Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme
Title | Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Singh, E. P. |
Conference Name | 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) |
Date Published | oct |
Keywords | 2ACK scheme, ad hoc environment, Ad hoc networks, attack detection, authorized nodes, compositionality, delays, dropped packets, EGSR schemes, group capacity, GroupKeyManagement, Hybrid based PSO, information transmission, internal attacks, MANET, MANETs, Metrics, mobile ad hoc network, mobile ad hoc networks, mobile computing, Organizations, packet drop, Peer-to-peer computing, Protocols, pubcrawl, Quality metrics, Re-Routing, rejoining processing, Reliable Path, resilience, Resiliency, root nodes, Routing, Routing Protocol, Routing protocols, telecommunication channels, telecommunication network management, telecommunication security, wireless infrastructureless network |
Abstract | One of the specially designated versatile networks, commonly referred to as MANET, performs on the basics that each and every one grouping in nodes totally operate in self-sorting out limits. In any case, performing in a group capacity maximizes quality and different sources. Mobile ad hoc network is a wireless infrastructureless network. Due to its unique features, various challenges are faced under MANET when the role of routing and its security comes into play. The review has demonstrated that the impact of failures during the information transmission has not been considered in the existing research. The majority of strategies for ad hoc networks just determines the path and transmits the data which prompts to packet drop in case of failures, thus resulting in low dependability. The majority of the existing research has neglected the use of the rejoining processing of the root nodes network. Most of the existing techniques are based on detecting the failures but the use of path re-routing has also been neglected in the existing methods. Here, we have proposed a method of path re-routing for managing the authorized nodes and managing the keys for group in ad hoc environment. Securing Schemes, named as 2ACK and the EGSR schemes have been proposed, which may be truly interacted to most of the routing protocol. The path re-routing has the ability to reduce the ratio of dropped packets. The comparative analysis has clearly shown that the proposed technique outperforms the available techniques in terms of various quality metrics. |
URL | https://ieeexplore.ieee.org/document/8249058/ |
DOI | 10.1109/UEMCON.2017.8249058 |
Citation Key | singh_re-joining_2017 |
- resilience
- Organizations
- packet drop
- Peer-to-peer computing
- Protocols
- pubcrawl
- Quality metrics
- Re-Routing
- rejoining processing
- Reliable Path
- mobile computing
- Resiliency
- root nodes
- Routing
- Routing Protocol
- Routing protocols
- telecommunication channels
- telecommunication network management
- telecommunication security
- wireless infrastructureless network
- GroupKeyManagement
- ad hoc environment
- Ad hoc networks
- Attack detection
- authorized nodes
- Compositionality
- delays
- dropped packets
- EGSR schemes
- group capacity
- 2ACK scheme
- Hybrid based PSO
- information transmission
- internal attacks
- MANET
- MANETs
- Metrics
- mobile ad hoc network
- mobile ad hoc networks