Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 328))

  • 2254 Accesses

Abstract

Security is the main challenge in MANETs. The Key management scheme is crucial part of security which is important in MANETs. Authentication with key generation and distribution is a complicated task. In this paper we introduce an ILCRP- improved Location aided Cluster based Routing Protocol with Key Management scheme to make ILCRP secure. This Paper aims to provide better security with ILCRP protocol using Quantum Key Distribution. Quantum key distribution is used to generate a secure communication among the nodes. The ILCRP is a stable clustering protocol and appropriate for large number of nodes where all the nodes are enabled with GPS to achieve higher packet delivery ratio. Simulation result shows the demonstration of ILCRP with ILCRP-IDS in terms of ratio of packet delivery, delay required for an end to end communication and consumption of energy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Iwata, A., Chiang, C., Pei, G., Gerla, M., Chen, T.: Scalable routing strategies for ad hoc wireless networks. IEEE J. Select Areas Communication 17(8), 1369–1379 (1999)

    Article  Google Scholar 

  2. Mangai, S.V., Tamilarasi, A.: A new approach to geographic routing for location aided cluster based MANETs. EURASIP Journal on Wireless Communications and Networking (2011)

    Google Scholar 

  3. Brutch, P., Ko, C.: Challenges in Intrusion Detection for Ad Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, January 28 (2003)

    Google Scholar 

  4. Wrona, K.: Distributed Security: Ad Hoc Networks & Beyond. In: PAMPAS Workshop, London, September 16-17 (2002)

    Google Scholar 

  5. Sterne, D., et al.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), pp. 57–70 (March 2005)

    Google Scholar 

  6. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proc of the 6th International Conference on Mobile Computing and Network (MobiCom), pp. 275–283 (2000)

    Google Scholar 

  7. Albers, P., Camp, O., Percher, J., Jouga, B., Me, L., Puttini, R.: Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In: Proceedings of the 1st International Workshop on Wireless Information Systems (WIS 2002), pp. 1–12 (April 2002)

    Google Scholar 

  8. Albers, P., Camp, O., Percher, J.M., Jouga, B., Puttini, R.: Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In: Proceedings of the First International Workshop on Wireless Information Systems, WIS 2002 (2002)

    Google Scholar 

  9. Kachirski, O., Guha, R.: Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS 2003). IEEE (2003)

    Google Scholar 

  10. Kachirski, O., Guha, R.: Intrusion detection using mobile agents in wireless ad hoc networks. In: Proceedings of the IEEE Workshop on Knowledge Media Networking, pp. 153–158. IEEE Computer Society, Washington, DC (2002)

    Chapter  Google Scholar 

  11. Sun, B., Wu, K., et al.: Zone-Based Intrusion Detection System for Mobile Ad Hoc Networks. International Journal of Ad Hoc and Sensors Wireless Network (2003)

    Google Scholar 

  12. Huang, Y., Fan, W., et al.: Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. In: Proc of 23rd IEEE International Conference on Distributed Computing System (ICDCS), pp. 478–487 (2003)

    Google Scholar 

  13. Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003), pp. 135–147 (October 2003)

    Google Scholar 

  14. Tseng, C.-Y., Balasubramayan, P., et al.: A Specification-Based Intrusion Detection System for AODV. In: Proc of the ACM Workshop on Secure in Ad Hoc and Sensor Network, SASN (2003)

    Google Scholar 

  15. Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.N.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 249–271. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Choon, O.T.: Grid-based intrusion detection system. IEEE (2003)

    Google Scholar 

  17. Guha, R., Kachirski, O., et al.: Case-Based Agents for Packet-Level Intrusion Detection in Ad Hoc Networks. In: Proc. of 17th International Symposium on Computer & Info Science, pp. 315–230 (2002)

    Google Scholar 

  18. Smith, A.B.: An Examination of Intrusion Detection Architecture for Wireless Ad Hoc Networks. In: Proceeding of 5th National Colloquium for Information Systems Security Education (2001)

    Google Scholar 

  19. Sterne, D., Lawler, G.: A dynamic intrusion detection hierarchy for MANETs. In: Proceedings of the 32nd international conference on Sarnoff Symposium, SARNOFF 2009. IEEE Press, Piscataway (2009)

    Google Scholar 

  20. Nakkeeran, R., Albert, T.A., Ezumalai, R.: Agent Based Efficient Anomaly Intrusion Detection System in Ad hoc networks. IACSIT International Journal of Engineering and Technology 2 (February 2010)

    Google Scholar 

  21. Schulter, A., Reis, J.A., Koch, F., Westphall, C.B.: A Grid-based Intrusion Detection System. In: Proceedings of the International Conference on Networking, International Conference on Systems. IEEE Computer Society (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yogita Wankhade .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wankhade, Y., Dhamdhere, V., Vidhate, P. (2015). Key Management with Improved Location Aided Cluster Based Routing Protocol in MANETs. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_76

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12012-6_76

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12011-9

  • Online ISBN: 978-3-319-12012-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics