An Improved Weighted Clustering for Ad-hoc Network Security New

Authors

  • Verma BK Dept. of Computer Science & Engineering, Truba Group of Institute Bhopal MP, India
  • Kumar B Director, JSPM's Jayawant Technical Campus Pune, INDIA

Keywords:

Ad Hoc Network, Clustered Routing, Implementation, Simulation, Performance Evaluation

Abstract

Wireless network technology is most frequently used network technology. A number of variants are available on the basis of traditional wireless networking such as WSN, WMN, MANET and others. In all the variants of wireless networks routing plays the essential role. Additionally the attackers are mainly targeting the routing strategies for performing the malicious activities. In order to secure the wireless ad hoc network a new kind of security system is proposed in this presented paper. The proposed security architecture provides the security against the malicious attackers namely black-hole, wormhole, grey-hole and DDOS attacks. Additionally able to improve the performance of network in normal conditions as well as under attack conditions. The given paper includes the proposed system design and the concepts that are help to support the proposed security infrastructure

References

Emmanouil A. Panaousis, LevonNazaryan, Christos Politis, “Securing AODV against Wormhole Attacks in Emergency MANET Multimedia Communications”, Mobimedia, London, U.K., Vol - 09, pp (7-9), Sept 2009.

F. Nait-Abdesselam, B. Bensaou, and T. Taleb, “Detecting and avoiding wormhole attacks in wireless ad hoc networks”, IEEE Communications Magazine, vol. 46, no. 4, pp. (127–133), April 2008.

Pratik Gite& Sanjay Thakur, “Different Security Issues Over MANET”, International Journal of Computer Science Engineering and Information Technology, Research Vol. 3, Issue 1, pp. (233-238), Mar 2013.

Pankaj Solanki, Deepak Shukla, “Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms”, International Journal Of Engineering And Computer Science, Vol. - 3, Issue 2, pp. (3884-3890), February 2014.

Ping Yia, , YafeiHouc, YipingZhongb, ShiyongZhangb, ZhoulinDaib, “Flooding attack and defence in Ad hoc networks”, Journal of Systems Engineering and Electronics, Vol. 17, Issue 2, pp. (410-416), June 2006.

Downloads

Published

2015-03-31

How to Cite

[1]
B. K. Verma and B. Kumar, “An Improved Weighted Clustering for Ad-hoc Network Security New”, Int. J. Comp. Sci. Eng., vol. 3, no. 3, pp. 51–55, Mar. 2015.

Issue

Section

Research Article