A Survey on Comparison of Various Protocols and Key Management Issues in Manet

AUTHORS

S. Naga Mallik Raj,Department of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, AP, India
S. Neeraja,Department of Computer Science and Engineering, Pydah Engineering College, Visakhapatnam, AP, India
N. Thirupathi Rao,Department of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, AP, India
Debnath Bhattacharyya,Department of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, AP, India

ABSTRACT

Remote Network incorporates a bigger favorable position in the present correspondence application like ecological, movement, military and wellbeing perception. To understand these applications it's important to have a solid directing convention. The self-sorting out nature of MANETs makes them appropriate for some applications and henceforth, extensive exertion has been put into anchoring this kind of systems. Secure correspondence in a system is dictated by the unwavering quality of the key administration conspire, which is in charge of creating, circulating and looking after encryption/decoding keys among the hubs. In this paper different key administration plans for MANETs are talked about. This examination work proposes a novel secure Identity-Based Key Management convention making utilization of cryptographic and Information Theoretic Security.

 

KEYWORDS

MANET, steering conventions, key administration, symmetric key, hilter kilter key, amass key administration.

REFERENCES

[1]     Kenney, M. & Zysman, J. “The rise of the platform economy”. Issues in Science and Technology, 32(3), pp.61-69. (2016)
[2]     G.Singla, M. S. Sathisha, A. Ranjan, S. D., and P. Kumara, "Implementation of protected routing to defend byzantine attacks for MANET’s," International Journal of Advanced Research in Computer Science, vol. 3, pp. 109, (2012).
[3]     G.Singla and P. Kaliyar, "A Secure Routing Protocol for MANETs Against Byzantine Attacks," Computer Networks & Communications (NetCom), Lecture Notes in Electrical Engineering, vol. 131, pp. 571-578, (2013). DOI: 10.1007/978-1-4614-6154-8_56(CrossRef)(Google Scholar)
[4]     X.Lv and H. Li, "Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks," Information Security, IET, Vol. 7, (2013). DOI: 10.1049/iet-ifs.2010.0314(CrossRef)(Google Scholar)
[5]     S.a.A.k.G, H.o.d.R.m, and S. sharma, "A Comprehensive Review of Security Issues in Manets," International Journal of Computer Applications Vol. 69 (2013).DOI: 10.5120/12097-8277(CrossRef)(Google Scholar)
[6]     Balasubramanian A., Misha, S. and Sridhar, R.(2004). “A Hybrid approach to key management for enhanced security in ad hoc networks”. Technical report, University at Buffalo,NY, USA.
[7]     Balasubramanian A., Misha, S. and Sridhar, R.(2005), “Analysis of a hybrid key management solution for ad hoc networks”. IEEE WCNC’05. Vol. 4, pp.2082-2087.DOI:10.1109/WCNC.2005.1424839(CrossRef)(Google Scholar)
[8]     Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar and Malrey Lee,” Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges”, Sensors (2012), 12, pp.650-685.

CITATION

  • APA:
    Raj,S.N.M.& Neeraja,S.& Rao,N.T.& Bhattacharyya,D.(2019). A Survey on Comparison of Various Protocols and Key Management Issues in Manet. International Journal of Security Technology for Smart Device, 6(1), 1-8. http://dx.doi.org/10.21742/IJSTSD.2019.6.1.01
  • Harvard:
    Raj,S.N.M.and Neeraja,S.and Rao,N.T.and Bhattacharyya,D.(2019). "A Survey on Comparison of Various Protocols and Key Management Issues in Manet". International Journal of Security Technology for Smart Device, 6(1), pp.1-8. doi:http://dx.doi.org/10.21742/IJSTSD.2019.6.1.01
  • IEEE:
    [1]S.N.M.Rajand S.Neerajaand N.T.Raoand D.Bhattacharyya, "A Survey on Comparison of Various Protocols and Key Management Issues in Manet". International Journal of Security Technology for Smart Device, vol.6, no.1, pp.1-8, Nov. 2019
  • MLA:
    Raj S. Naga Mallikand Neeraja S.and Rao N. Thirupathiand Bhattacharyya Debnath. "A Survey on Comparison of Various Protocols and Key Management Issues in Manet". International Journal of Security Technology for Smart Device, vol.6, no.1, Nov. 2019, pp.1-8, doi:http://dx.doi.org/10.21742/IJSTSD.2019.6.1.01

ISSUE INFO

  • Volume 6, No. 1, 2019
  • ISSN(p):2205-8451
  • ISSN(o):2207-4244
  • Published:Nov. 2019

DOWNLOAD