Work place: Department of Computer Science & Engineering, Alpha College of Engineering & Technology, Puducherry, India
E-mail: kaviarasanr64@pec.edu
Website:
Research Interests: Computer Science & Information Technology, Information Security, Network Security, Information Systems, Information Retrieval, Information Theory, Information-Theoretic Security
Biography
R. Kaviarasan, currently working as Assistant Professor in the department of Computer Science & Engineering, Alpha College of Engineering & Technology, Puducherry. Completed his under graduate B.Tech in Information Technology from Bharathiyar College of Engineering & Technology and M.Tech Information Security from Pondicherry Engineering College under Pondicherry University.
By A. Amuthan R. Kaviarasan S. Parthiban
DOI: https://doi.org/10.5815/ijitcs.2013.10.10, Pub. Date: 8 Sep. 2013
A Mobile Ad-hoc Network (MANETs) is composed of Mobile Nodes without any infrastructure. The network nodes in MANETs, not only act as ordinary network nodes but also as the routers for other peer devices. The dynamic topology, lack of a fixed infrastructure and the wireless nature make MANETs susceptible to the security attacks. To add to that, due to the inherent, severe constraints in power, storage and computational resources in the MANET nodes, incorporating sound defense mechanisms against such attacks is also non-trivial. Therefore, interest in research of Mobile Ad-hoc NETworks has been growing since last few years. Security is a big issue in MANETs as they are infrastructure-less and autonomous. The main objective of this paper is to address some basic security concerns in EGMP protocol which is a multicast protocol found to be more vulnerable towards attacks like blackhole, wormhole and flooding attacks. The proposed technique uses the concepts of certificate to prevent these attacks and to find the malicious node. These attacks are simulated using NS2.28 version and the proposed proactive technique is implemented. The following metrics like packet delivery ratio, control overhead, total overhead and End to End delay are used to prove that the proposed solution is secure and robust.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals