SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 288
ENHANCED SECURITY IN SPONTANEOUS WIRELESS AD HOC
NETWORKS WITH INTRUSION DETECTION
Vani Menon C1
, Mary Mareena P V2
1
M.Tech Student, Department of CSE, NCERC, Kerala, India
2
Assistant Professor, Department of CSE, NCERC, Kerala, India
Abstract
Spontaneous ad hoc network is created by a set of nodes placed together in the close region for some cooperative activity. A complete
self-configured secure protocol uses the human interactions related with the activity to establish a basic service and security
infrastructure. In order to achieve this requirement, authenticating the individual node as they come in the range of wireless network
is needed. The secure protocol uses a hybrid symmetric or asymmetric scheme and the trust among users. The design of the protocol
permits sharing resources and offering new services between users in a secure environment. Malicious nodes send or forward the
data, which may disrupt the communication. The nodes in the network need to find out the malicious node. This paper describes a
secure protocol for the network. The main focus of this paper is on the network management, security analysis of the system and an
intrusion detection mechanism for spontaneous ad hoc network.
Keywords: spontaneous wireless network, secure protocol, public key, private key
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Mobile ad hoc network (MANET) is a dynamic wireless
network that offers significant advantages that appear very
promising to suit challenging requirements of novel
applications. MANETs support spontaneous networking and
that has turned mobile ad hoc networking into a hot topic in
research. Spontaneous wireless networks are regarded as
interesting solutions to extend wireless networks
disadvantaged by increasingly heavy smart phone data
communications. In addition, spontaneous networks can
extend the reach of wireless internet access without any fixed
infrastructure. In this network, the nodes establish routing
among themselves dynamically to form their own network as
shown in Figure-1.
Fig -1: Spontaneous network model
The networked devices presently run towards infinity and the
administration effort for managing these devices also have
increased. Spontaneous networks can reduce the effort to
integrate devices and services into network environments with
the intention to have instant service availability with no
dependence on a central server. A spontaneous network is
defined as an ad hoc network that is built spontaneously as
devices connect. This network enables a natural form of
wireless computing when humans interact with each other. A
Spontaneous Wireless Ad Hoc network is formed, when two
or more nodes come together in the closed area for
communication and to share the resources for the duration of
limited time. Users are automatically connected to the
network, establish their needed channels and share services.
The main purpose is to facilitate secured spontaneous
networking in a user friendly way. Automatic device
integration into network environments enables the device to
communicate with others.
The requirements for the configuration services of these
networks depend mainly on size of the network, the nature of
cooperation among nodes and on the applications that are
running. The tasks to be carried out in the configuration of
these types of networks include the identification of nodes and
their authorization, address assignment, service name and
security. Nodes are free to join or leave the network as it
might be susceptible to attack if nodes involved are not
trusted. Security has become a primary concern in order to
provide confined communication in a dynamic environment.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 289
Ad hoc spontaneous networks require a protocol which adapts
to any number of dissimilar nodes. The network and protocol
based on user trust can establish a secured self configured
environment for data sharing and resources and services
distribution among users. By building a trust network and on
the user service needs, security is established. This enables to
obtain a distributed certification authority which is necessary
to build trust networks. The network permits users to connect
because it belongs to someone who knows it. We used to
concern asymmetric cryptography where every device has a
public-private key pair for discovering the device and also
symmetric cryptography to share session keys among nodes.
Authentication and trust phase is used to solve the security
issues. There are unidentified users, because validity and
privacy depends on user identification [1].
In wireless communication technologies, security has a
primary concern in effort to give secure communication in a
hostile wireless environment. Nodes can be easily captured
and fake messages can be injected into the network. Several
approaches for securing communication in ad hoc networks
have been proposed. Here the protocol based on user trust
offers security while requiring less energy. In order to attain
an acceptable level of security without affecting their
efficiency, intrusion detection approach is proposed. This
mechanism can extend the network security by finding out
intruders. Furthermore, stream cipher introduced to enhance
the performance when transferring data among nodes. Salsa20
offers a much better speed security profile than the block
cipher AES [2] [3]. Stream ciphers have limited or no error
propagation whose block diagram is shown in Figure-2 with
the plaintext and the corresponding encrypted cipher text. The
cipher text is the xor of the plaintext and the stream, where
stream is determined by the key and nonce. In Salsa20 the
reduced round ciphers provides an attractive option for users
who considers more importance to speed.
Key
Ki
Pi Ci
Fig -2: Stream cipher
2. RELATED WORK
An ad hoc network must operate independent of an access
point infrastructure, whereas still offering essential
administrative services to support applications. In an ad hoc
environment, nodes have to cooperate to provide the
functionality of group communication. Security in fixed
network relies on a central server to certify nodes that want to
communicate with each other but this is not the case with
spontaneous network. The phase of authentication and trust is
a fundamental topic in the environment of security in
spontaneous networks [4].
The methods used earlier enable the users to get the service
required without any external infrastructure. The nodes
participating may not be able to execute routing and security
protocols. The design and use of adaptive routing and security
mechanisms is necessary for any type of devices and
scenarios. It is difficult to manage the dynamic networks
which are with flexible memberships, group and distributed
signatures. Key exchange mechanisms for user authentication
and node authorization are required to obtain a reliable
communication. The methods adopted are not enough for
spontaneous networks since they need configuration to
perform initially.
Zhu et al. [5] developed a scalable and light-weight secure
protocol for ad hoc networks. Most of the routing protocols for
ad hoc networks do not apply network access control. This
causes the networks susceptible to resource consumption
attacks where a malicious node injects erroneous routing
updates into the network with the goal of paralyzing the
network. In order to prevent such attacks, it is necessary that a
node joining ad hoc network employs some authentication
mechanisms. Using Lightweight Hop by Hop Authentication
protocol trust relationship with its neighbours can be
