November 2014
Journal of Theoretical & Applied Information Technology;11/30/2014, Vol. 69 Issue 3, p452
Academic Journal
In MANET, mobile nodes are connected without any centralized administration. Due to that, a mobile node is easily affected by means of several attacks. Due to these attacks, network is totally partitioned and more packet congestion occurs. Because of improper scheduling, congestion level of network will get increase unlimitedly. To provide an authenticity of data packets and avoiding more congestion, there is a need of secure and scheduling mechanism in networks. In this research paper, we developed a CDMA based Secure Cross layer framework for authentication and scheduling. Here the cross layer is introduced to improve the quality and lifetime of nodes as well as links. The scheduling procedure is proposed to reach the packets in a time slot manner. In authentication phase, we proposed the modified concept of RSA scheme. Here the asymmetric key is chosen. Both encryption and decryption phases are used to validate the cipher text and manipulate the plaintext according the given message. By using extensive simulation, the proposed scheme achieves better throughput, packet delivery ratio, low end to end delay and overhead than the existing schemes.


Related Articles

  • Performance Evolution of AODV under Various Routing Attack. Nath, Rajender; Sehgal, Pankaj Kumar // International Journal on Recent Trends in Engineering & Technolo;Nov2010, Vol. 4 Issue 2, p44 

    Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These characteristics tied with the growing concerns for security attacks. This paper provides simulation experiments that describe various routing attacks that are specific to...

  • Efficient Content Authentication in Ad-Hoc Networks-Mitigating DDoS Attacks. Joshi, Anuj; Agrawal, Krishna Kant; Arora, Deepak; Shukla, Shashwat // International Journal of Computer Applications;Jun2011, Vol. 23, p35 

    With the emergence of mobile ad hoc networks it is now possible to access network accessing and communicate data in an area where no fixed infrastructure exists or existing infrastructure is not available. Since in ad hoc networks, the exact copies of the same content are stored at various...

  • An enhanced Scheme for Reducing Vertical handover latency. Faisal, Mohammad; Khan, Muhammad Nawaz // International Journal of Advanced Computer Science & Application;Jan2012, Vol. 3 Issue 1, p100 

    Abstract- Authentication in vertical Hand over is a demanding research problem. Countless methods are commenced but all of them have insufficiencies in term of latency and packet loss. Standard handover schemes (MIPv4, MIPv6, FMIPv6, and HMIPv6) also practice these shortages when a quick...

  • FUZZY-BASED ROUTING SCHEME IN MOBILE AD HOC NETWORKS. JIN-LONG WANG // Intelligent Automation & Soft Computing;2012, Vol. 18 Issue 3, p297 

    In mobile ad hoc networks, mobile nodes have to communicate to each other without any infrastructure or base station. Thus, a lot of critical routing decision factors should be taken into considerations, such as reputation, reliability, availability, security, and mobility. Specially, the...

  • Target Detection System (TDS) for Enhancing Security in Ad hoc Network. Kanyal, Hoshiyar Singh; Rahamatkar, S.; Sharma, B. K.; Sharma, Bhasker // International Journal of Distributed & Parallel Systems;Sep2013, Vol. 4 Issue 5, p15 

    The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and communication is implicit to be wireless. Ad-hoc networks are collaborative in the...

  • PERFORMANCE ANALYSIS OF MANET BEFORE AND AFTER BLACK HOLE ATTACK. Bhalla, Heena // International Journal of Computer Technology & Applications;2012, Vol. 3 Issue 1, p273 

    A Mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes....

  • Performance Improvement by Dynamic Queue Management in Mobile Ad hoc Network. Yadav, Kajal; Shrivastava, Gaurav // International Journal of Computer Applications;Jun2013, Vol. 72 Issue 1-23, p14 

    Mobile Ad hoc network [MANET] consists of mobile nodes without any fixed infrastructure, communicating through wireless medium. In MANET, Congestion occurs in any intermediate nodes when data packets travel from source to destination and they incur higher packet loss rate and long delay, which...

  • Path Stability Mechanism in Mobility based AOMDV for MANETS. Savane, Vishesh D.; Kasabegoudar, Veeresh G. // International Journal of Computer Applications;Aug2013, Vol. 76 Issue 1-16, p43 

    Mobile Ad hoc Networks (MANETs) are used for providing Quality of Service (QoS) where nodes are having mobility and can travel in any random direction. There are several reactive protocols (DSDV, AODV, EBAODV, etc.) available in literatures which are suitable for MANETs based on single and...

  • Performance analysis of Black Hole Attack on Vanet's Reactive Routing Protocols. Sonia; Padmavati // International Journal of Computer Applications;Jul2013, Vol. 73 Issue 1-22, p22 

    Vehicle Ad-hoc Network is vulnerable to several attacks. One of the main attacks is the black hole attack which absorbs all the data packets in the network. In this paper, we have analyzed the performance of VANET in presence of black hole node by using different routing protocols AODV, DSR and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics