Abstract
Security is the main challenge in MANETs. The Key management scheme is crucial part of security which is important in MANETs. Authentication with key generation and distribution is a complicated task. In this paper we introduce an ILCRP- improved Location aided Cluster based Routing Protocol with Key Management scheme to make ILCRP secure. This Paper aims to provide better security with ILCRP protocol using Quantum Key Distribution. Quantum key distribution is used to generate a secure communication among the nodes. The ILCRP is a stable clustering protocol and appropriate for large number of nodes where all the nodes are enabled with GPS to achieve higher packet delivery ratio. Simulation result shows the demonstration of ILCRP with ILCRP-IDS in terms of ratio of packet delivery, delay required for an end to end communication and consumption of energy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Iwata, A., Chiang, C., Pei, G., Gerla, M., Chen, T.: Scalable routing strategies for ad hoc wireless networks. IEEE J. Select Areas Communication 17(8), 1369–1379 (1999)
Mangai, S.V., Tamilarasi, A.: A new approach to geographic routing for location aided cluster based MANETs. EURASIP Journal on Wireless Communications and Networking (2011)
Brutch, P., Ko, C.: Challenges in Intrusion Detection for Ad Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, January 28 (2003)
Wrona, K.: Distributed Security: Ad Hoc Networks & Beyond. In: PAMPAS Workshop, London, September 16-17 (2002)
Sterne, D., et al.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), pp. 57–70 (March 2005)
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proc of the 6th International Conference on Mobile Computing and Network (MobiCom), pp. 275–283 (2000)
Albers, P., Camp, O., Percher, J., Jouga, B., Me, L., Puttini, R.: Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In: Proceedings of the 1st International Workshop on Wireless Information Systems (WIS 2002), pp. 1–12 (April 2002)
Albers, P., Camp, O., Percher, J.M., Jouga, B., Puttini, R.: Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In: Proceedings of the First International Workshop on Wireless Information Systems, WIS 2002 (2002)
Kachirski, O., Guha, R.: Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. In: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS 2003). IEEE (2003)
Kachirski, O., Guha, R.: Intrusion detection using mobile agents in wireless ad hoc networks. In: Proceedings of the IEEE Workshop on Knowledge Media Networking, pp. 153–158. IEEE Computer Society, Washington, DC (2002)
Sun, B., Wu, K., et al.: Zone-Based Intrusion Detection System for Mobile Ad Hoc Networks. International Journal of Ad Hoc and Sensors Wireless Network (2003)
Huang, Y., Fan, W., et al.: Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. In: Proc of 23rd IEEE International Conference on Distributed Computing System (ICDCS), pp. 478–487 (2003)
Huang, Y., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003), pp. 135–147 (October 2003)
Tseng, C.-Y., Balasubramayan, P., et al.: A Specification-Based Intrusion Detection System for AODV. In: Proc of the ACM Workshop on Secure in Ad Hoc and Sensor Network, SASN (2003)
Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.N.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 249–271. Springer, Heidelberg (2006)
Choon, O.T.: Grid-based intrusion detection system. IEEE (2003)
Guha, R., Kachirski, O., et al.: Case-Based Agents for Packet-Level Intrusion Detection in Ad Hoc Networks. In: Proc. of 17th International Symposium on Computer & Info Science, pp. 315–230 (2002)
Smith, A.B.: An Examination of Intrusion Detection Architecture for Wireless Ad Hoc Networks. In: Proceeding of 5th National Colloquium for Information Systems Security Education (2001)
Sterne, D., Lawler, G.: A dynamic intrusion detection hierarchy for MANETs. In: Proceedings of the 32nd international conference on Sarnoff Symposium, SARNOFF 2009. IEEE Press, Piscataway (2009)
Nakkeeran, R., Albert, T.A., Ezumalai, R.: Agent Based Efficient Anomaly Intrusion Detection System in Ad hoc networks. IACSIT International Journal of Engineering and Technology 2 (February 2010)
Schulter, A., Reis, J.A., Koch, F., Westphall, C.B.: A Grid-based Intrusion Detection System. In: Proceedings of the International Conference on Networking, International Conference on Systems. IEEE Computer Society (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wankhade, Y., Dhamdhere, V., Vidhate, P. (2015). Key Management with Improved Location Aided Cluster Based Routing Protocol in MANETs. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 328. Springer, Cham. https://doi.org/10.1007/978-3-319-12012-6_76
Download citation
DOI: https://doi.org/10.1007/978-3-319-12012-6_76
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12011-9
Online ISBN: 978-3-319-12012-6
eBook Packages: EngineeringEngineering (R0)