bootstrapped.
Backstrom et al. [6] developed the first real spontaneous
network using the Jini technology that offers services
dynamically. New units can be easily added and makes
possible to connect any device to the network irrespective of
the operating system. A contract is initiated when the service
provider unit joined the network and the duration of the
service depends on the contract. The evolved technologies like
Jini can ensure interoperability between different systems, but
this is not spontaneous.
Untz et al. [7] proposed a lightweight interconnection protocol
appropriate for spontaneous edge networks. For spontaneous
edge networks, here it proposed and implemented Lilith which
is a prototype of an interconnection node. The main objective
is to support TCP or IP applications without configuration. To
allow different communication paths on a per flow basis, it
uses Multi protocol label switching. It presents seamless
switching between operational and back-up paths, and the
information will reach on destination reachability. Load
balancing or traffic isolation for different QoS classes is
provided through multiple paths. The wireless spontaneous
network is of dynamic topology which causes routes to
frequently appear and disappear. This can be solved by Label
Switched Paths which enable the nodes to detect broken paths.
But it does not have any security mechanisms.
Key stream generator
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 290
Danzeisen et al. [8] apply Wireless Encryption Protocol
(WEP), the regular security mechanism used in Wireless
LANs. Building spontaneous networks between two or more
nodes for communication was enabled by wireless
communication technology. It is easy for the formation of
spontaneous networks among heterogeneous node with
cellular framework. Communication channel uses security
parameters which depend on a specific technology. In
Wireless LAN, wireless encryption protocol is available but it
is more susceptible to hacking attacks.
Czerwinski et al. [9] introduced an architecture and
implementation of a secure Service Discovery Service (SDS).
Clients as well as Service providers use SDS to create
complex queries for locating these services and to advertise
complex descriptions of existing running services respectively.
It facilitates the network enabled devices to discover available.
The core component of secure service discovery service is
security and, communications are both encrypted and
authenticated. Certificate authority signs certificates, whose
public key is known to everyone. The components include
clients which want to discover services that are running in the
network and servers respond to client queries. To control the
access to service information, it uses a hybrid access control
list.
3. SECURITY IN SPONTANEOUS NETWORK
A security protocol based on trust permits the creation and
management of distributed and decentralized spontaneous
networks with little interference from the user, and the
incorporation of different devices. The infrastructure less
network is aimed to encourage a wireless interaction. Because
wireless interaction depends on physical proximity, it imitates
the way humans communicate. The following steps must
follow when a device joins the network.
1. Join the device into the network
(a) Agree the broadcast protocol and speed.
(b)Configure IP address, routing information and other
type of information
2. Discover services and resources shared by the devices
(a) Update the list of available services and resources
(b) Share the services discovered
3. Access to the service offered by the devices
(a) Handle the automatic configuration tasks and security
access to the services
(b) Joining and leaving a network have to be managed
4. Cooperative tasks
(a) Cooperation of various members within the intranet
(b) With other communities on the internet
Spontaneous networks imitate human relations which are
taken into account for the security. Spontaneous ad hoc
networks have many applications in the areas include
industrial, business, military and teaching. It can be used
during emergency situations in order to establish
communication fast and reliably. Secure communication is
guaranteed with cryptographic techniques. The requirements
of security in spontaneous networks are the same as used in
traditional networks such as privacy, integrity, verification,
confidentiality and availability [10], [11].
3.1 Network Creation
The network is created using the information provided by the
users. The establishment of a network allows the devices to
communicate. It involves the automatic configuration of
logical and physical parameters. The system is purely based
on the use of an Identity Card (IDC) and a certificate. The IDC
consists of public and private components for the operation.
The public component consists of a Logical Identity (LID),
which is unique for each node participating. LID consists of
information such as name, picture or other type of user
identification. It also contains public and private keys of the
user. The public key is sent to other users. The creation and
expiration date, IP proposed by the user and user signature
generated using the Secure Hash Algorithm (SHA-1) are the
other type of information included. Private key is included in
the private component. Central Certification authority is not
required to validate IDC. It is done by any of the trusted
nodes. The exchange of IDC among nodes grows the trusted
network.
When a node wants to make communication with another
node and it does not have that node’s certificate, it is possible
to requests from its trusted nodes. The system will validate the
data after receiving the certificate. If the data is correct, then it
will sign as a valid node. Every node can make requests as
well as serve requests for authentication or information from
other nodes. The nodes can act as clients as well as servers at
the same time
Spontaneous network is created by the first node as shown in
Figure-3 and generates a session key arbitrarily, which will be
shared with the new nodes coming after the verification phase.
Network security and user data are configured by the second
node and authenticates against the first node. Additional nodes
authenticates with any other node in the network. A node
which joins onto a network must go through some phases:
verification and authorization of node, session key agreement,
transmission protocol and speed, IP address checking and
routing.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 291
Start No
Yes
No
Yes
Yes
End
Fig -3: Network creation
Spontaneous network is created by the first node as shown in
Fig. 2 and generates a session key arbitrarily, which will be
shared with the new nodes coming after the verification phase.
Network security and user data are configured by the second
node and authenticates against the first node. Additional nodes
authenticates with any other node in the network. The nodes
can act as clients as well as servers at the same time.
3.2 Authentication Control
After a node joined onto the network, it sends an
authentication message with its LID to its neighbor nodes.
When the receiver node receives the message, it validates the
received data in order to check that the data has not been
already used in the network. It sends a broadcast message to
other nodes present in the network to recheck that the data has
not been used. If no such data present, then the node is
validated and thus gets trusted. The trusted node’s data is
saved which then can perform several tasks. The tasks include
display and modify the trust of the nodes, update the
information, process the authentication request, reply and
