Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(320.22KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks
R. Murugan, A. Shanmugam
Pages - 188 - 202     |    Revised - 15-05-2012     |    Published - 20-06-2012
Volume - 6   Issue - 3    |    Publication Date - June 2012  Table of Contents
MORE INFORMATION
KEYWORDS
Clustering Technique, Misbehaving Nodes, Trust Count, Threshold Cryptography, Key Share
ABSTRACT
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
CITED BY (4)  
1 Patil, S., & Borade, D. (2014). Dynamic Cluster Based Intrusion Detection Architecture to Detect Routing Protocol Attacks in MANET. Sensor Netw Data Commun, 3(116), 2.
2 Yadav, S., & Lakhani, K. (2013). A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET. International Journal of Distributed and Parallel Systems, 4(2), 17.
3 Sivagurunathan, S., & Prathapchandran, K. (2013). Survey of Cluster-Based Cryptographic Schemes to Secure MANET. In Proceedings of the International Conference on Applied Mathematics and Theoretical Computer Science (p. 243).
4 Chouhan, K., & Ravi, S. Hardware Implementation of Polarization Encryption (EP) Based Data Security in Network.
1 Google Scholar
2 CiteSeerX
3 refSeek
4 TechRepublic
5 Scribd
6 SlideShare
7 PdfSR
1 Mark E. Orwat, Timothy E. Levin, and Cynthia E. Irvine, “An Ontological Approach to Secure MANET Management”, In Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, pp 787-794 , 2008.
2 Mohd Izuan Mohd Saad and Zuriati Ahmad Zukarnain, “Performance Analysis of Random-Based Mobility Models in MANET Routing Protocol”, European Journal of Scientific Research, Vol. 32, No. 4, 2009, pp. 444-454.
3 M. Uma and G. Padmavathi, “A comparative Study and Performance Evaluation of Reactive Quality of Service Routing Protocols in Mobile Ad Hoc Networks”, Journal of Theoretical and Applied Information Technology, Vol. 6, No. 2, 2009, pp. 223-229.
4 Bing Wu, Jianmin Chen, Jie Wu and Mihaela Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless/Mobile Network Security, Y. Xiao, X. Shen, and D.-Z. Du (Eds.), Springer, 2006.
5 Yu Huang, Beihong Jin, Jiannong Cao, Guangzhong Sun and Yulin Feng, “A Selective Push Algorithm for Cooperative Cache Consistency Maintenance over MANETs”, EUC, 2007, pp. 650-660.
6 Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi, “Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes”, World Academy of Science, Engineering and Technology ,2008.
7 Aishwarya Sagar Anand Ukey, Meenu Chawla, “Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET”, International Journal of Computer Science Issues, Vol. 7, No 1, 2010, pp. 12-17.
8 Sheng-Ti Li, Xiong Wang, “Enhanced Security Design for Threshold Cryptography in Ad Hoc Network”, International conference on Next Generation Tele-Traffic And Wired/Wireless Advanced Networking (NEW2AN), 2004.
9 Hitoshi Asaeda, Musfiq Rahman, and Yoshihiro Toyama, “Structuring Proactive Secret Sharing in Mobile Ad-hoc Networks", Proc. IEEE ISWPC, January 2006.
10 GSR Emil Selvan, Dr. M. Suganthi, P Jeni, KA Krishna Priya, “Detection of Compromised Nodes in Mobile Ad-Hoc Networks”, Journal of Computational Information Systems, pp 1823-1829, 2011.
11 S.M. Sarwarul Islam Rizvi, Zinat Sultana, Bo Sun, Md. Washiqul Islam, “Security of Mobile Agent in Ad hoc Network using Threshold Cryptography”, World Academy of Science, Engineering and Technology, 2010.
12 Sanjay Raghani, Durga Toshniwal, R. C. Joshi, “Distributed Certification Authority for Mobile Ad Hoc Networks – A Dynamic Approach”, Journal of Convergence Information Technology, Volume 2, Number 2, June 2007.
13 Keun-Ho Lee, Sang-Bum Han, Heyi-Sook Suh, “Authentication Protocol Using Threshold Certification in Hierarchical-cluster-based Ad Hoc Networks”, Journal of information science and engineering, pp 539-567, 2007.
14 R. Murugan, A. Shanmugam, “A Cluster Based Authentication Technique for Mitigation of Internal Attacks in MANET", European Journal of Scientific Research, Volume 51, Issue 3.
15 R. Murugan, A. Shanmugam, “A Timer Based Acknowledgement Scheme for Misbehavior Detection and Isolation in MANET”, International Journal of Network Security [accepted for publication]
16 Network Simulator, http://www.isi.edu/nsnam/ns
Associate Professor R. Murugan
Bannari Amman Institute of Technology - India
muruganraam75@yahoo.com
Dr. A. Shanmugam
- India