CFP last date
20 January 2025
Reseach Article

A Better Approach towards Securing Mobile Adhoc Network

by Amit Chauhan, Arti Patle, Anita Mahajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 8
Year of Publication: 2011
Authors: Amit Chauhan, Arti Patle, Anita Mahajan
10.5120/2457-2662

Amit Chauhan, Arti Patle, Anita Mahajan . A Better Approach towards Securing Mobile Adhoc Network. International Journal of Computer Applications. 20, 8 ( April 2011), 6-11. DOI=10.5120/2457-2662

@article{ 10.5120/2457-2662,
author = { Amit Chauhan, Arti Patle, Anita Mahajan },
title = { A Better Approach towards Securing Mobile Adhoc Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 8 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number8/2457-2662/ },
doi = { 10.5120/2457-2662 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:14.803176+05:30
%A Amit Chauhan
%A Arti Patle
%A Anita Mahajan
%T A Better Approach towards Securing Mobile Adhoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 8
%P 6-11
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Due to wide-ranging characteristics of the Ad Hoc Networks, it is always at a risk to internal as well as external attacks. Many solutions have been proposed and currently being improved in this area. Most of these solutions involve encryption, secure routing, quality of service etc. Each of them is designed to operate in a particular situation, which may fail to work successfully in other scenarios. This paper offers an alternate approach to improve the trustworthiness of the neighbourhood nodes and secure the routing procedure. It helps in computing the trust in neighbours and selecting the most secured route from the available ones for communication. It also helps detecting the compromised node and virtually removing from the network.

References
  1. Hao Yang, Xiaoqiao Meng, Songwu Lu, “Self-organized network-layer security in mobile ad hoc networks”. In Proc3rd ACM workshop on Wireless Security.
  2. Kortuem G., Schneider J., Preuitt D., Thompson T.G.C., F’ickas. S., Segall.Z, “Whwn Peer-to-Peer comes Face-toFace: Collaborative Peer-to-Peer Computing in Mobile Adhoc Networks”, 1st International Copnference on Peer-to-Peer Computing, August, Linkoping, Swedan,2001. Pp. 75-91.
  3. Alfarez Abdul-Rahman & Stephen Halles, “A Distributed Trust Model”, New Security Paradigms Workshop, Proceedings of the 1997 workshop on New security paradigms. pp. 48-60.
  4. Asad Amir Pirzada and Chris McDonald, “Establishing Trust in Pure Ad-hoc Networks”. ACM International Conference Proceeding Series; Vol. 56, Proceedings of the 27th conference on Australasian Computer Science- Volume 26. pp 47-54.
  5. C. Perkins and E. Royer. Ad hoc on-demand distance vector routing. In Proc. IEEE Workshop on Mobile Computing Systems and Applications, 1999.
  6. Catharina Candolin and Hannu H. Kari, “Distributing Incomplete Trust in Wireless Ad Hoc Networks”. In Proceedings of the New Security Paradigms Workshop, ACM, 1997.
  7. Gambetta Diego (2000) ‘Can We Trust?’, in Gambetta, Diego (ed.) “Trust Making and Breaking Cooperative Relations” electronic edition, Department of Sociology, University of Oxford, chapter 13, pp. 213-237.
Index Terms

Computer Science
Information Sciences

Keywords

MANET SID Trust.