forward an information request, send data to nodes and leave
the network.
3.3 Protocol Implementation
Security in the network depends on the symmetric and
asymmetric key encryption mechanisms. Session key
generated is used to encrypt the confidential messages among
trust nodes. The algorithm used for the symmetric encryption
scheme is Advanced Encryption Standard whereas for
asymmetric key scheme is Rivest, Shamir and Adleman.
Session key and node authentication process are distributed
using asymmetric key encryption.
User only determines whether have to build a network or to
join in an existing one once validation is completed. The node
that wants to join a spontaneous network begins the procedure
by sending a Discovery request packet to the destinations. The
packet contains the LID of the sending node. The receiving
packet contains the LID and IP address of the destination. The
data received is used to study the chosen device to
authenticate. Authentication request and reply packets, IP and
e-mail checking packets are used for device authentication.
3.4 Session Key Revocation
The certificate of a node has an expiration time. The node
must authenticate with the device after this session or else, the
device is blocked. The session key is kept by the node until it
leaves the network. The spontaneous network is typically
arranged for a reduced time slot, which is usually not very
extensive. When a node is left from the network during the
period of time when the session key has been renewed, it will
not be capable to access the network until it is authenticated
again with some node present in the network. When the
session key is about to expire, it sends a broadcast message to
other nodes and not all nodes leave from the network at the
same time.
3.5 Confidential Data Sharing
In a spontaneous network, when a node has to send data to
another node or device, it is possible to send the data to either
a single node or to all nodes. All the nodes can receive data
only if it is sent in plaintext whereas a single node can receive
the ciphered data. When the node received the data, it has to
decrypt it with the model of encryption used by the source
node. By session key generation, the data is distributed
between two trusted users and encrypting their files. The user
can access the resource only with the encrypted key if the user
has the privilege to the resource sent. There are several options
provided with the nodes to send the data. It can be sent
symmetrically or asymmetrically encrypted, or as unencrypted
which chosen by the sender.
4. PROPOSED SYSTEM
Intrusion Detection mechanism is introduced in order to
achieve an acceptable security level in spontaneous ad hoc
networks. The trust based approach along with the intrusion
Generate a network
key
Is there a
network
connection
Exchange IDC
Authentication and
session key agreement
Agree
transmissio
n protocol
IP assignment
IP
duplicatio
n?
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 292
detection mechanism enhances the security services that are
required by the users. Encryption and authentication are
normally the first level of security when an intrusion takes
place. Secure Hash Algorithm is used to generate the digital
signature on the encrypted data. And verifying the signature is
done by the node receiving data. If the data are identical, the
receiver node accepts the data, otherwise the data has been
tampered. An alert about the intruder is then given to the
nodes and thus they can avoid the paths that include
compromised nodes. The proposed system of Intrusion
Detection is shown in Figure-4.
Fig -4: Proposed system of Intrusion Detection
5. EXPERIMENTAL RESULTS
Average computation time (in milliseconds) has been used to
compare the performance of algorithms. Salsa20 provides
consistent high speed in a wide variety of applications. The
performance of the current approach was compared on the
basis of the time required for the packet size to be transmitted
which is shown in Figure-5. In this the packet size varies from
1 MB to 3 MB. It can be seen that the encryption scheme by
using salsa20 in the secure protocol for spontaneous network
has the lower execution time compared to other symmetric and
asymmetric algorithms.
0
20
40
60
80
100
120
140
160
1 MB 2 MB 3 MB
AES
RSA
SALSA
Fig -5: Performance evaluation
6. CONCLUSIONS
The design of the protocol permits secure communication
among nodes in a spontaneous wireless ad hoc network.
Human relations approach is used in the work done. These
networks are developed to accomplish a task on a limited
period of time and space. All the nodes need to cooperate for
the configuration and management of the network. The
devices share the required information to be trusted eventually
they gain access to the network. The different users present in
the network offers various resources which can be accessed by
all other users in the network. It is not necessary for the
devices to keep the public keys of the network and
information within it. A unique IP address needs to be
assigned to each device in order to get configured. It is
suitable to be used in resource constrained devices. Security
schemes are included using cryptographic techniques. The
secure protocol allows confidential data sharing among trusted
nodes. And the intrusion detection approach protects the
network and enhancing the level of security in ad hoc
networks.
REFERENCES
[1]. Raquel Lacuesta, Jaime Lloret, Miguel Garcia, and
Lourdes Penalver,“A Secure Protocol for Spontaneous
Wireless Ad Hoc Networks Creation,” IEEETransactions on
Parallel and Distributed Systems, Vol. 24, No. 4, April 2013.
[2]. D. J. Bernstein, “The Salsa20 Stream Cipher,” SKEW,
http://cr.yp.to/snuffle.html, Accessed April 2013
[3]. D. J. Bernstein, “The Salsa20 family of stream ciphers,”
New Stream Cipher Designs, LNCS vol. 4986, pp. 84-97,
Springer, Heidelberg, 2008
[4]. L.M. Feeney, B. Ahlgren, and A. Westerlund,
“Spontaneous Networking: An Application- Oriented
Approach to Ad-hoc Networking,” IEEE Comm.Magazine,
vol. 39, no. 6, pp. 176- 181, June 2001.
[5]. S. Zhu, S. Xu, S. Setia, and S. Jajodia, “LHAP: A
Lightweight Hop by-Hop Authentication Protocol For Ad-Hoc
Local data collection
Local detection
Cooperative
detection
Normal
profile
Alert
manageme
nt
Audit data source
Misuse detection
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 293
Networks,” Ad Hoc Networks J., pp. 567-585, vol. 4, no. 5,
Sept. 2006.
[6]. J. Backstrom and S. Nadjim-Tehrani, “ Design of a
Contact Service in a Jini-Based Spontaneous Network,” Proc.
Int’l Conf. and Exhibits on the Convergence of IT and
Comm., August 2001.
[7]. V. Untz, M. Heusse, F. Rousseau, and A. Duda, “Lilith:
an Interconnection Architecture Based on Label Switching for
Spontaneous Edge Networks,” Proc. First Ann. Int’l Conf.
Mobile and Ubiquitous Systems: Networking and Services
(Mobiquitous ’04), August 2001.
[8]. M. Danzeisen, T. Braun, S. Winiker, D.
Rodellar,“Implementation of a Cellular Framework for
Spontaneous Network Establishment,” Proc. IEEE Wireless
Comm. And Networking Conf. (WCNC ’05), March 2005.
[9]. S.E. Czerwinski, B.Y. Zhao, T.D. Hodes, A.D. Joseph,
and R.H., “An Architecture for a Secure Service Discovery
Service,” Proc. ACM/IEEE MobiCom, Aug. 1999.
[10]. R. Lacuesta, J. Lloret, M. Garcia, and L.Penalver,“A
Spontaneous Ad-Hoc Network to Share WWW Access,”
EURASIP J. Wireless Comm. and Networking, vol. 2010,
article 18, 2010.
[11]. Payal A.Pawade and V.T.Gaikwad “Authenticating
Protocol for Spontaneous Wireless Ad Hoc Networks”,
International Journal of Computer Science and Management
Research, vol.2, Issue-5, May 2013.

More Related Content

What's hot

Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
 
Refining data security in infrastructurenetworks support of multipath routing
Refining data security in infrastructurenetworks support of multipath routingRefining data security in infrastructurenetworks support of multipath routing
Refining data security in infrastructurenetworks support of multipath routingeSAT Journals
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyIJCNCJournal
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSIAEME Publication
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackRashi Dhagat
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions inIJNSA Journal
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPNIRJET Journal
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 

What's hot (19)

Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
 
Refining data security in infrastructurenetworks support of multipath routing
Refining data security in infrastructurenetworks support of multipath routingRefining data security in infrastructurenetworks support of multipath routing
Refining data security in infrastructurenetworks support of multipath routing
 
Framework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptography
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
IRJET - Site to Site Open VPN
IRJET -  	  Site to Site Open VPNIRJET -  	  Site to Site Open VPN
IRJET - Site to Site Open VPN
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 

Viewers also liked

Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencleSAT Publishing House
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...eSAT Publishing House
 
An android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directionsAn android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directionseSAT Publishing House
 
A comprehensive study of mining web data
A comprehensive study of mining web dataA comprehensive study of mining web data
A comprehensive study of mining web dataeSAT Publishing House
 
Hydrostatic transmission as an alternative to conventional gearbox
Hydrostatic transmission as an alternative to conventional gearboxHydrostatic transmission as an alternative to conventional gearbox
Hydrostatic transmission as an alternative to conventional gearboxeSAT Publishing House
 
Transient analysis on grey cast iron foam
Transient analysis on grey cast iron foamTransient analysis on grey cast iron foam
Transient analysis on grey cast iron foameSAT Publishing House
 
On the (pseudo) capacitive performance of jack fruit seed carbon
On the (pseudo) capacitive performance of jack fruit seed carbonOn the (pseudo) capacitive performance of jack fruit seed carbon
On the (pseudo) capacitive performance of jack fruit seed carboneSAT Publishing House
 
Dynamic model of zeta converter with full state
Dynamic model of zeta converter with full stateDynamic model of zeta converter with full state
Dynamic model of zeta converter with full stateeSAT Publishing House
 
Cyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaCyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaeSAT Publishing House
 
Mobile robot path planning using ant colony optimization
Mobile robot path planning using ant colony optimizationMobile robot path planning using ant colony optimization
Mobile robot path planning using ant colony optimizationeSAT Publishing House
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureeSAT Publishing House
 
Quality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedQuality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedeSAT Publishing House
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelesseSAT Publishing House
 
Product aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent reviewProduct aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent revieweSAT Publishing House
 
