Preview

CEAACK MANET Analysis

Powerful Essays
Open Document
Open Document
1970 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CEAACK MANET Analysis
Abstract— CEAACK MANETs are vulnerable to attacks and this can be reduced by employing a cluster mechanism which ensures that packet transmission occurs without unnecessary delay. Clustering can be made effective in CEAACK MANETs by opting for a cluster head mechanism which ensures that control rests with a single powerful node within a cluster. This cluster head takes on the responsibility of routing the packets efficiently by coordinating with the base station.Cluster heads are also prone to malicious attacks and is affected more than a normal network.
In this paper we try to incorporate a new approach in CEAACK MANETs by implementing a cryptographic technique to tackle the vulnerabilities of the network. This cryptographic is highly secure
…show more content…
This unstable nature of wireless networks cannot be stated as an excuse for slack security measures .Vulnerable or not the data transmitted must maintain its integrity and the confidentiality of the sender. Authentication and authorization are the two faces of data security which otherwise can be interpreted as the integrity and confidentiality of data. This dual aspect of security is only possible with the inclusion of strong cryptographic techniques that can safeguard the transmitted data with virtually unbreakable cryptographic codes that helps the network to secure itself against …show more content…
Though the CEAACk scheme falls short where energy and delay are concerned it still makes up for these shortcomings by delivering the packets securely to the destination. These drawbacks do not play any significant role in the system throughput, which, from the graph, clearly shows that the network throughput is in fact increased when CEAACK is combined with D key.
Fig.7 PDR Comparison
Fig.8 Comparison of throughput
IX.CONCLUSION AND FUTURE ENHANCEMENT
In this research paper, we have proposed an efficient Distinct Dynamic key with CEAACK which is used to filter the attackers in the network and selects only genuine nodes for reliable data transmission.
In future, we plan to focus on issues that would help very highly secured dynamic key for future attacks like differential cryptanalysis. making it a very secure encryption process. For instance we plan to conduct a thorough investigation on how to modify this scheme to adapt to other routing schemes and open networks. Research is also planned to extend the dynamic key to advance digital signature techniques to avert all possible attacks on the network. Instead of attempting dynamic key in a simulated environment, such as NS2, plans are underway to implement the scheme in a real time environment to assess its performance and effectiveness under

You May Also Find These Documents Helpful

  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231-…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    They are numerous protocols and standards that are used for communications over networks. But only a few protocols are cryptographic in nature. Cryptographic protocols provide secure communication between two communicating entities over the insecure network. Cryptographic protocols use either symmetric or asymmetric or a combination of both the algorithm to secure the communication channel. Presented in this paper are various cryptographic protocols that provide encryption to data in transit.…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Lab 6 assignments

    • 519 Words
    • 3 Pages

    Wired Equivalent Privacy (WEP) is the most widely used Wi-Fi security algorithm in the world. Wi-Fi Protected Access(WPA) was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP standard. It was formally adopted in 2003, a year before WEP was officially retired. The most common WPA configuration is WPA-PSK (Pre-Shared Key). The keys used by WPA are 256-bit, a significant increase over the 64-bit and 128-bit keys used in the WEP system. WPA has, as of 2006, been officially superseded by WPA2. One of the most significant changes between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as a replacement for TKIP (still preserved in WPA2 as a fallback system and for interoperability with WPA).Unfortunately, the same vulnerability that is the biggest hole in the WPA armor, the attack vector through the Wi-Fi Protected Setup (WPS),…

    • 519 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Death of a Salesman

    • 636 Words
    • 3 Pages

    Things like my family and friends, as well as my personal experiences influence my values. With values come goals, like going to college and graduating and than getting a steady job. Of course people make their own goals and have their own ambitions, but a lot of times its influenced by those around you. I believe if you stick to a goal and fail, than you learn from your mistakes and do better the next time, and if you go after a goal and succeed, well that’s just the best feeling ever.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The elliptic curve parameters for cryptographic schemes should be carefully chosen with appropriate cryptographic restriction in order to resist all known attacks on the ECDLP which is believed to take exponential time.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Elliptic Curve Cryptography

    • 6355 Words
    • 26 Pages

    Over the past 30 years, public key cryptography has become a mainstay for secure communications over the Internet and throughout many other forms of communications. It provides the foundation for both key management and digital signatures. In key management, public key cryptography is used to distribute the secret keys used in other cryptographic algorithms (e.g. DES). For digital signatures, public key cryptography is used to authenticate the origin of data and protect the integrity of that data. For the past 20 years, Internet communications have been secured by the first generation of public key cryptographic algorithms developed in the mid-1970 's. Notably, they form the basis for key management and authentication for IP encryption (IKE/IPSEC), web traffic (SSL/TLS) and secure electronic mail.…

    • 6355 Words
    • 26 Pages
    Powerful Essays