulkarni
2
Brajesh Patel
Brajesh Patel
1 Rajiv Gandhi Prodhyogiki Viswavidhyalaya

Send Message

To: Author

GJCST Volume 13 Issue E10

Article Fingerprint

ReserarchID

CSTNWS856AK

Time Stamp based Cross Layer MANET Security Protocol Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Mobile Adhoc Network (MANET) is a wireless network where nodes communicate through other nodes without the aid of a base station. Security is a major challenge in MANET as the packets are prone vulnerability and eavesdropping in wireless environment. Generally MAC layer provides the security in such wireless network through encryption and authentication and the protocol is called WEP. Many authentication and encryption techniques are proposed to increase the security of the MANET. But stronger Security leads to more energy loss as mobiles have less energy and limited processing capability. In this work a Cross layer timestamp based network security technique is developed. The technique reduces the encryption packet overflow which is due to PKE or public key exchange, and derives the public key directly from the neighbor’s table which is transmitted using routing information exchange. The simulation is performed with omnet++ simulator. Performance results demonstrate that the energy overhead due to encryption or performance compromise are very low in the proposed system. Further as the protocol is embedded in the network layer it is easily adoptable to any existing architecture without modifying the MAC or Physical layer standard or protocol.

33 Cites in Articles

References

  1. Bing Wu,Jianmin Chen,Jie Wu,Mihaela Cardei (2006). A Survey on Attacks and Counter measures in Mobile Ad Hoc Networks.
  2. Keerti Srivastava,K Amit,R Awasthi (2009). An Improved Timestamp-Based Password Remote User Authentication Scheme.
  3. Ajay Jangra,Nitin Goel,Chander Kant,Priyanka (2010). An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs).
  4. Guangyu Pei,Phillip Spagnolo,Fred Templin (2008). Enabling OSPFv3 MANET Extensions over IPv4 Encryptors.
  5. Levente Butty´ana,L´aszl´o D´ora,Fabio Martinelli,Marinella Petrocchi (2010). Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks.
  6. Tao Ye,Darryl Veitch,Jean Bolot (2009). Improving wireless security through network diversity.
  7. Kenneth Rosink,Thomas Reynolds,Timothy Morris (2000). Language of Automotive Body Stamping Dies Defining and Documenting Compensation within a Stamping Die.
  8. Greg Rose (2003). Combining Message Authentication and Encryption.
  9. Kshitiz Saxena (2010). The Analyses of Wireless Encryption Protocol-Proposed Enhancement to Handshake Mechanism in WPA.
  10. R Murugan,A Shanmugam (2009). Key Distribution System for MANET with Minimum Prior Trust Relationship.
  11. Jin-Man Kim,Jong-Wook Jang (2006). AODV based Energy Efficient Routing Protocol for Maximum Lifetime in MANET.
  12. Shu Jiang (2005). Efficient Network Camouflaging In Wireless Networks.
  13. Rui-Dan Su,Xiang-Quan Che,Shao-Feng Fu,Long-Hai Li,Li-Hua Zhou (2009). Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case.
  14. Li Zhao (2007). Enhance Communication Security In Wireless Ad Hoc Networks Through Multipath Routing.
  15. Duc-Phong Le,Alexis Bonnecaze,Alban Gabillon (2008). Sign timing Scheme based on Aggregate Signatures.
  16. Mohamed Salah Bouassida,Mohamed Bouali (2007). On the Performance of Group Key Management Protocols in MANETs.
  17. Harald H.-J Bongartz,Tobias Ginzler,Thomas Bachran,Pere Tuset SEAMAN: A Security-Enabled Anonymous MANET Protocol.
  18. Qian Fang,Ying Liu,Xiaoqun Zhao (2008). A Chaos-Based Secure Cluster Protocol for Wireless Sensor Networks.
  19. R Pushpalakshmi,Dr. Kumar (2010). Cluster Based Composite Key Management in Mobile Ad Hoc Networks.
  20. C Perkins,E Royer (1999). Ad-hoc on-demand distance vector routing.
  21. Sunam Ryu,Kevin Butler,Patrick Traynor,Patrick Mcdaniel (2007). Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems.
  22. Anni Matinlauri (2008). Fairness and Transmission Opportunity Limit in IEEE 802.11e Enhanced Distributed Channel Access.
  23. Jungwook Song,Sunyoung Han (2009). Mobile Node Authentication Protocolfor Proxy Mobile.
  24. Monis Akhlaq,Noman Jafri,Muzammil Khan,Baber Aslam (2006). Addressing Security Concerns of Data Exchange in AODV Protocol.
  25. Haodong Wang,Ae Qun Li (2009). Achieving robust message authentication in sensor networks: a public-key based approach.
  26. Dr,Mr Kapil,Rana Sanjeev (2009). RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management.
  27. S Balfe,K Boklan,Z Klagsburn,K Paterson (2007). Key Refreshing in Identity-based Cryptography and its Applications in MANETs.
  28. J King (2001). IEEE 802.11 Wireless LAN Security White Paper.
  29. Nishu Garg,R Mahapatra (2009). MANET Security Issues.
  30. Sanket Nesargi,Ravi Prakash (null). MANETconf: configuration of hosts in a mobile ad hoc network.
  31. Panagiotis Papadimitratos,Zygmunt Haas (2002). Secure Routing for Mobile Ad hoc Networks.
  32. Manel Guerrero,Zapata (2001). Secure Ad hoc On-Demand Distance Vector Routing.
  33. Manel Guerrero,Zapata Securing and Enhancing Routing Protocols for Mobile Ad hoc Networks.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Gaurav Kulkarni. 2013. \u201cTime Stamp based Cross Layer MANET Security Protocol\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E10): .

Download Citation

Article content is being processed or not available yet.

Issue Cover
GJCST Volume 13 Issue E10
Pg. 33- 39
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

July 31, 2013

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 9436
Total Downloads: 2445
2026 Trends
Research Identity (RIN)
Related Research

Article in Review

Mobile Adhoc Network (MANET) is a wireless network where nodes communicate through other nodes without the aid of a base station. Security is a major challenge in MANET as the packets are prone vulnerability and eavesdropping in wireless environment. Generally MAC layer provides the security in such wireless network through encryption and authentication and the protocol is called WEP. Many authentication and encryption techniques are proposed to increase the security of the MANET. But stronger Security leads to more energy loss as mobiles have less energy and limited processing capability. In this work a Cross layer timestamp based network security technique is developed. The technique reduces the encryption packet overflow which is due to PKE or public key exchange, and derives the public key directly from the neighbor’s table which is transmitted using routing information exchange. The simulation is performed with omnet++ simulator. Performance results demonstrate that the energy overhead due to encryption or performance compromise are very low in the proposed system. Further as the protocol is embedded in the network layer it is easily adoptable to any existing architecture without modifying the MAC or Physical layer standard or protocol.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Time Stamp based Cross Layer MANET Security Protocol

Gaurav Kulkarni
Gaurav Kulkarni Rajiv Gandhi Prodhyogiki Viswavidhyalaya
Brajesh Patel
Brajesh Patel

Research Journals