Availability analysis of parallel transit fuel system in petrol engine under ...
Availability analysis of parallel transit fuel system in petrol engine under ...Availability analysis of parallel transit fuel system in petrol engine under ...
Availability analysis of parallel transit fuel system in petrol engine under ...eSAT Publishing House
 
Evaluating performance of centrifugal pump through cfd while modifying the su...
Evaluating performance of centrifugal pump through cfd while modifying the su...Evaluating performance of centrifugal pump through cfd while modifying the su...
Evaluating performance of centrifugal pump through cfd while modifying the su...eSAT Publishing House
 
Fabrication and mechanical properties of stir cast al si12 cub4c composites
Fabrication and mechanical properties of stir cast al si12 cub4c compositesFabrication and mechanical properties of stir cast al si12 cub4c composites
Fabrication and mechanical properties of stir cast al si12 cub4c compositeseSAT Publishing House
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with clustereSAT Publishing House
 
Design and verification of pipelined parallel architecture implementation in ...
Design and verification of pipelined parallel architecture implementation in ...Design and verification of pipelined parallel architecture implementation in ...
Design and verification of pipelined parallel architecture implementation in ...eSAT Publishing House
 

Viewers also liked (20)

Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencl
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...
 
An android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directionsAn android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directions
 
A comprehensive study of mining web data
A comprehensive study of mining web dataA comprehensive study of mining web data
A comprehensive study of mining web data
 
Hydrostatic transmission as an alternative to conventional gearbox
Hydrostatic transmission as an alternative to conventional gearboxHydrostatic transmission as an alternative to conventional gearbox
Hydrostatic transmission as an alternative to conventional gearbox
 
Transient analysis on grey cast iron foam
Transient analysis on grey cast iron foamTransient analysis on grey cast iron foam
Transient analysis on grey cast iron foam
 
On the (pseudo) capacitive performance of jack fruit seed carbon
On the (pseudo) capacitive performance of jack fruit seed carbonOn the (pseudo) capacitive performance of jack fruit seed carbon
On the (pseudo) capacitive performance of jack fruit seed carbon
 
Dynamic model of zeta converter with full state
Dynamic model of zeta converter with full stateDynamic model of zeta converter with full state
Dynamic model of zeta converter with full state
 
Cyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaCyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal area
 
Mobile robot path planning using ant colony optimization
Mobile robot path planning using ant colony optimizationMobile robot path planning using ant colony optimization
Mobile robot path planning using ant colony optimization
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architecture
 
Quality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedQuality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advanced
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wireless
 
Product aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent reviewProduct aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent review
 
Availability analysis of parallel transit fuel system in petrol engine under ...
Availability analysis of parallel transit fuel system in petrol engine under ...Availability analysis of parallel transit fuel system in petrol engine under ...
Availability analysis of parallel transit fuel system in petrol engine under ...
 
Evaluating performance of centrifugal pump through cfd while modifying the su...
Evaluating performance of centrifugal pump through cfd while modifying the su...Evaluating performance of centrifugal pump through cfd while modifying the su...
Evaluating performance of centrifugal pump through cfd while modifying the su...
 
Fabrication and mechanical properties of stir cast al si12 cub4c composites
Fabrication and mechanical properties of stir cast al si12 cub4c compositesFabrication and mechanical properties of stir cast al si12 cub4c composites
Fabrication and mechanical properties of stir cast al si12 cub4c composites
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with cluster
 
Design and verification of pipelined parallel architecture implementation in ...
Design and verification of pipelined parallel architecture implementation in ...Design and verification of pipelined parallel architecture implementation in ...
Design and verification of pipelined parallel architecture implementation in ...
 

Similar to Enhanced security in spontaneous wireless ad hoc

Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...CSEIJJournal
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...IRJET Journal
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol ineSAT Publishing House
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Journals
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETIJMTST Journal
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellulareSAT Publishing House
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
 

Similar to Enhanced security in spontaneous wireless ad hoc (20)

Secure final
Secure finalSecure final
Secure final
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Enhanced security in spontaneous wireless ad hoc

