Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery

Abstract

In this work, two scenarios are considered, scenario-1 is key based communication and scenario-2 is priority based routing and communication. In scenario-1, MANET works on generated keys called KEY1 and KEY2 to establish communication between nodes. Here source node will have to generate and store a key called KEY2 and destination node will have to generate and store a key called KEY1. When source node initiates communication with destination-node, source node will send a requestpacket to destination via shortest/less- cost path (PATH1) without any key mentioning in the packet. Now destination node will send the requested packet and KEY1 to source node via different path other than PATH1 (path of received packet). Source will send KEY2 to destination again through the same path (PATH2). In scenario-2, communication of each node is based on the neighbour node’s priority, here, priority-1 being the highest, hence it is highly recommended for communication and priority three is being the lowest and it is rarely recommended for the communication. Nodes in the network classified into 3 types, unknown node, neighbor’s known node, nonneighbors known node. Priority of nodes can be evaluated based on the security measures, energy level and other parameters of the node. It can also consider Trust Value (TV) of each node based on the duration spent in active efficient communication. With help of this strategy, we can achieve highly secured route discovery, which will help network to have smooth communication among its nodes.

Authors and Affiliations

Chandrakant N| Bangalore, Karnataka, India

Keywords

Related Articles

A 1.8V and 2GHz Inductively Degenerated CMOS Low Noise Amplifier

This paper presents the design and simulation of Low Noise Amplifier (LNA) in a 0.18?m CMOS technology. The LNA function is to amplify extremely low noise amplifier without adding noise and preserving required signal to...

Performance Analysis of Modified SV-Model Based DWT-OFDM Diversity for UWB System

Any UWB system faces major challenges in achieving wide coverage without affecting the system performance. In recent generation communication system OFDM is used to cater for increased data rate of wireless medium wi...

Area Efficient and A High Bit Rate Serial-Serial Multiplier With On-the-Fly Accumulation by Asynchronous Counters

Traditional Serial-Serial multiplier addresses the high data sampling rate. It is effectively considered as the entire partial product matrix with n data sampling cycle for n×n multiplication function instead of 2n cycle...

Medical image Feature Extraction: A Survey

This paper reviews feature extraction methods as it relates to medical image processing. Centrality of feature extraction stage in image processing cannot be over-emphasized. Advancements in medical image processing has...

FPGA Bit-stream Compression Using Run-length Encoding

Reconfigurable system uses bit-stream compression to reduce the bit-stream size and the memory requirement. The communication bandwidth is improved reducing the reconfiguration time. Existing research has explored effici...

Download PDF file
  • EP ID EP8384
  • DOI -
  • Views 424
  • Downloads 23

How To Cite

Chandrakant N (2014). Achieving MANETs Security by Exchanging Path Oriented Keys and Priority Based Secured Route Discovery. International Journal of Electronics Communication and Computer Technology, 4(1), 565-569. https://www.europub.co.uk/articles/-A-8384