Mobile Ad Hoc Network for Security Enhancement
Title | Mobile Ad Hoc Network for Security Enhancement |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Seetharaman, R., Subramaniam, L.Harihara, Ramanathan, S. |
Conference Name | 2019 2nd International Conference on Power and Embedded Drive Control (ICPEDC) |
Keywords | Ad Hoc Network Security, ad hoc on-demand distance vector routing protocol, advanced encryption standard, AODV, compositionality, cryptography, decryption processes, Encryption, game theoretical approach, game theory, hackers node, identification process, MANET, Message Digest 5, Metrics, mobile ad hoc network, mobile ad hoc networks, private key, proactive method, pubcrawl, Public key, reactive method, Resiliency, Routing protocols, Secure Hashing Algorithm, security enhancement, telecommunication security |
Abstract | This project enhances the security in which Ad Hoc On-Demand Distance Vector (AODV) routing protocol for MANETs with the game theoretical approach. This is achieved by using public key and private key for encryption and decryption processes. Proactive and reactive method is implemented in the proposed system. Reactive method is done in identification process but in proactive method is used to identify the nodes and also block the hackers node, then change the direction of data transmission to good nodes. This application can be used in military, research, confidential and emergency circumferences. |
DOI | 10.1109/ICPEDC47771.2019.9036648 |
Citation Key | seetharaman_mobile_2019 |
- MANET
- telecommunication security
- security enhancement
- Secure Hashing Algorithm
- Routing protocols
- Resiliency
- reactive method
- Public key
- proactive method
- private key
- mobile ad hoc networks
- mobile ad hoc network
- Metrics
- Message Digest 5
- pubcrawl
- identification process
- hackers node
- game theory
- game theoretical approach
- encryption
- decryption processes
- Cryptography
- Compositionality
- AODV
- advanced encryption standard
- ad hoc on-demand distance vector routing protocol
- Ad Hoc Network Security