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 288 ENHANCED SECURITY IN SPONTANEOUS WIRELESS AD HOC NETWORKS WITH INTRUSION DETECTION Vani Menon C1 , Mary Mareena P V2 1 M.Tech Student, Department of CSE, NCERC, Kerala, India 2 Assistant Professor, Department of CSE, NCERC, Kerala, India Abstract Spontaneous ad hoc network is created by a set of nodes placed together in the close region for some cooperative activity. A complete self-configured secure protocol uses the human interactions related with the activity to establish a basic service and security infrastructure. In order to achieve this requirement, authenticating the individual node as they come in the range of wireless network is needed. The secure protocol uses a hybrid symmetric or asymmetric scheme and the trust among users. The design of the protocol permits sharing resources and offering new services between users in a secure environment. Malicious nodes send or forward the data, which may disrupt the communication. The nodes in the network need to find out the malicious node. This paper describes a secure protocol for the network. The main focus of this paper is on the network management, security analysis of the system and an intrusion detection mechanism for spontaneous ad hoc network. Keywords: spontaneous wireless network, secure protocol, public key, private key -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Mobile ad hoc network (MANET) is a dynamic wireless network that offers significant advantages that appear very promising to suit challenging requirements of novel applications. MANETs support spontaneous networking and that has turned mobile ad hoc networking into a hot topic in research. Spontaneous wireless networks are regarded as interesting solutions to extend wireless networks disadvantaged by increasingly heavy smart phone data communications. In addition, spontaneous networks can extend the reach of wireless internet access without any fixed infrastructure. In this network, the nodes establish routing among themselves dynamically to form their own network as shown in Figure-1. Fig -1: Spontaneous network model The networked devices presently run towards infinity and the administration effort for managing these devices also have increased. Spontaneous networks can reduce the effort to integrate devices and services into network environments with the intention to have instant service availability with no dependence on a central server. A spontaneous network is defined as an ad hoc network that is built spontaneously as devices connect. This network enables a natural form of wireless computing when humans interact with each other. A Spontaneous Wireless Ad Hoc network is formed, when two or more nodes come together in the closed area for communication and to share the resources for the duration of limited time. Users are automatically connected to the network, establish their needed channels and share services. The main purpose is to facilitate secured spontaneous networking in a user friendly way. Automatic device integration into network environments enables the device to communicate with others. The requirements for the configuration services of these networks depend mainly on size of the network, the nature of cooperation among nodes and on the applications that are running. The tasks to be carried out in the configuration of these types of networks include the identification of nodes and their authorization, address assignment, service name and security. Nodes are free to join or leave the network as it might be susceptible to attack if nodes involved are not trusted. Security has become a primary concern in order to provide confined communication in a dynamic environment.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 289 Ad hoc spontaneous networks require a protocol which adapts to any number of dissimilar nodes. The network and protocol based on user trust can establish a secured self configured environment for data sharing and resources and services distribution among users. By building a trust network and on the user service needs, security is established. This enables to obtain a distributed certification authority which is necessary to build trust networks. The network permits users to connect because it belongs to someone who knows it. We used to concern asymmetric cryptography where every device has a public-private key pair for discovering the device and also symmetric cryptography to share session keys among nodes. Authentication and trust phase is used to solve the security issues. There are unidentified users, because validity and privacy depends on user identification [1]. In wireless communication technologies, security has a primary concern in effort to give secure communication in a hostile wireless environment. Nodes can be easily captured and fake messages can be injected into the network. Several approaches for securing communication in ad hoc networks have been proposed. Here the protocol based on user trust offers security while requiring less energy. In order to attain an acceptable level of security without affecting their efficiency, intrusion detection approach is proposed. This mechanism can extend the network security by finding out intruders. Furthermore, stream cipher introduced to enhance the performance when transferring data among nodes. Salsa20 offers a much better speed security profile than the block cipher AES [2] [3]. Stream ciphers have limited or no error propagation whose block diagram is shown in Figure-2 with the plaintext and the corresponding encrypted cipher text. The cipher text is the xor of the plaintext and the stream, where stream is determined by the key and nonce. In Salsa20 the reduced round ciphers provides an attractive option for users who considers more importance to speed. Key Ki Pi Ci Fig -2: Stream cipher 2. RELATED WORK An ad hoc network must operate independent of an access point infrastructure, whereas still offering essential administrative services to support applications. In an ad hoc environment, nodes have to cooperate to provide the functionality of group communication. Security in fixed network relies on a central server to certify nodes that want to communicate with each other but this is not the case with spontaneous network. The phase of authentication and trust is a fundamental topic in the environment of security in spontaneous networks [4]. The methods used earlier enable the users to get the service required without any external infrastructure. The nodes participating may not be able to execute routing and security protocols. The design and use of adaptive routing and security mechanisms is necessary for any type of devices and scenarios. It is difficult to manage the dynamic networks which are with flexible memberships, group and distributed signatures. Key exchange mechanisms for user authentication and node authorization are required to obtain a reliable communication. The methods adopted are not enough for spontaneous networks since they need configuration to perform initially. Zhu et al. [5] developed a scalable and light-weight secure protocol for ad hoc networks. Most of the routing protocols for ad hoc networks do not apply network access control. This causes the networks susceptible to resource consumption attacks where a malicious node injects erroneous routing updates into the network with the goal of paralyzing the network. In order to prevent such attacks, it is necessary that a node joining ad hoc network employs some authentication mechanisms. Using Lightweight Hop by Hop Authentication protocol trust relationship with its neighbours