CFP last date
20 May 2024
Reseach Article

Cluster based Authentication Scheme (CBAS) for Secure Routing in MANET

by C. Sivaranjani Devi, S.a. Arunmozhi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 8
Year of Publication: 2015
Authors: C. Sivaranjani Devi, S.a. Arunmozhi
10.5120/21563-4598

C. Sivaranjani Devi, S.a. Arunmozhi . Cluster based Authentication Scheme (CBAS) for Secure Routing in MANET. International Journal of Computer Applications. 121, 8 ( July 2015), 36-41. DOI=10.5120/21563-4598

@article{ 10.5120/21563-4598,
author = { C. Sivaranjani Devi, S.a. Arunmozhi },
title = { Cluster based Authentication Scheme (CBAS) for Secure Routing in MANET },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 8 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 36-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number8/21563-4598/ },
doi = { 10.5120/21563-4598 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:07:56.942843+05:30
%A C. Sivaranjani Devi
%A S.a. Arunmozhi
%T Cluster based Authentication Scheme (CBAS) for Secure Routing in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 8
%P 36-41
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET consists of a collection of independent mobile nodes connected by wireless links, where they can join or leave the network at any time. Due to infrastructure-less and mobility in nature, secure routing is essential in MANET to transmit packets from source to the destination. There are different types of routing attacks which causes disruption of the whole network. In our proposed method called CBAS, provides secure routing in MANET against wormhole attack. Hence the nodes are grouped into cluster and each cluster is governed by the cluster head and cluster heads are controlled by the master head node. Zero Knowledge Protocol (ZKP) is used to apply authenticity among the nodes. Communication starts between the source node and the destination node after ensuring that the network contains only the true nodes.

References
  1. Ramandeep Kaur and Jaswinder Singh "Towards Security against Malicious Node Attack in Mobile Ad Hoc Network" in International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013.
  2. Samiksha Suri "Different Methods and Approaches for the Detection and Removal of Wormhole Attack in MANETS" in International Journal of Engineering and Technical Research, volume 1, No. 5, July 2013.
  3. Kamini Singh, Gyan Singh and Arpit Agarwal "A Trust based Approach for Detection and Prevention of Wormhole Attack in MANET' in International Journal of Computer Applications, Volume 94, No. 20, May-2014.
  4. Sweety Goyal and Harish Rohil "Securing MANET against Wormhole Attack using Neighbor Node Analysis" in International Journal of Computer Applications, Volume 81, No 18, November 2013.
  5. Mohit Kumar and Nidhi Shalya "Securing AODV against Wormhole Attack using Token based Approach" in International Journal of Applied Information Systems, Volume 4, No. 10, December 2012.
  6. Nidhi Nigam, Vishal Sharma and Mahesh Malviya "A Novel Approach for Wormhole Detection in MANET" in International Journal of Computer Applications, Volume 63, No. 7, February 2013.
  7. Mohini Gupta and Amit Kanungo "A Novel Defense IPS Scheme against Wormhole Attack in MANET" in International Journal of Computer Applications, Volume 79, No. 17, October 2013.
  8. Aarf Khan, shweta shrivastava and Vineet Richariya "Normalized Wormhole Local Detection Algorithm (NWLIDA)" in International Journal of Modern Engineering & Management Research, Volume 1, Issue 3, October 2013.
  9. Bipin N. Patel and Tushar S. Patel "A Survey of Detecting Wormhole Attack in Manet" in International Journal of Engineering Research and Applications, Volume 4, Issue 3, March 2014.
  10. Mahesh Kumar Kumawat and Jitendra Singh Yadav "A Survey of Detection and Prevention Techniques for Gray-Hole Attack in MANET" in International Journal of Computer Science and Applications, Volume 5, 2014.
  11. Yih-Chun Hu, Adrian Perrig and David B. Johnson " Wormhole Attacks in Wireless Networks" in IEEE Journal on Selected Areas in Communications, Volume 24, No. 2, February 2006.
  12. Neha Shrivastava and Anand Motwani "Survey of Malicious Attacks in MANET" in International Journal of Computer Applications, Volume 80, No. 14, October 2013.
  13. Bill Ewanick " Zero Knowledge Proof" March 31, 2011.
  14. Univ. de Los Andes, Merida, Venezeula and ESSI, Sophia – Antipolis, France. "NS Simulator for Beginners", Dec 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Clustering Authentication Security.