Skip to main content
Log in

Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK shceme

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

One of the specially designated versatile networks, commonly referred to as MANET, performs on the basics that each and every one grouping in nodes totally operate in self-sorting out limits. In any case, performing in a group capacity maximizes quality and different sources. Mobile ad hoc network is a wireless infra-structureless network. Due to its unique features, various challenges are faced under MANET when the role of routing and its security comes into play. The survey has exhibited that the effect of failures during the data transmission has not been considered in the present research. The majority of techniques for specially appointed systems just decides the way and transmits the information which prompts to parcel drop in the event of disappointments, therefore bringing about low reliability. A major part of the existing research has neglected the use of the rejoining processing of the root nodes network. Most of the existing techniques are based on detecting the failures but the use of path re-routing has also been neglected in the existing methods. Here, we have proposed a method of path re-routing for managing the authorized nodes and managing the keys for group in ad hoc environment. Securing Schemes, named as 2ACK and the EGSR schemes have been proposed, which may be truly interacted to most of the routing protocol. The path re-routing has the ability to reduce the ratio of dropped packets. The comparative analysis has clearly shown that the proposed technique outperforms the available techniques in terms of various quality metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Kazemi H et al (2008) MMAN—A monitor for mobile ad hoc networks: design, implementation and experimental evaluation. The Third ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2008)

  2. Bandeira Duarte OCM, Fernandes NC (2009) An efficient group key management for secure routing in ad hoc networks. GTA/PEE/COPPE—Universidade Federal do Rio de Janeiro Rio de Janeiro

  3. Perkins CE, Bhagwat P (1994) Highly dynamic destination sequenced distance–vector steering (DSDV) for mobile computers. ACM SIGCOMM Comput Commun Rev 24(4):234–244

    Article  Google Scholar 

  4. Tsudik G, Waidnerand M, Steiner M (2000) Key agreement in dynamic peer groups. IEEE Trans Distrib Syst Parallel Syst 11(8):769–780

    Article  Google Scholar 

  5. Clausen T, Jacquet P (2003) Optimized link state routing protocol (OLSR). RFC 3626

  6. Tan CH, Teo JCM (2005) Energy-efficient and scalable group key agreement for large ad hoc networks. In 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (PE-WASUN’05), pp 114–121

  7. Safavi-Naini R, Luo L, Susilo W, Baek J (2006) Self-organised group key management for ad hoc networks. In ACM Symposium on Information, computer and communications security (ASIACCS’06), pp 138–147

  8. Chrisment I, Festor O, Bouassida MS (2006) Efficient group key management protocol in MANETs using the multipoint relaying technique. In: Intl. Conference on Networking, Intl. Conference on Mobile Communications, Intl. Conference on Systems and Learning Technologies (ICN/ICONS/MCL 2006), pp 64–71

  9. Niu Q (2007) Study and implementation of a improved group key protocol for mobile ad hoc networks. In: 8th ACIS International Conference on artificial intelligence, parallel/distributed computing, software engineering and networking (SNPD 2007) 1:304–308

  10. Konstantinou E (2008) Cluster-based group key agreement for wireless ad hoc networks. In: 3rd International Conference on reliability, security and availability (RESA 08), pp 550–557

  11. Chou KY, Chen YR, Tzeng WG (2011) An efficient and secure group key management scheme supporting frequent key updates on Pay-TV systems. In: Network Operations and Management Symposium (APNOMS), 13th Asia-Pacific

  12. Prasanna S, Balaji N, Ramya Priyadharshini M (2014) Energy and mobility based group key management in mobile ad hoc networks. Recent Trends in Information Technology (ICRTIT), 2014 International Conference

  13. Rama Krishna C, Sharma S (2015) An efficient distributed group key management using hierarchical approach with elliptic curve cryptography. Computational Intelligence and Communication Technology (CICT), 2015 IEEE International Conference

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tejpreet Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, T., Singh, J. & Sharma, S. Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK shceme. Int. j. inf. tecnol. 12, 295–301 (2020). https://doi.org/10.1007/s41870-018-0155-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-018-0155-7

Keywords

Navigation