can be bootstrapped. Backstrom et al. [6] developed the first real spontaneous network using the Jini technology that offers services dynamically. New units can be easily added and makes possible to connect any device to the network irrespective of the operating system. A contract is initiated when the service provider unit joined the network and the duration of the service depends on the contract. The evolved technologies like Jini can ensure interoperability between different systems, but this is not spontaneous. Untz et al. [7] proposed a lightweight interconnection protocol appropriate for spontaneous edge networks. For spontaneous edge networks, here it proposed and implemented Lilith which is a prototype of an interconnection node. The main objective is to support TCP or IP applications without configuration. To allow different communication paths on a per flow basis, it uses Multi protocol label switching. It presents seamless switching between operational and back-up paths, and the information will reach on destination reachability. Load balancing or traffic isolation for different QoS classes is provided through multiple paths. The wireless spontaneous network is of dynamic topology which causes routes to frequently appear and disappear. This can be solved by Label Switched Paths which enable the nodes to detect broken paths. But it does not have any security mechanisms. Key stream generator
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 290 Danzeisen et al. [8] apply Wireless Encryption Protocol (WEP), the regular security mechanism used in Wireless LANs. Building spontaneous networks between two or more nodes for communication was enabled by wireless communication technology. It is easy for the formation of spontaneous networks among heterogeneous node with cellular framework. Communication channel uses security parameters which depend on a specific technology. In Wireless LAN, wireless encryption protocol is available but it is more susceptible to hacking attacks. Czerwinski et al. [9] introduced an architecture and implementation of a secure Service Discovery Service (SDS). Clients as well as Service providers use SDS to create complex queries for locating these services and to advertise complex descriptions of existing running services respectively. It facilitates the network enabled devices to discover available. The core component of secure service discovery service is security and, communications are both encrypted and authenticated. Certificate authority signs certificates, whose public key is known to everyone. The components include clients which want to discover services that are running in the network and servers respond to client queries. To control the access to service information, it uses a hybrid access control list. 3. SECURITY IN SPONTANEOUS NETWORK A security protocol based on trust permits the creation and management of distributed and decentralized spontaneous networks with little interference from the user, and the incorporation of different devices. The infrastructure less network is aimed to encourage a wireless interaction. Because wireless interaction depends on physical proximity, it imitates the way humans communicate. The following steps must follow when a device joins the network. 1. Join the device into the network (a) Agree the broadcast protocol and speed. (b)Configure IP address, routing information and other type of information 2. Discover services and resources shared by the devices (a) Update the list of available services and resources (b) Share the services discovered 3. Access to the service offered by the devices (a) Handle the automatic configuration tasks and security access to the services (b) Joining and leaving a network have to be managed 4. Cooperative tasks (a) Cooperation of various members within the intranet (b) With other communities on the internet Spontaneous networks imitate human relations which are taken into account for the security. Spontaneous ad hoc networks have many applications in the areas include industrial, business, military and teaching. It can be used during emergency situations in order to establish communication fast and reliably. Secure communication is guaranteed with cryptographic techniques. The requirements of security in spontaneous networks are the same as used in traditional networks such as privacy, integrity, verification, confidentiality and availability [10], [11]. 3.1 Network Creation The network is created using the information provided by the users. The establishment of a network allows the devices to communicate. It involves the automatic configuration of logical and physical parameters. The system is purely based on the use of an Identity Card (IDC) and a certificate. The IDC consists of public and private components for the operation. The public component consists of a Logical Identity (LID), which is unique for each node participating. LID consists of information such as name, picture or other type of user identification. It also contains public and private keys of the user. The public key is sent to other users. The creation and expiration date, IP proposed by the user and user signature generated using the Secure Hash Algorithm (SHA-1) are the other type of information included. Private key is included in the private component. Central Certification authority is not required to validate IDC. It is done by any of the trusted nodes. The exchange of IDC among nodes grows the trusted network. When a node wants to make communication with another node and it does not have that node’s certificate, it is possible to requests from its trusted nodes. The system will validate the data after receiving the certificate. If the data is correct, then it will sign as a valid node. Every node can make requests as well as serve requests for authentication or information from other nodes. The nodes can act as clients as well as servers at the same time Spontaneous network is created by the first node as shown in Figure-3 and generates a session key arbitrarily, which will be shared with the new nodes coming after the verification phase. Network security and user data are configured by the second node and authenticates against the first node. Additional nodes authenticates with any other node in the network. A node which joins onto a network must go through some phases: verification and authorization of node, session key agreement, transmission protocol and speed, IP address checking and routing.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 291 Start No Yes No Yes Yes End Fig -3: Network creation Spontaneous network is created by the first node as shown in Fig. 2 and generates a session key arbitrarily, which will be shared with the new nodes coming after the verification phase. Network security and user data are configured by the second node and authenticates against the first node. Additional nodes authenticates with any other node in the network. The nodes can act as clients as well as servers at the same time. 3.2 Authentication Control After a node joined onto the network, it sends an authentication message with its LID to its neighbor nodes. When the receiver node receives the message, it validates the received data in order to check that the data has not been already used in the network. It sends a broadcast message to other nodes present in the network to recheck that the data has not been used. If no such data present, then the node is validated and thus gets trusted. The trusted node’s data is saved which then can perform several tasks. The tasks include display and modify the trust of the nodes, update the information, process the authentication request, reply and forward an information request, send data to nodes and leave the network. 