CFP last date
20 December 2024
Reseach Article

Hybrid Protocol for Handling Security using SBPGP

by Pooja Chahal, Gaurav Kumar Tak
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 22
Year of Publication: 2015
Authors: Pooja Chahal, Gaurav Kumar Tak
10.5120/20287-2843

Pooja Chahal, Gaurav Kumar Tak . Hybrid Protocol for Handling Security using SBPGP. International Journal of Computer Applications. 115, 22 ( April 2015), 40-44. DOI=10.5120/20287-2843

@article{ 10.5120/20287-2843,
author = { Pooja Chahal, Gaurav Kumar Tak },
title = { Hybrid Protocol for Handling Security using SBPGP },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 22 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 40-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number22/20287-2843/ },
doi = { 10.5120/20287-2843 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:55:38.154732+05:30
%A Pooja Chahal
%A Gaurav Kumar Tak
%T Hybrid Protocol for Handling Security using SBPGP
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 22
%P 40-44
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad hoc network is part of wireless networks which is formed by collection of two or more nodes moving in an arbitrary manner. The nodes are self organizing, adaptive, infrastructure less and has dynamic topology. Hence due to high mobility and multipath propagation network is vulnerable to attacks. There are many types of MANET like VANET (Vehicular Ad hoc Network), SPANs (Smart Phone Ad hoc Networks), iMANET (Internet based Mobile Ad hoc Network), Tactical MANET. There are various attacks that can be possible on MANET like Denial of Service attack, Black hole attack, Wormhole attack, Sybil attack etc which can disturb the communication between the nodes. So today's requirement is to provide secure and authentic communication in MANET. For small network security is not a big issue but for large or complex network security should be provided in large extent. To provide security for complex networks in the network using a technique Seniority Based Pretty Good Privacy (SBPGP) is used.

References
  1. Toh, C. K. 2001. Ad hoc mobile wireless networks: protocols and systems. Pearson Education.
  2. Aarti. , Tyagi, S. S. 2013. Study Of Manet: Characteristics, Challenges, Application AndSecurity Attacks. International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013 ISSN: 2277 128X, pp. 252-257.
  3. Ali, M. , Sarwar. Y. 2011. Security Issues regarding MANET (Mobile Ad Hoc Networks): Challenges and Solutions, Thesis no: MCS-2011-11.
  4. Chahal, P. , Tak, GK. , Tomar, AS. 2015. Comparative analysis on various attacks on MANET, International Journal of Computer Applications (0975 – 8887) Volume 111 – No 12, February 2015.
  5. Kaur, J. , Sran, SS. 2012. SBPGP Security based Model in Large Scale Manets, International Journal of Wireless Networks and Communications. ISSN 0975-6507 Volume 4, Number 1 (2012), pp. 1-10
  6. Kannhavong, B. , Nakayama, H. , Nemoto, Y. , Kato, N. 2007. A Survey Of Routing Attacks In Mobile Ad Hoc Networks. Ieee Wireless Communications.
  7. Ali, MA. , EL-SAYED, A. , Z. Morsi, I. 2007. A survey of multicast routing protocols for ad-hoc wireless networks. Minufiya Journal of Electronic Engineering Research (MJEER), Volume 17, No. 2.
  8. Maqsood, R. , Quamar. 2008. A Hybrid Cryptography Model for Managing Security in Dynamic Topology of MANET, Biometrics and security Technologies, ISBAST 2008, Internation Symposium on IEEE, 2008 , pp. 1-7.
  9. Jacob, J. , Seethalakshmi, V. 2012. Performance analysis and enhancement of routing protocol in MANET, International Journal of Modern Engineering Research (IJMER), ISSN: 2249-6645, pp -323-328.
  10. Dhenakaran, S. S. , Parvathavarthi, A. 2013. An Overview of Routing Protocols in Mobile Ad-Hoc Network. International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013, ISSN: 2277 128X.
  11. Kannhavong, B. , Nakayama, H. , Nemoto, Y. , Kato, N. 2007. A Survey Of Routing Attacks In Mobile Ad Hoc Networks. Ieee Wireless Communications.
  12. Mittal, N. , Janish. 2013. Performance Evaluation of AODV and DSDV under Seniority Based Pretty Good Privacy Model (SBPGP). International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 943 ISSN 2229-5518.
  13. Marina, MK. , Das, SR. 2006. Ad hoc on-demand multipath routing protocol, Wireless communication and mobile computing. khiavi, MV. , Jamali, S. 2013. Performance comparison of AODV and AOMDV Routing Protocols in Mobile Ad hoc network, International Research Journal of Applied and Basic Sciences, ISSN 2251-838X / Vol, 4 (11): 3277-3285.
Index Terms

Computer Science
Information Sciences

Keywords

AOMDV Black hole attack DOS MANET Network Security SBPGP.