Issuu Home PageThe Issuu logo, two concentric orange circles with the outer one extending into a right angle at the top leftcorner, with "Issuu" in black lettering beside it
Sign up
FeaturesFullscreen sharingEmbedDigital SalesStatisticsArticlesSocial PostsTeams
Pricing
DesignersMarketersSocial Media ManagersPublishersUse Cases
ResourcesBlogHelp CenterWebinars
Features
Fullscreen sharingEmbedDigital SalesStatisticsArticlesSocial PostsTeams
Pricing
DesignersMarketersSocial Media ManagersPublishersUse Cases
ResourcesBlogHelp CenterWebinars
Log in
Sign up

Document details

AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE OF ENCRYPTION ON MAC LA

Published on Dec 13, 2018

Programming
IJNSA Journal
About

Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For t

Advertisement

Articles from AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE OF ENCRYPTION ON MAC LA

Read article

1 min read

AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE OF ENCRYPTION ON MAC LAYER

Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.

More from IJNSA Journal

Advertisement

Read more

Advertisement

Suggestions for you

Advertisement

Go explore
Deutsch
de
Issuu
Create once. Share everywhere.
Issuu Inc.
  • Company
    • Company - About us
    • Company - Careers
    • Company - Blog
    • Company - Webinars
    • Company - Press
  • Issuu Features
    • Issuu Features - Fullscreen Sharing
    • Issuu Features - Visual Stories
    • Issuu Features - Articles
    • Issuu Features - Embed
    • Issuu Features - Statistics
    • Issuu Features - SEO
    • Issuu Features - InDesign Integration
    • Issuu Features - Cloud Storage Integration
    • Issuu Features - GIFs
    • Issuu Features - AMP Ready
    • Issuu Features - Add Links
    • Issuu Features - Teams
    • Issuu Features - Video
    • Issuu Features - Web-ready Fonts
  • Solutions
    • Solutions - Designers
    • Solutions - Content Marketers
    • Solutions - Social Media Managers
    • Solutions - Publishers
    • Solutions - PR / Corporate Communication
    • Solutions - Students & Teachers
    • Solutions - Salespeople
    • Solutions - Use Cases
  • Industries
    • Industries - Publishing
    • Industries - Real Estate
    • Industries - Sports
    • Industries - Travel
  • Products & Resources
    • Products & Resources - Plans
    • Products & Resources - Partnerships
    • Products & Resources - Developers
    • Products & Resources - Digital Sales
    • Products & Resources - Elite Program
    • Products & Resources - Publisher Directory
    • Products & Resources - Redeem Code
    • Products & Resources - Support
Explore Issuu Content
    • Arts & Entertainment
    • Business
    • Education
    • Family & Parenting
    • Food & Drink
    • Health & Fitness
    • Hobbies
    • Home & Garden
    • Pets
    • Religion & Spirituality
    • Science
    • Society
    • Sports
    • Style & Fashion
    • Technology & Computing
    • Travel
    • Vehicles
Terms Privacy DMCA Accessibility Do Not Sell My Info
Issuu on Issuu Issuu on Facebook Issuu on Linkedin Issuu on Pinterest Issuu on Twitter Issuu on Instagram