3.3 Protocol Implementation Security in the network depends on the symmetric and asymmetric key encryption mechanisms. Session key generated is used to encrypt the confidential messages among trust nodes. The algorithm used for the symmetric encryption scheme is Advanced Encryption Standard whereas for asymmetric key scheme is Rivest, Shamir and Adleman. Session key and node authentication process are distributed using asymmetric key encryption. User only determines whether have to build a network or to join in an existing one once validation is completed. The node that wants to join a spontaneous network begins the procedure by sending a Discovery request packet to the destinations. The packet contains the LID of the sending node. The receiving packet contains the LID and IP address of the destination. The data received is used to study the chosen device to authenticate. Authentication request and reply packets, IP and e-mail checking packets are used for device authentication. 3.4 Session Key Revocation The certificate of a node has an expiration time. The node must authenticate with the device after this session or else, the device is blocked. The session key is kept by the node until it leaves the network. The spontaneous network is typically arranged for a reduced time slot, which is usually not very extensive. When a node is left from the network during the period of time when the session key has been renewed, it will not be capable to access the network until it is authenticated again with some node present in the network. When the session key is about to expire, it sends a broadcast message to other nodes and not all nodes leave from the network at the same time. 3.5 Confidential Data Sharing In a spontaneous network, when a node has to send data to another node or device, it is possible to send the data to either a single node or to all nodes. All the nodes can receive data only if it is sent in plaintext whereas a single node can receive the ciphered data. When the node received the data, it has to decrypt it with the model of encryption used by the source node. By session key generation, the data is distributed between two trusted users and encrypting their files. The user can access the resource only with the encrypted key if the user has the privilege to the resource sent. There are several options provided with the nodes to send the data. It can be sent symmetrically or asymmetrically encrypted, or as unencrypted which chosen by the sender. 4. PROPOSED SYSTEM Intrusion Detection mechanism is introduced in order to achieve an acceptable security level in spontaneous ad hoc networks. The trust based approach along with the intrusion Generate a network key Is there a network connection Exchange IDC Authentication and session key agreement Agree transmissio n protocol IP assignment IP duplicatio n?
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 292 detection mechanism enhances the security services that are required by the users. Encryption and authentication are normally the first level of security when an intrusion takes place. Secure Hash Algorithm is used to generate the digital signature on the encrypted data. And verifying the signature is done by the node receiving data. If the data are identical, the receiver node accepts the data, otherwise the data has been tampered. An alert about the intruder is then given to the nodes and thus they can avoid the paths that include compromised nodes. The proposed system of Intrusion Detection is shown in Figure-4. Fig -4: Proposed system of Intrusion Detection 5. EXPERIMENTAL RESULTS Average computation time (in milliseconds) has been used to compare the performance of algorithms. Salsa20 provides consistent high speed in a wide variety of applications. The performance of the current approach was compared on the basis of the time required for the packet size to be transmitted which is shown in Figure-5. In this the packet size varies from 1 MB to 3 MB. It can be seen that the encryption scheme by using salsa20 in the secure protocol for spontaneous network has the lower execution time compared to other symmetric and asymmetric algorithms. 0 20 40 60 80 100 120 140 160 1 MB 2 MB 3 MB AES RSA SALSA Fig -5: Performance evaluation 6. CONCLUSIONS The design of the protocol permits secure communication among nodes in a spontaneous wireless ad hoc network. Human relations approach is used in the work done. These networks are developed to accomplish a task on a limited period of time and space. All the nodes need to cooperate for the configuration and management of the network. The devices share the required information to be trusted eventually they gain access to the network. The different users present in the network offers various resources which can be accessed by all other users in the network. It is not necessary for the devices to keep the public keys of the network and information within it. A unique IP address needs to be assigned to each device in order to get configured. It is suitable to be used in resource constrained devices. Security schemes are included using cryptographic techniques. The secure protocol allows confidential data sharing among trusted nodes. And the intrusion detection approach protects the network and enhancing the level of security in ad hoc networks. REFERENCES [1]. Raquel Lacuesta, Jaime Lloret, Miguel Garcia, and Lourdes Penalver,“A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation,” IEEETransactions on Parallel and Distributed Systems, Vol. 24, No. 4, April 2013. [2]. D. J. Bernstein, “The Salsa20 Stream Cipher,” SKEW, http://cr.yp.to/snuffle.html, Accessed April 2013 [3]. D. J. Bernstein, “The Salsa20 family of stream ciphers,” New Stream Cipher Designs, LNCS vol. 4986, pp. 84-97, Springer, Heidelberg, 2008 [4]. L.M. Feeney, B. Ahlgren, and A. Westerlund, “Spontaneous Networking: An Application- Oriented Approach to Ad-hoc Networking,” IEEE Comm.Magazine, vol. 39, no. 6, pp. 176- 181, June 2001. [5]. S. Zhu, S. Xu, S. Setia, and S. Jajodia, “LHAP: A Lightweight Hop by-Hop Authentication Protocol For Ad-Hoc Local data collection Local detection Cooperative detection Normal profile Alert manageme nt Audit data source Misuse detection
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 293 Networks,” Ad Hoc Networks J., pp. 567-585, vol. 4, no. 5, Sept. 2006. [6]. J. Backstrom and S. Nadjim-Tehrani, “ Design of a Contact Service in a Jini-Based Spontaneous Network,” Proc. Int’l Conf. and Exhibits on the Convergence of IT and Comm., August 2001. [7]. V. Untz, M. Heusse, F. Rousseau, and A. Duda, “Lilith: an Interconnection Architecture Based on Label Switching for Spontaneous Edge Networks,” Proc. First Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous ’04), August 2001. [8]. M. Danzeisen, T. Braun, S. Winiker, D. Rodellar,“Implementation of a Cellular Framework for Spontaneous Network Establishment,” Proc. IEEE Wireless Comm. And Networking Conf. (WCNC ’05), March 2005. [9]. S.E. Czerwinski, B.Y. Zhao, T.D. Hodes, A.D. Joseph, and R.H., “An Architecture for a Secure Service Discovery Service,” Proc. ACM/IEEE MobiCom, Aug. 1999. [10]. R. Lacuesta, J. Lloret, M. Garcia, and L.Penalver,“A Spontaneous Ad-Hoc Network to Share WWW Access,” EURASIP J. Wireless Comm. and Networking, vol. 2010, article 18, 2010. [11]. Payal A.Pawade and V.T.Gaikwad “Authenticating Protocol for Spontaneous Wireless Ad Hoc Networks”, International Journal of Computer Science and Management Research, vol.2, Issue-5, May 2013.