CFP last date
20 May 2024
Reseach Article

Identifying and Securing Malicious Behavior in MANET

by Prakash Deshmukh, Yogesh Rai, Santosh Kushwaha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 17
Year of Publication: 2015
Authors: Prakash Deshmukh, Yogesh Rai, Santosh Kushwaha
10.5120/ijca2015905778

Prakash Deshmukh, Yogesh Rai, Santosh Kushwaha . Identifying and Securing Malicious Behavior in MANET. International Journal of Computer Applications. 123, 17 ( August 2015), 23-28. DOI=10.5120/ijca2015905778

@article{ 10.5120/ijca2015905778,
author = { Prakash Deshmukh, Yogesh Rai, Santosh Kushwaha },
title = { Identifying and Securing Malicious Behavior in MANET },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 17 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number17/22053-2015905778/ },
doi = { 10.5120/ijca2015905778 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:12:58.764494+05:30
%A Prakash Deshmukh
%A Yogesh Rai
%A Santosh Kushwaha
%T Identifying and Securing Malicious Behavior in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 17
%P 23-28
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad hoc network (MANET) is auto configurable system. This environment allows us to move haphazardly in any path. These sorts of system are in some cases self-controlled or controlled by any web zone. The usability and opportunity to migrate make this stage a more extensive use in the present system populace. The information accepting and partaking in this environment is making this environment all the more agreeable to utilize and adjust. Be that as it may, adjusting the security system is of more noteworthy concern. So in this paper a hybrid encryption method based on Ron Rivest, Adi Shamir, and Leonard Adleman(RSA) and Rivest Cipher (RC) is applied on the data for protecting it. A has code is also added to recongiges the malicious behavior detection by reckoning it timely. The results also prove the effectiveness of this approach.

References
  1. Zhang, Y.; Lazos, L.; Kozma, W., "AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks," Mobile Computing, IEEE Transactions on , vol.PP, no.99, pp.1,1.
  2. G. Acs, L. Buttyan, and L. Dora. Misbehaving router detection in link-state routing for wireless mesh networks. InProc. of WoWMoM, pages 1–6, 2010.
  3. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens. ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Transactions on Information System Security, 10(4):11–35, 2008.
  4. K. Balakrishnan, J. Deng, and P. K. Varshney. Twoack: Preventing selfishness in mobile ad hoc networks. InProc. of WCNC, 2005.
  5. S. Buchegger and J.-Y. L. Boudec. Self-policing mobile ad-hoc networks by reputation systems.IEEE Comm. Magazine, pages 101–107, 2005.
  6. K.V.Kulhalli, Prajakta Rane, “On Demand Multipath Routing Algorithm for Adhoc Wireless Networks ", International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-14, March-2014, pp.357-363.
  7. Aruna Rao S.L, K.V.N.Sunitha, “Secure Geographical routing in MANET using the Adaptive Position Update ", International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-16, September-2014, pp.785-794.
  8. Kambalimath, Mahantesh G., S. K. Mahabaleshwar, and S. S. Manvi. "Reliable Data Delivery in Vehicular Ad Hoc Networks." In Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on, pp. 316-322. IEEE, 2013.
  9. T. Leinmuller, E. Schoch, and C. Maihofer, “Security Requirements and Solution Concepts in Vehicular Ad Hoc Networks,” IEEE 4th Annual Conference on Wireless on Demand Network Systems and Services, pp. 84-91, 2007.
  10. Ma’en Saleh, Ahmad Aljaafreh and Naeem Al-Oudat , " Hierarchal Scheduling Algorithm for Congestion Traffi Control Using Multi-Agent Systems", International Journal of Advanced Computer Research (IJACR), Volume-4, Issue-17, December-2014 ,pp.915-921.
  11. C. Langley, R. Lucas, and H. Fu, “Key Management in Vehicular Ad-Hoc Networks,” IEEE International Conference on Electro/Information Technology, pp.223-226, 18-20 May 2008.
  12. M. Burmester, E. Magkos, and V. Chrissikopoulos, “Strengthening Privacy Protection in VANETs,” IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, pp. 508-513, 2008.
  13. Nath, Asoke, et al. "Multi Way Feedback Encryption Standard Ver-2 (MWFES-2)." International Journal of Advanced Computer Research (IJACR) 3.1 (2013).
  14. F. Schaub, Z. Ma, and F. Kargl, “Privacy Requirements in Vehicular Communication Systems,” IEEE International Conference on Computational Science and Engineering, pp. 139-145, 2009.
  15. F. Sabahi, “The Security of Vehicular Adhoc Networks,” IEEE Third International Conference on Computational Intelligence, Communication Systems and Networks, pp. 338-342, 2011.
  16. J. M. de Fuentes, A. I. González-Tablas, and A. Ribagorda, “Overview of security issues in Vehicular Ad-hoc Networks”, IGI Global, 2011.
  17. R.S. Raw, and D.K. Lobiyal, “B-MFR routing protocol for vehicular ad hoc networks,” Networking and Information Technology (ICNIT), 2010 International Conference on, pp.420-423, 11-12 June 2010.
  18. Namrata Shukla, " Data Mining based Result Analysis of Document Fraud Detection " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-1, Issue-1, December-2014 ,pp.21-25.
  19. Namrata Shukla, Shweta Pandey, " Document Fraud Detection with the help of Data Mining and Secure Substitution Method with Frequency Analysis " , International Journal of Advanced Computer Research (IJACR), Volume-2, Issue-4, June-2012 ,pp.149-156.
  20. Irshad Ahmed Sumra, Halabi Hasbullah and Jamalul-lail Ab Manan, “VANET Security Research and Development Ecosystem”,IEEE 2011.
  21. G.Gowtham, E.Samlinson, “A Secured Trust Creation In V Anet Environment Using Random Password Generator”,International Conference on Computing, Electronics and Electrical Technologies [ICCEET],2012.
  22. Ganesh S. Khekare, Apeksha V. Sakhare, “Intelligent Traffic System for VANET: A Survey”, International Journal of Advanced Computer Research (IJACR), Volume-2, Number-4, Issue-6, December-2012.
  23. Khyati Choure, Sanjay Sharma, “Identification of node behavior for Mobile Ad-hoc Network”, International Journal of Advanced Computer Research (IJACR), Volume-2 Number-4, Issue-6, December-2012.
  24. Ranbir Sinha, Nishant Behar, Devendra Singh,” Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)”, International Journal of Advanced Computer Research (IJACR) Volume 2, Number 1, March 2012.
  25. Bhoi, Sourav Kumar, and Pabitra Mohan Khilar. "A secure routing protocol for vehicular Ad Hoc network to provide ITS services." In Communications and Signal Processing (ICCSP), 2013 International Conference on, pp. 1170-1174. IEEE, 2013.
  26. Li, Y., J. Yang, and S. L. Wu. "A Steiner tree based information dissemination for urban vehicular Ad Hoc networks." In Computational Problem-solving (ICCP), 2013 International Conference on, pp. 113-117. IEEE, 2013.
  27. Liya, Xu, Huang Chuanhe, Li Peng, and Zhu Junyu. "A Randomized Algorithm for Roadside Units Placement in Vehicular Ad Hoc Network." In Mobile Ad-hoc and Sensor Networks (MSN), 2013 IEEE Ninth International Conference on, pp. 193-197. IEEE, 2013.
  28. Meng, Jia, Hao Wu, Hengliang Tang, and Xingyu Qian. "An Adaptive Strategy for Location-Aided Routing Protocol in Vehicular Ad Hoc Networks." In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on, pp. 405-410. IEEE, 2013.
  29. Correa, Claudio, Jo Ueyama, Rodolfo Ipolito Meneguette, and Leandro Aparecido Villas. "VANets: An Exploratory Evaluation in Vehicular Ad Hoc Network for Urban Environment." In Network Computing and Applications (NCA), 2014 IEEE 13th International Symposium on, pp. 45-49. IEEE, 2014.
  30. Amendola, Danilo, Floriano De Rango, Khalil Massri, and Andrea Vitaletti. "Neighbor discovery in delay tolerant networking using resource-constraint devices." In Wireless Days (WD), 2013 IFIP, pp. 1-3. IEEE, 2013.
  31. Chasaki, Danai. "Identifying malicious behavior in MANET through data path information." In Computing, Networking and Communications (ICNC), 2014 International Conference on, pp. 567-572. IEEE, 2014.
  32. Ashutosh Kumar Dubey, Animesh Kumar Dubey Mayank Namdev, Shiv Shakti Shrivastava ,”Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment”,Conseg 2012, Published by IEEE.
  33. Li, Wenjia, and Anupam Joshi. "Security issues in mobile ad hoc networks-a survey." Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County (2008): 1-23.
  34. Sirwan Geramiparvar and Nasser Modiri, " Security as a Serious Challenge for E-Banking: a Review of Emmental Malware " , International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-18, March-2015 ,pp.62-67.
  35. Ketki P. Kshirsagar, " Key Frame Selection for One-Two Hand Gesture Recognition with HMM " , International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-19, June-2015 ,pp.192-197.
  36. Wuling Ren; Zhiqian Miao, "A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication," Modeling, Simulation and Visualization Methods (WMSVM),Second International Conference on , vol., no., pp.221,225, 15-16 May 2010.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Security RSA RC Data sharing and gathering.