Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK shceme

One of the specially designated versatile networks, commonly referred to as MANET, performs on the basics that each and every one grouping in nodes totally operate in self-sorting out limits. In any case, performing in a group capacity maximizes quality and different sources. Mobile ad hoc network is a wireless infrastructureless network. Due to its unique features, various challenges are faced under MANET when the role of routingand its security comes into play. The review has demonstrated that the impact of failures during the information transmission has not been considered in the existing research. The majority of strategies for ad hoc networks just determines the path and transmits the data which prompts to packet drop in case of failures, thus resulting in low dependability. The majority of the existing research has neglected the use of the rejoining processing of the root nodes network. Most of the existing techniques are based on detecting the failures but the use of path re-routing has also been neglected in the existing methods. Here, we have proposed a method of path re-routing for managing the authorized nodes and managing the keys for group in ad hoc environment. Securing Schemes, named as 2ACK and the EGSR schemes have been proposed, which may be truly interacted to most of the routing protocol. The path re-routing has the ability to reduce the ratio of dropped packets. The comparative analysis has clearly shown that the proposed technique outperforms the available techniques in terms of various quality metrics.

[1]  Olivier Festor,et al.  Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[2]  Chik How Tan,et al.  Energy-efficient and scalable group key agreement for large ad hoc networks , 2005, PE-WASUN '05.

[3]  C. Rama Krishna,et al.  An Efficient Distributed Group Key Management Using Hierarchical Approach with Elliptic Curve Cryptography , 2015, 2015 IEEE International Conference on Computational Intelligence & Communication Technology.

[4]  Qiuna Niu Study and Implementation of a Improved Group Key Protocol for Mobile Ad Hoc Networks , 2007 .

[5]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[6]  Joonsang Baek,et al.  Self-organised group key management for ad hoc networks , 2006, ASIACCS '06.

[7]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[8]  N. Balaji,et al.  Energy and mobility based group key management in mobile ad hoc networks , 2014, 2014 International Conference on Recent Trends in Information Technology.

[9]  Luiz A. DaSilva,et al.  MMAN - a monitor for mobile ad hoc networks: design, implementation, and experimental evaluation , 2008, WiNTECH '08.

[10]  Wen-Guey Tzeng,et al.  An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.

[11]  TsudikGene,et al.  Key Agreement in Dynamic Peer Groups , 2000 .

[12]  Elisavet Konstantinou Cluster-based Group Key Agreement for Wireless Ad hoc Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.