SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Similar documents
Mobile ad hoc networks Various problems and some solutions

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Engineering and Research Development

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Overview of Challenges in VANET

A Secure Routing Protocol for Wireless Adhoc Network Creation

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme

Network Security Issues and Cryptography

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

A Robust Trust Aware Secure Intrusion Detection for MANETs

Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Energy Efficient EE-DSR Protocol for MANET

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Performance Evaluation of Various Routing Protocols in MANET

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

Figure 1. Clustering in MANET.

Identifying Black hole attack using Divide and Conquer Algorithm in Mobile Adhoc Network

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

A Study on Issues Associated with Mobile Network

Considerations about the Architecture Solutions for PKI in Ad-hoc-Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Sybil Attack Detection in Mobile Adhoc Network

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

ANALYSIS AND DESIGN OF PROTOCOL FOR ENHANCED SELFISH ROUTING SCHEME

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Cluster Based Group Key Management in Mobile Ad hoc Networks

Overview. SSL Cryptography Overview CHAPTER 1

Survey on Multicast Routing Protocols in MANETs

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Introduction and Statement of the Problem

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

A Proposed Method for Cryptography using Random Key and Rotation of Text

Secure Data Transmission in MANETS Using ELIPTIC Curve Cryptography

LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

SECURITY BASED WEIGHTED CLUSTER ROUTING IN MANET

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number

A Survey - Energy Efficient Routing Protocols in MANET

City, University of London Institutional Repository. This version of the publication may differ from the final published version.

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Performance Analysis and Enhancement of Routing Protocol in Manet

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

MODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING

ISSN Vol.04,Issue.05, May-2016, Pages:

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Performance Evaluation of MANET through NS2 Simulation

Lecture III : Communication Security Mechanisms

Security in Mobile Ad-hoc Networks. Wormhole Attacks

ASurveyonTopologybasedReactiveRoutingProtocolsinVanets

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Privacy Protection over Network Communication in Manet

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

(2½ hours) Total Marks: 75

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

Multi-metrics based Congestion Control protocol in Wireless Sensor Network

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Mitigating Superfluous Flooding of Control Packets MANET

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

SUMMERY, CONCLUSIONS AND FUTURE WORK

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Webpage: Volume 4, Issue VI, June 2016 ISSN

SURVEY: Reputation and Trust Management in VANETs

A NOVEL CRYPTOGRAPHICAL SCHEME FOR MOBILE AD-HOC NETWORK SECURITY

Simulation Based Performance Analysis of DSDV, OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2

Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)

Steganography using MATLAB

Simulation on Agent-based Onion Routing Network *

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

AVC College of Engineering, Mayiladuthurai, India

Transcription:

International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6 ISSN Print: 0976-6464 and ISSN Online: 0976-6472 IAEME Publication SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS S. Nithya Assistant Professor, Department of ECE, KPR Institute of Engineering and Technology, Coimbatore, Tamilnadu, India. Manipriya, Indhumathi and Madhumitha Student, Department of ECE, KPR Institute of Engineering and Technology, Coimbatore, Tamilnadu, India. ABSTRACT In Current scenario, MANET (Mobile Adhoc Networks) plays a vital role in all applications. MANET is an infrastructure less network, it sends the information through intermediate nodes. It is for security issues the intermediate nodes cannot be a trusted one. Security plays a major role, it can be provided with the help of key management. Our aim is to provide secure methods for handling cryptographic keying algorithms. Key management includes generation, distribution and maintenance. Even if lot and lot of security techniques was proposed with small circumstances. In this paper, we proposed an algorithm for the purpose of sending the data in secured way in a mobile Adhoc network. Key words: Cryptographic keys, Key Management, MANET, Nodes, Security. Cite this Article: S. Nithya, Manipriya, Indhumathi and Madhumitha, Secured Key Management Algorithm for Data Transmission in Mobile Adhoc Networks, International Journal of Electronics and Communication Engineering and Technology, 7(6), 2016, pp. 96 100. http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6 1. INTRODUCTION Mobile Adhoc network is a Self configuring network of mobile nodes connected by wireless links, to form an arbitrary topology. The network nodes are interconnected through wireless interfaces and unlike traditional networks lack specialized nodes. MANET having dynamic network topology, in which the network may change frequently. Nodes can be move around within the network but the network can also be split into many smaller networks, which can be merged with other networks. MANET having limited bandwidth than other traditional networks. This may limit the size and usage of the message. MANET use batteries as a power source. The nodes consume high power, while using complex algorithms and operations. MANET has a limited physical security. The use of wireless communication and the exposure of the network nodes increase the possibility of attacks against the networks. There are many security issues in http://www.iaeme.com/ijecet/index.asp 96 editor@iaeme.com

