CFP last date
20 January 2025
Reseach Article

A Novel Approach to Secured Network Selection

by A. K. Mohapatra, Ankita Gulati, Ruchika Luthra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 3
Year of Publication: 2012
Authors: A. K. Mohapatra, Ankita Gulati, Ruchika Luthra
10.5120/7166-9653

A. K. Mohapatra, Ankita Gulati, Ruchika Luthra . A Novel Approach to Secured Network Selection. International Journal of Computer Applications. 47, 3 ( June 2012), 7-11. DOI=10.5120/7166-9653

@article{ 10.5120/7166-9653,
author = { A. K. Mohapatra, Ankita Gulati, Ruchika Luthra },
title = { A Novel Approach to Secured Network Selection },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 3 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number3/7166-9653/ },
doi = { 10.5120/7166-9653 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:41:25.169218+05:30
%A A. K. Mohapatra
%A Ankita Gulati
%A Ruchika Luthra
%T A Novel Approach to Secured Network Selection
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 3
%P 7-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET (Mobile ad-hoc network) is a collection of mobile nodes that communicate over wireless links without having any pre-existing fixed underlying infrastructure. Their dynamically changing topology, lack of central administration and resource constraints makes them prone to security attacks. Quantifying security has always been a difficult task as there is no fixed measure of how secure is secure enough. Moreover, different people have different interpretations for security. In this paper, a security measurement framework for MANETS based on the five parameters CIANA (Confidentiality, Integrity, Authentication, Non-repudiation and Authorization) has been proposed. AHP (Analytic Hierarchy Process) and TOPSIS (Technique for order preference by similarity to Ideal solution) are then applied on the proposed models to select the most secure network amongst a set of heterogeneous networks.

References
  1. Chenxi Wang, William A. Wulf, 1997. Towards a Framework for Security Measurement. In 20th National Information Systems Security Conference, Baltimore, MD, 522-533.
  2. Reijo Savola and Ilkka Uusitalo, 2006. Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks. In AICT-ICIW '06 Proceedings of the Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services.
  3. Azzedine Boukerche, Begumhan Turgut , Nevin Aydin, Mohammad Z. Ahmad, Ladislau Bölöni, Damla Turgut , 2011. "A taxonomy of routing protocols in ad hoc networks". Journal of Computer Networks, Elsevier 2011.
  4. Muhammad Arshad Ali, Yasir Sarwar, March 2011. Security Issues regarding MANET (Mobile Ad Hoc Networks): Challenges and Solutions. Master Thesis Computer Science.
  5. K. Selvavinayaki, K. K. Shyam Shankar, Dr. E. Karthikeyan, 2010. "Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANETs". International Journal of Computer Applications, Volume 7– No. 11.
  6. Zheng Wei, Meng Xin Jiang Li-Zheng, 2008. Security Architecture for Broadband Multicast Wireless Networks. In 4th International Conference on Wireless Communications, Networking and Mobile Computing.
  7. Sadaf Yasmin, Muhammad Yousaf, Amir Qayyum, 2010. Security Issues Related with DNS Dynamic Updates for Mobile Nodes: A Survey. In proceedings of the 8th International Conference on Frontiers of Information Technology.
  8. Jun-Zhao Sun, 2001. Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing. In proceedings of International Conference on Info-tech and Info-net.
  9. Dirk Balfanz, D. K. Smetters, Paul Stewart, H. Chi Wong, 2002. Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. In Proceedings of the 2002 Network and Distributed Systems Security Symposium (NDSS'02). San Diego.
  10. Reijo M. Savola, Habtamu Abie, 2009. Identification of Basic Measurable Security Components for a Distributed Messaging System. Third International Conference on Emerging Security Information, Systems and Technologies.
  11. Reijo M. Savola, Habtamu Abie, 2009. "On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks", Journal of Networks, Vol. 4, No. 7.
  12. Shuyao Yu, Youkun Zhang, Chuck Song, Kai Chen . A security architecture for Mobile Ad Hoc Networks.
  13. Wenjing Lou, Wei Liu, Yuguang Fang, 2004. Spread: Enhancing Data Confidentiality in Mobile Ad Hoc Networks. In Conference of the IEEE Computer and Communications Societies.
  14. C. R. Dow, P. J. Lin, S. C. Chen, J. H. Lin, and S. F. Hwang. A Study of Recent Research Trends and Experimental Guidelines in Mobile Ad-hoc Networks. Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference.
  15. C. Hwang and K. Yoon, 1981. Multiple Attribute Decision Making. In Berlin: Springer-Verlag.
  16. T. L. Saaty, 1980 . The Analytic Hierarchy Process. McGraw-Hill.
  17. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang. Security In Mobile Ad Hoc Networks: Challenges And Solutions. IEEE Wireless Communications, February 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Confidentiality Authentication Integrity Availability Authentication Security Framework