Abstract-Mobile ad hoc networks (MANETs) are a collection of wireless mobile devices with restricted broadcast range and resources. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both from efficiency and security point of view. This paper presents a proficient and secure routing, based on asymmetric authentication using key exchange approach (KEA). The proposed mechanism ensures secure routing and quality of service in MANETs and minimizes the network overhead. The KEA mechanism can be effectively used to develop a new routing protocol for Mobile Adhoc Networks which will provide maximum security against all kinds of attacks. In this paper, KEA is compared with other secure routing protocols like EEACK, AODV, and ARIADANE, to evaluate the efficiency of KEA in Ad Hoc Networks. The empirical results show that there is an increase of 20% packet delivery ratio and a reduction of 10% routing overhead.
-This paper describes the design and implementation of a novel 802.11-based self-organizing hierarchical ad-hoc wireless network (SOHAN), and presents some initial experimental results obtained from a proof-of-concept prototype. The proposed network has a three-tier hierarchy consisting of low-power mobile nodes (MNs) at the lowest layer, forwarding nodes (FNs) with higher power and multi-hop routing capability at the middle layer, and wired access points (APs) without power constraints at the highest layer. Specifics of new protocols used for bootstrapping, node discovery and multi-hop routing are presented, and overall operation of the complete hierarchical ad-hoc network is explained. A prototype implementation of the SOHAN network is outlined in terms of major hardware and software components, and initial experimental results are given.
<p align="justify"> Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect in MANETs. This paper proposes a security improvisation based on a Node Trust Prediction Approach (NTPA). NTPA aims to prevent the interference of an anomalous node in a MANET. There by improving the <strong><em>security and data delivery output</em></strong>. The NTPA calculates the node trust prediction by evaluating the four most frequent actions that are performed by a node in the communication process. <em>Node authorization </em>is a key aspect in the evaluation of an ad hoc network’s security. In the proposed method, we monitor the <em>valid</em> and <em>Invalid Authorization </em>of a node. Data delivery reliability is measured with S<em>uccess of Packet delivery </em>and <em>Loss or Drop of packets. </em>In this paper, NTPA is compared with SAR(Security-Aware Routing) and AODV (Adhoc on-Demand Distance Vector), to evaluate the efficiency in an adhoc networks. The empirical results shows that there is an increase of 25% packet delivery and a 40% reduction in routing overhead. <strong></strong></p>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.