CFP last date
20 January 2025
Reseach Article

Generic Secure Key Sharing Technique for Prevention of Security Attacks on Location based Geo-casting and Forwarding Routing Protocol in Mobile Ad-hoc Networks

by A. Amuthan, N. Sreenath, P. Elango
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 16
Year of Publication: 2012
Authors: A. Amuthan, N. Sreenath, P. Elango
10.5120/7709-1058

A. Amuthan, N. Sreenath, P. Elango . Generic Secure Key Sharing Technique for Prevention of Security Attacks on Location based Geo-casting and Forwarding Routing Protocol in Mobile Ad-hoc Networks. International Journal of Computer Applications. 49, 16 ( July 2012), 7-13. DOI=10.5120/7709-1058

@article{ 10.5120/7709-1058,
author = { A. Amuthan, N. Sreenath, P. Elango },
title = { Generic Secure Key Sharing Technique for Prevention of Security Attacks on Location based Geo-casting and Forwarding Routing Protocol in Mobile Ad-hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 16 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number16/7709-1058/ },
doi = { 10.5120/7709-1058 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:24.079283+05:30
%A A. Amuthan
%A N. Sreenath
%A P. Elango
%T Generic Secure Key Sharing Technique for Prevention of Security Attacks on Location based Geo-casting and Forwarding Routing Protocol in Mobile Ad-hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 16
%P 7-13
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-hoc NETwork (MANET) is composed of Mobile Nodes (MNs) without any infrastructure. MNs self-organize to form a network over radio links. Multicast routing plays a significant role in MANETs. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in MANETs is a particularly challenging task compared to conventional networks. At present, several efficient routing protocols have been proposed for MANETs. Most of these protocols assume a trusted and cooperative environment. However, in the presence of malicious nodes, the network is vulnerable to various kinds of attacks. The success of Mobile Ad-hoc NETwork (MANETs) strongly depends on people's confidence in its security. In large and dense Mobile Ad-hoc NETwork, location-based routing protocols can offer significant performance improvement over topology-based routing protocols. The objective of this paper is to prevent possible types of routing attacks like backhole, flooding and wormhole attack on location- based geocasting and forwarding (LGF) routing protocol in Mobile Ad-hoc NETwork (MANET). However, there are several potential security issues for the development of position-based routing protocols. The routing attacks against location-based geocasting and forwarding is eliminated by Trust based solution and Shamir Secret Key Sharing Scheme. It has been proved that Shamir Secret Key Sharing Scheme is best solution compared with trust based solution on the metrics packet delivery ratio, control overhead and total overhead.

References
  1. Luo Junhai, Ye Danxia, Xue Liu and Mingyu, "A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks", IEEE Communications Surveys & Tutorials, vol. 11 No. 1,First Quarter 2009.
  2. L. A. Latiff, AAli1, chia-ching,Ooi2, N. Fisal3, "Location based Geocasting and Forwarding (LGF) Routing Protocol Mobile Ad hoc Network", Telecommunications, 2005. Advanced industrial conference on telecommunications/service assurance with partial and intermittent resources conference/e-learning on telecommunications workshop. Aict/sapir/ elete2005. Proceedings on 17-20 July 2005.
  3. Shalini Jain, Dr. Satbir Jain, "Detection and prevention of wormhole attack in mobile ad-hoc networks", International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010.
  4. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, And Nei Kato, "A Survey Of Routing Attacks In Mobile Ad Hoc Networks", Wireless Communications IEEE, volume :14, issues:5, 2007.
  5. V. Palanisamy, P. Annadurai, " Impact of Rushing attack on Multicast in Mobile Ad Hoc Network", (IJCSIS) International Journal of Computer Science and Information Security ,Vol. 4, No. 1 & 2, 2009.
  6. Jorge Nuevo, "A Comprehensible Glomosim Tutorial", INRS.
  7. Hoang LAN Nguyen and Uyen Trang Nguyen, "Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks", Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
  8. Garcia- Luna - Aceves and E. Madruga, "The Core Assisted Mesh Protocol", IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Blackhole Wormhole Flooding location- based geocasting and forwarding (LGF) Shamier Secret Key Certificate Mobile Ad-hoc NETwork (MANET)