CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A New Approach To Provide Security for MANETS with 4G techniques

Published on March 2012 by J.Thangakumar, V.Chrystal Amutha, Dr.M.Roberts Masillamani
Wireless Information Networks & Business Information System (WINBIS 2012)
Foundation of Computer Science USA
WINBIS2012 - Number 1
March 2012
Authors: J.Thangakumar, V.Chrystal Amutha, Dr.M.Roberts Masillamani
30cd2856-6119-45a9-9a21-6b7725693b34

J.Thangakumar, V.Chrystal Amutha, Dr.M.Roberts Masillamani . A New Approach To Provide Security for MANETS with 4G techniques. Wireless Information Networks & Business Information System (WINBIS 2012). WINBIS2012, 1 (March 2012), 24-28.

@article{
author = { J.Thangakumar, V.Chrystal Amutha, Dr.M.Roberts Masillamani },
title = { A New Approach To Provide Security for MANETS with 4G techniques },
journal = { Wireless Information Networks & Business Information System (WINBIS 2012) },
issue_date = { March 2012 },
volume = { WINBIS2012 },
number = { 1 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 24-28 },
numpages = 5,
url = { /proceedings/winbis2012/number1/5493-1007/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Wireless Information Networks & Business Information System (WINBIS 2012)
%A J.Thangakumar
%A V.Chrystal Amutha
%A Dr.M.Roberts Masillamani
%T A New Approach To Provide Security for MANETS with 4G techniques
%J Wireless Information Networks & Business Information System (WINBIS 2012)
%@ 0975-8887
%V WINBIS2012
%N 1
%P 24-28
%D 2012
%I International Journal of Computer Applications
Abstract

The security of MANET is one of the major problems for researchers and scholars. While using the Trusted Third Party and non Trusted Third Party schemes to provide communication and authentication, it results in lot of security attacks like missing packets, denial of service attacks, modify packets, Theft of nodes, error in packets etc. One of the TTP schemes addressed these issues effectively by issuing certificates on its online basis; however, the scheme suffered overheads in different communication scenarios. Another non-TTP scheme provides an authentication approach in MANETS using key management by the nodes themselves but faced the security problems due to the blind trust being put on the nodes for adding other nodes in the MANET. Both schemes results in weaknesses regarding overheads and security concerns. We are proposing a new secured Certificate Authorized Routing Protocol (CARP) to provide the secured communication in MANET. The CARP model authenticates the nodes using Fourth Generation (4G) services and enables communication after the nodes being authenticated permanently.

References
  1. Yuh-Min Tseng. “A heterogeneous-network aided public- key management scheme for mobile ad hoc networks”, Published on 10 February 2006 in Wiley InterScience,Int. J. Network Mgmt; 17: 3–15
  2. S. Capkun, L. Buttyan and J-P Hubaux. "Self-Organized Public-Key Management for Mobile Ad Hoc Networks ", IEEE Transactions on Mobile Computing, Vol. 2, No. 1, Jan-Mar 2003, pp. 52-64
  3. . L. Zhou, , Z. Haas, “Securing Ad Hoc Networks” IEEE Network Journal, v.13,no.6, pp.24-30, 1999.
  4. Kong J, Zerfos P, Luo H, Lu S, Zhang L. “Providing robust and ubiquitous security support for mobile ad hoc networks”, Published in IEEE ICNP, pp. 251–260, November 2001
  5. . F. Stajano and R. J. Anderson. “The resurrecting duckling: Security issues for ad-hoc wireless networks” In 7th Security Protocols Workshop, vol. 1796 of LNCS, UK, 1999. Springer-Verlag, Germany 6]. Pirzada A., and McDonald, C., “Kerberos Assisted Authentication in Mobile Ad-hoc Networks”, the 27th Australasian computer science conference, 2004
  6. Weimerskirch, A., Thonet, G., “A Distributed Light-Weight Authentication Model for Ad-hoc Networks”, The 4th Intl. Conf. on Information Security and Cryptology (ICISC), 6-7, 2001 8] Zhu, S., Xu, S., Setia, S., Jajodia, S., “Establishing pair-wise keys for secure communication in adhoc networks: a probabilistic approach”, Proceedings of 11th IEEE ICNP, 2003. 9] H.Schulzrinne, X. Wu and S. Sidiroglou, “Ubiquitous Computing in Home Networks,” IEEE Commun. Mag., pp. 128-135, Nov. 2003. 10] S. Y. Hui and K. H. Yeung, “Challenges in the Migration to 4G Mobile Systems,” IEEE Commun. Mag., pp. 54-59, December 2003. 11]. A. Irshad, W. Noshairwan, M. Usman, E. Irshad, S. M. Gilani “Authentication of Nodes among Different Symmetric Key Groups in MANETs using 4G Technologies” IEEE ICCET, JAN 2009, Singapore 12] A. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, M. Usman, E. Irshad “Security Enhancement in MANET Authentication by checking the CRL Status of Servers” Springer-Verlag,
Index Terms

Computer Science
Information Sciences

Keywords

CARP Mobile Ad hoc Networks 4th Generation Services