Abstract

The performance of Mobile Ad hoc Network (MANET) becomes questionable in highly roving and mission critical application like military operation. Secur ity measures like encryption, authentication, digit al signature has been proposed for MANET. However all those mechanisms need some kind of static infrastructure and it is extremely difficult to imp lement such an infrastructure throughout the milita ry mission. Therefore in this work, various zones in m ilitary operation is identified and Zone A is respo nsible for implementing robust security measures, Zone B a nd Zone C are identified to be at highly hostile an d time critical environment. Therefore usage of highl y complex security procedures at zone B & C may delay the operation to the extent of failure of the missi on. Hence in this study, a lightweight vigilant pro cedure that suits the circumstances of Zone B & C is propo sed, it has the capability of detecting the malicio us entrant in the routing path. Moreover, it works eit her independently or dependently with the routing protocols like AODV based on the need. The proposed method has been compared with various successful security measures in Ad-hoc network and the results shows that the proposed method is very useful in adapting to the conditions of zone B & C.

Highlights

  • INTRODUCTIONIt is impossible to establish the wired network in the military missions because mostly it is

  • It is impossible to establish the wired network in the military missions because mostly it isAd-hoc network is an infrastructure less network performed unanticipated in the unknown territory.which suits on-the-go deployment

  • In this work, various zones in military operation is identified and Zone A is responsible for implementing robust security measures, Zone B and Zone C are identified to be at highly hostile and time critical environment

Read more

Summary

INTRODUCTION

It is impossible to establish the wired network in the military missions because mostly it is. The communication ranges of This scenario requires specially designed these devices are limited as well With all this routing protocols to perform route discoveries in limitations, there are situations where adhoc network dynamically changing topology. Most of the on-demand routing protocols follow the route discovering phase initially to search an efficient path to the destination node by broadcasting the route discovery packets into the network. This makes the reactive routing protocols more suitable for highly mobile and on-the-fly networks. The MANET should include lightweight mechanism to perform security check other than implementing the complex security procedures

PROBLEM DEFINITION
Security Breaches
Secure Routing
EXISTING PROTOCOL
PROPOSED VIGILANT PROCEDURE
EXPERIMENTAL RESULTS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.