Secured Key Management Algorithm for Data Transmission in Mobile Adhoc Networks MANETs like secure multicasting, secure routing, and privacy aware routing. Key management is to provide secure methods for handling cryptographic approaches. The main role of key management schemes involves generation, distribution and maintenance. Cryptographic schemes involves in symmetric and asymmetric mechanisms. Figure 1 Mobile Adhoc network Symmetric encryption involves, same keys are used by the sender and the receiver. Same key is used for both encryption and decryption of the data. Asymmetric encryption uses two party key. One of the key is public and the other key is private. Public key is known by all the users and the private is used by the specific sender and the receiver. The key management service must ensure that the generated keys are securely distributed to their owners. In public-key cryptography the key distribution mechanism must guarantee that private keys are delivered only to authorized parties. In MANET there are various Key Management Schemes proposed. To secure communications in Mobile Ad Hoc Networks (MANETs), messages are often protected by encryption using a chosen cryptographic key, which, in the scenario of group communication is called the group key proposed in [1]. Multicast [2] is a communication service that provides data delivery from a source to a set of recipients, also known as multicast group. Secure group communication systems typically rely on a group key, a secret shared by all members of the group. Privacy is obtained by encrypting all data with the group key. The key management system controls access to the group key, ensuring that only authenticated members receive the key. In mobile ad hoc network, it is little difficult to establish a secure connection between the source and the destination. The malicious nodes or the devices can counterfeit identified to make fake trust relations with each other and then it slowly started attacking the mobile Adhoc network. Such nodes would drop all the data packets which is received that they need to transmit the data towards the destinations. 2. OVERVIEW OF KEY MANAGEMENT SCHEMES IN MANET Key management can be defined as a set of techniques and procedures supporting the establishment and maintenance of keying relationships between authorized parties. http://www.iaeme.com/ijecet/index.asp 97 editor@iaeme.com

S. Nithya, Manipriya, Indhumathi and Madhumitha Figure 2 Basic key management mechanisms 2.1. Cryptographic Mechansims Cryptographic mechanisms involves in encryption and decryption of data s. The process of converting plain text into cipher text is called as encryption and converting the cipher text into plain text is called as decryption. For the above two process we are in a need of secured information called as key. This key may be categorized into two types, private key and public key. Private Key is a random secret key; it uses some sort of algorithms to encrypt and to decrypt the data. Private Key plays important role in both symmetric and asymmetric cryptography. In Symmetric encryption mechanism, the sender and the receiver uses same key for encryption as well for decryption. The problem in symmetric encryption mechanisms is once if the key is missed or broken then the security is lost while exchanging the information. As in the case of asymmetric cryptography, two different mathematical mechanisms are used, based on the complexity and the length of the private key used, its security depends. 3. PROPOSED ALGORITHM The main objective of this work is to communicate securely with each other in a mobile Adhoc network. This is possible only when the key is highly protected from the hackers. This algorithm involves in four different steps as follows: 1. Secret head Selection 2. Secret algorithm Selection 3. Secret keys determination 4. Group creation 5. Sharing of keys 6. Transmission of data s 7. Share verification of keys 8. Digital Signature 9. Reconstruction of data s. http://www.iaeme.com/ijecet/index.asp 98 editor@iaeme.com

Secured Key Management Algorithm for Data Transmission in Mobile Adhoc Networks The proposed techniques are as follows. Initially, in a mobile Adhoc network many nodes are actively participated without any infrastructure mechanisms. In order to provide the security, the base station which first selects the cluster head randomly. Then the cluster head decides the intermediate nodes involved in transmitting the data from source to destination, the intermediate nodes are decided based on the traffic, Payload, battery capacity etc., The working module is classified and categorized into nine modules as mentioned above. Initially the base station can select the cluster head based on some of the parameters like traffic, battery capacity, etc., and then the secret key determination is processed and shared between the authenticated nodes in order to transmit the data in secured way. Digital signature is another secured way to transmit the data. Whenever the data is transmitted between the intermediate nodes, all the nodes which are involved in transmission of data must authenticate themselves by means of digital signature. The digital signature must be verified once it is processed. The above flow chart will explain clearly about the secured algorithm for data transmission. Figure 3 Flow chart of proposed System http://www.iaeme.com/ijecet/index.asp 99 editor@iaeme.com

S. Nithya, Manipriya, Indhumathi and Madhumitha But it cannot be communicated with the intermediate nodes in prior. Then based upon the asymmetric mechanism a pair of private protective key is generated namely PPk 1 and PPK 2. PPk 1 is a key which is shared only with the source node, intermediate nodes between source and destination and the destination node. Whereas PPK 2 is a secondary private key this is shared only between the sender and the receiver. This PPK 2 key is changed only after a particular seconds, that must be updated only between the sender and the receiver. PPk 1 is a key which is shared only with the source node, intermediate nodes between source and destination and the destination node. This is key used between the intermediate nodes, only with the help of the key the users could able to find the information where the data is come from and where we need to send next. For every transmission of data, the nodes should be verified by the digital signature. So that we could able to find secure transmission of data s. 4. RESULT In mobile Adhoc network, security plays a major role. Though various algorithms proposed they were small discrepancies present. In this paper a new methodology is proposed to transmit the data in secured manner by means of pair of protective key with a digital signature. This will transmit the data in more secured way, as we implement this type of mechanisms in military, cyber applications. By this methodology, we can secure the data in a major level in mobile Adhoc networks. REFERENCE [1] Bing Wu, Jie Wu, Yuhong Dong An efficient group key management scheme for mobile ad hoc networks Int. J. Security and Networks.Vol. 2008. [2] V. Palanisamy, P. Annadurai Secure Group Communication using Multicast Key Distribution Scheme in Ad hoc Network 2010 International Journal of Computer Applications (0975-8887) Volume 1 No. 25. [3] Valle, G. and Cerdenas, R., Overview the key Management in Ad Hoc Networks, ISSADS pp. 397 406, 2005. [4] Wu, B., Wu, J., Fernandez, E., Ilyas, M. and Magliveras, S., Secure and Efficient key Management in mobile ad hoc networks, Network and Computer Applications, Vol. 30, pp. 937-954, 2007. [5] R. Pushpa Lakshmi, A. Vincent Antony Kumar, Cluster Based Composite Key Management in Mobile Ad Hoc Networks, International Journal of Computer Applications, vol. 4- No. 7, 2010. [6] CAPKUN, S., HUBAUX, J., AND BUTTYAN, L. 2006. Mobility helps peer-to-peer security. IEEE Trans. Mobile Comput. 5, 1, 43 51. [7] ABDUL-RAHMAN, A. AND HAILES, S. 1997. A distributed tust model. In Proceedings of the ACM New Security Paradigms Workshop. [8] DAHILL, B., LEVINE, E., ROYER, E., AND SHIELDS, C. 2001. A secure routing protocol for ad hoc networks. Tech. rep. UM-CS-2001-037.University of Massachusetts, Amherst, MA. [9] S. Radha Rammohan. Anomaly Detection in Mobile Adhoc Networks (MANET) using C4.5 Clustering Algorithm. International Journal of Information Technology & Management Information System (IJITMIS), 7 (1), 2015, pp. 01-10. [10] Priyanka Yadav and Deepa Chaurse, Survey and Analysis of Security Issues in Vehicular Adhoc Network, International Journal of Electronics and Communication Engineering and Technology (IJECET), 5(3), 2016, pp. 70 78 http://www.iaeme.com/ijecet/index.asp 100 editor@iaeme.com