Академический Документы
Профессиональный Документы
Культура Документы
I. INTRODUCTION
MANET can be defined by self-properties, in which
the mobile nodes are organized in a dynamic topological
infrastructure. Due to its dynamic nature this domain is keep
attracted different engineers. But due to high mobility model
that is affected by various kinds of issues. According to
observations there are two main issues first security and
second is performance. This paper focuses on the MANET
security.
Due to study that is observed that there are a number
ofmethods and techniques are available to provide the
securityfor MANET environment. Some of them are studied
here andafter that a new approach is proposed and
implemented in thispaper. This paper provides a cluster
oriented infrastructure for monitoring and communicating the
mobile devices. The attacks on mobile ad hoc networks can
be classified into following two categories.
A passive attack does not disrupt proper operation
of the network. Attacker watches the data exchanged in
network without altering it. The requirement of privacy can
be violated if an attacker is also able to interpret the data
gathered. Discovery of passive attacks is very difficult for the
operation of the network itself. A way of preventing this kind
of problems is to use powerful encryption mechanisms to
encrypt the data being conveyed, thus making it impossible
for eavesdroppers to obtain any useful information from the
data overheard.
An active attack tries to alter or destroy the data,
thus the normal functioning of the network is disrupted.
These can beclassified into two categories external attacks
and internal attacks. External attacks are supported by nodes
that do not belong to the network. These attacks are
prevented by using standard security mechanisms such as
encryption techniquesand firewalls. In internal attacks
compromised nodes that are actually part of the network,
meanwhile the attackers are partof the network as authorized
nodes. By the property internal attacks are more severe and
difficult to detect when comparedto external attacks. Black
II. BACKGROUND
This section describes the background and previous
methodologies that are supporting our proposed work. In this
direction an important contribution is given in [3] according
the given study security is an important issue in mobile ad
hoc networks (MANETs). However, security schemes have
significant impacts on throughput. Because of 1) they need
some overhead and consume some network resources, thus
decrease throughput subsequently; 2) previous works
consider security and throughput separately in designing a
www.ijaert.org
www.ijaert.org
0Server
0 0 cluster heads
O OOOOOmobile nodes
Fig.2:The proposed network
IV. IMPLEMENTATION
This section of the given paper provides the implementation
and obtained results from the implemented simulation. NS2
network simulation which is given in this paper is based on
thebelow given simulation setup.
TABLE I
THE SIMULATION PARAMETERS
Properties
Simulation area
Number of nodes
Node type
Mobility
Link layer
Mac layer
Channel
Values
1000X1000
43
Wi-Fi
Random 2 way
LL
802_11
Wireless
Fig.5: Throughput
Fig. 3: The black hole attack
www.ijaert.org
REFERENCES
[1] A Survey of Routing Attacks and Security Measures in
Mobile Ad-Hoc Networks, SudhirAgrawal, Sanjeev Jain,
Sanjeev Shanna, JOURNAL OF COMPUTING, VOLUME
3, ISSUE I, JANUARY 2011, ISSN 2151-9617
[2] A Survey of Mobile Ad Hoc Network Attacks, PRADlP
M. JA W ANDHIY A, MANGESH M. GHONGE, DR.
M.S.AU, PROF. J.S.DESHPANDE, International Journal of
Engineering Science andTechnology, Vol. 2(9), 2010, 40634071
[3] A Joint Design for Topology and Security in MANETs
with Cooperative Communications, Quansheng Guan, F.
Richard Yu, Shengming Jiang and Victor C.M. Leung, 9781-61284-231-8/111$26.00 2011 IEEE
V. CONCLUSION
www.ijaert.org