CFP last date
20 January 2025
Reseach Article

A Clique based Adaptive Intrusion Detection Approach to Provide Trust on Secured Mulicast Group Communications over Manet- Skema

by S. Saravanan, R M. Chandrasekaran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 18
Year of Publication: 2015
Authors: S. Saravanan, R M. Chandrasekaran
10.5120/20093-1923

S. Saravanan, R M. Chandrasekaran . A Clique based Adaptive Intrusion Detection Approach to Provide Trust on Secured Mulicast Group Communications over Manet- Skema. International Journal of Computer Applications. 113, 18 ( March 2015), 53-61. DOI=10.5120/20093-1923

@article{ 10.5120/20093-1923,
author = { S. Saravanan, R M. Chandrasekaran },
title = { A Clique based Adaptive Intrusion Detection Approach to Provide Trust on Secured Mulicast Group Communications over Manet- Skema },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 18 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 53-61 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number18/20093-1923/ },
doi = { 10.5120/20093-1923 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:51:19.059474+05:30
%A S. Saravanan
%A R M. Chandrasekaran
%T A Clique based Adaptive Intrusion Detection Approach to Provide Trust on Secured Mulicast Group Communications over Manet- Skema
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 18
%P 53-61
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Though numerous research challenges in security focus on MANET, the need for design based secure Group Communication Systems (GCSs) is always a major constraint. The constraint is felt towards incorporation of group based multi-hop security for variable services which requires resource constraints. SKEMA adopts Clique based graph theoretic approach to detect node activity and identifying neighbors during random mobility. SKEMA focuses on towards design of trust mapping mechanism by identifying the maximal connectivity in network. SKEMA also works on developing a random key based exchange approach among clustered nodes in network. SKEMA has been tested over CLIQUES and PROFIDES schemes over secured session maintenance and handling node failure. SKEMA performs better when compared with existing approaches and hence suits well for multi-hop type of services.

References
  1. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, fifth edition, 1996.
  2. Arunkumar Thangavelu, Senthilkumar S, Chapter-21:Knowledge on Routing Nodes in MANET: A Softcomputing Approach, Case Studies in Intelligent Computing : Achievements and Trends, CRC Press, Taylor and Francis Group, pg-427 -450, 2014
  3. Balasubramanian A., Misha, S., Sridhar, R., “A Hybrid approach to key management for enhanced security in ad hoc networks”, Technical report, university at Buffalo, NY, USA,2004
  4. Bing Wu, Jie Wu and YuhongDong,”An efficient group key management scheme for mobile ad hoc network”, International Journal and Networks, Vol. 2008
  5. Bernard Barber. Logic and limits of Trust. New Jersey: Rutgers University Press, 1983
  6. Boyd C, Mao W, Paterson KG. Key agreement using statically keyed authenticators. In: Proceedings of the second international conference on applied cryptography and network security, 2004. p. 248-62.
  7. George Theodorakopoulos and John S. Baras, On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2):318–328, February 2006
  8. K. Hoeper and G. Gong. Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks, International Conference on AD-HOC Networks & Wireless (AD HOC NOW `06), LNCS 4104, Springer Verlag, pp. 224-237, 2006.
  9. K. Hoeper and G. Gong. Pre-Authentication and Authentication Models in Ad Hoc Networks, book chapter in Wireless Network Security, edited by Y.Xiao, X. (Sherman) Shen, and D.-Z. Du, Springer Verlag, ISBN: 978-0-387-28040-0, 2007.
  10. Imad Aad , Jean-Pierre Hubaux , Edward W. Knightly, Impact of denial of service attacks on ad hoc networks, IEEE/ACM Transactions on Networking (TON), v.16 n.4, p.791-802, August 2008
  11. National Institute of Standards and Technology (NIST), Special Publication 800-56A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, March 2006
  12. Network Simulator NS-2. http://www.isi.edu/nsnam/ns/.
  13. R.C.W. Phan. Fixing the Integrated Diffie-Hellman-DSA Key Exchange Protocol, IEEE Commun. Letters, vol. 9, no. 6, pp. 570-572, 2005.
  14. K.G. Paterson. Cryptography from Pairings: a Snapshot of Current Research, Information Security Technical Report, vol. 7, no. 3, pp. 41-54, 2002
  15. Qing Chen, Zubair Md. Fadlullah, Xiaodong Lin, Nei Kato, A clique-based secure admission control scheme for mobile ad hoc networks (MANETs), Journal of Network and Computer Applications, Vol34 Issue 6, November, 2011, pg 1827-1835
  16. Rachedi A, Benslimane A, Guang L, Assi C. A confident community to secure mobile ad-hoc networks. In: ICC 2007. Glasgow, Scotland, UK, 2007.
  17. Renu Dalal, Yudhvir Singh and Manju Khari, A Review on Key Management Schemes in MANET, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.4, July 2012, pg 165-173
  18. R. Saminathan, Dr. K. Selvakumar, "PROFIDES - Profile based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network", International Journal of Computer Applications 0975 – 8887 Volume 7– No. 14, October 2010.
  19. R. Saminathan, K. Selvakumar, TRUCE – An Adaptive Trust Management Algorithm Over MANET for Service-Based Mobile Computing Environments, Information Security Journal: A Global Perspective , Volume 20 Issue 4-5, Pages 173-184, January 2011
  20. Senthilkumar K, Arunkumar Thangavelu, Classification and prediction of routing nodes behavior in MANET using fuzzy proximity relation and ordering with Bayesian classifier’, IEEE Int. Conf. on Pattern Recognition, Informatics and Mobile Engineering, PRIME-2013, Feb 21-22, 2013, pp.454–460
  21. Senthilkumar K, Arunkumar Thangavelu, Trust Evaluation using Fuzzy proximity relation with ordering for MANET’, Int. J. Trust Management in Computing and Commu.,Vol. 1, No. 2, pp.105–120, 2013
  22. Wu, B., Wu, J., Fernandez, E., Ilyas, M. and Magliveras, S., “Secure and Efficient key Management in mobile ad hoc networks”, Network and Computer Applications, Vol. 30, pp. 937-954, 2007.
  23. Weimerskirch and D. Westho, Identity Certified Authentication for Ad-hoc Networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN), 2003, ACM Press, ISBN: 1-58113-783-4, pp. 33-40, 2003
  24. S. Vasudevan, J.Kurose, D. Towsley, " Design and Analysis of a leader election algorithm for Mobile AdHoc Networks", Proc. IEEE International Network Protocols, 2004, pg 122-130
  25. Yun Teng, Vir V. Phoha, and Ben Choi. Design of trust metrics based on dempster-shafer theory. http://citeseer.nj.nec.com/461538.html
  26. Vikram Srinivasan, Pavan Nuggehalli, CarlaFabiana Chiasserini, and Ramesh R. Rao. Cooperation in wireless ad hoc networks. In INFOCOM’ 03: Proceedings of IEEE Conference on Computer Communications, 2003.
  27. Y. Zhang, W. Liu, W. Lou, and Y. Fang. Securing Mobile Ad Hoc Networks with Certificateless Public Keys.IEEE Trans. Dependable Secur. Comput. , vol. 3, no. 4, pp. 386-399, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Secure group communication systems MANET security Clique approach ns2 simulator SKEMA