An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - December Issue 2013 by IJCTT Journal|
|Volume-6 Issue-1 |
|Year of Publication : 2013|
|Authors :M. Dhivyasri , P.E. Prem , A. Nithyasri|
M. Dhivyasri , P.E. Prem , A. Nithyasri"An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET"International Journal of Computer Trends and Technology (IJCTT),V6(1):15-18 December Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- -An ad hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. In our network to using a movable nodes from one place to another, that time the attacker to hack the data on network. The Diffie-Hellman (DH) Key Exchange is one of the more popular and interesting methods of key distribution. It is a public-key cryptographic system whose sole purpose is for distributing keys. By the Diffie- Hellman key method the source’s to use the separate keys for the each user in network, using these key the source node will transmit the data for destination. The key distribution to sensor nodes is done by means of two layer process. This paper proposes a key distribution scheme, based on intrusion detection method for using a data transmission from source to destination on the network. It based high level security on their network.
 Risk-Aware Mitigation for MANET Routing Attacks, Risk-Aware Mitigation for MANET Routing Attacks, IEEE, VOL. 9, NO. 2, MARCH/APRIL 2012.
 Secure Access for MANET Using Authorization Enforcement Facility, Gowthami, Sangeetha, ICICES, 2013.
 Mohammed N., Otrok H. Wang L. Debbabi M. and Bhattacharya P., ‘Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET’ IEEE Transaction, Dependable and Secure Computing, Vol. 8, pp. 89-103, 2011.
 Marti S., Giuli T. Lai K. and Baker M.,‘Mitigating Routing Misbehavior in Mobile Ad Hoc Networks’, Proceedings of ACM Mobile Communication, pp. 255-265,2000
 Refaei M., DaSilva L. Eltoweissy M. and Nadeem T.,‘Adaptation of Reputation Management Systems to Dynamic Network Conditions in AdHoc Networks’, vol. 59,pp. 707-719, 2010.
 Teo L., Ahn G. and Zheng Y., ‘Dynamic and Risk – Aware Network Access Management’, Proceedings of Eighth ACM Symposium, Access Control Models a Technologies, pp. 217-230, 2003.
 Tseng C., Wang S. Ko C. and Levitt K.,’DEMEM: Distribute Evidence Driven Message Exchange Intrusion Detection Model For Manet Proceedings on 9th international Symposium, Recent Advances in Intrusion Detection, pp. 249-271, 2006.
Keywords:-Mobile Ad hoc Network (MANET); Intrusion Detection System; Diffie –Hellman (DH) .