Abstract
Wireless Ad hoc networks represent a form of cooperative networking through peer to peer behavior with others nodes in the networks. Hop by hop communication is default way of communication. Most of the communications are localized and interaction among local nodes requires local security provisioning. In the absence of any centralized certification authority and absence of viable localization and synchronization hardware, schematic localization and periodic refreshing proved to be a feasible solution. Several solutions have exploited GPS based localization and periodic refreshing cycles to provide a viable security solution for wireless Ad hoc networks. In this paper, we have proposed an accelerated hashing mechanism with schematic localization based on variable or multiple transmission range of few nodes. The solution has been evaluated mathematically for performance parameters like connectivity, storage overhead and computation efficiency.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
P. Khatri, S. Tapaswi, U.P. Verma, Trust evaluation in wireless ad-hoc networks using fuzzy system. Comput. Syst. Sci. Eng. 29(1), 43–50 (2014)
V.C. Gungor, G.P. Hancke, Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56(10), 4258–4265 (2009)
D.G. Padmavathi, M. Shanmugapriya, A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)
K. Sanzgiri, D. LaFlamme, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, Authenticated routing for Ad-hoc networks. IEEE J. Sel. Areas Commun. 23(3), 598–610 (2005)
I. Raza, S.A. Hussain, Identification of malicious nodes in an AODV pure Ad-hoc network through guard nodes. Comput. Commun. 31(9), 1796–1802 (2008)
J. Kim, G. Tsudik, SRDP: secure route discovery for dynamic source routing in MANETs. Ad-hoc Netw. 7(6), 1097–1109 (2009)
T.R. Andel, G. Back, A. Yasinsac, Automating the security analysis process of secure Ad-hoc routing protocols. Simul. Model. Pract. Theory 19(9), 2032–2049 (2011)
J. Von Mulert, I. Welch, W.K. Seah, Security threats and solutions in MANETs: a case study using AODV and SAODV. J. Netw. Comput. Appl. 35(4), 1249–1259 (2012)
A. Adnane, C. Bidan, R.T. de Sousa Júnior, Trust-based security for the LSR routing protocol. Comput. Commun. 36(10), 1159–1171 (2013)
S. Qazi, R. Raad, Y. Mu, W. Susilo, Securing DSR against wormhole attacks in multirate Ad-hoc networks. J. Netw. Comput. Appl. 36(2), 582–592 (2013)
S. Zhao, R. Kent, A. Aggarwal, A key management and secure routing integrated framework for mobile Ad-hoc networks. Ad-hoc Netw. 11(3), 1046–1061 (2013)
M. Mohanapriya, I. Krishnamurthi, Modified DSR protocol for detection and removal of selective black hole attack in MANET. Comput. Electr. Eng. 40(2), 530–538 (2014)
D.R. Choudhury, L. Ragha, N. Marathe, Implementing and improving the performance of AODV by receive reply method and securing it from black hole attack. Procedia Comput. Sci. 45, 564–570 (2015)
D. Das, K. Majumder, A. Dasgupta, Selfish node detection and low cost data transmission in MANET using game theory. Procedia Comput. Sci. 54, 92–101 (2015)
M.K. Dholey, G.P. Biswas, Proposal to provide security in MANET’s DSR routing protocol. Procedia Comput. Sci. 48, 440–446 (2015)
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33’0) (2000), p. 223
L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02) (ACM Press, Washington, DC, USA, 2002), pp. 41–47
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, A., Katiyar, V.K., Kumar, K. (2017). A Purely Localized Random Key Sequencing Using Accelerated Hashing in Wireless Ad-Hoc Networks. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_27
Download citation
DOI: https://doi.org/10.1007/978-981-10-3156-4_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3155-7
Online ISBN: 978-981-10-3156-4
eBook Packages: EngineeringEngineering (R0)