Security in MANET Routing Table from DOS Attack Using Cryptography Model

Parameswaran T., Dr. PalaniSamy C, Elankathir .E

Abstract: A mobile ad hoc network (MANET) is number of mobile nodes forming a temporary network. The mobile nodes are connected by wireless links to form a dynamic topology creation. The nodes are free to move randomly. As nodes travel often, it won’t be having an unchanging infrastructure as a result it is unsafe and will be inclined by various attacks. Each node has a finite interaction range, which will be behaves as a router to communicate the packets to another node. The main problem in MANET is that, the routing tables which consists of each neighbour node information which maintained by the each node for the dynamic topology creation which is insecure. So to overcome this drawback, an optimized FMNK (Finger print Minutiae point non-invertible Key) algorithm is produced utilizing Biometric image models are introduced which can afford security and authentication. An optimized FMNK-AES-256(Finger print non invertible key Advance Encryption Standard) encryption algorithm is being introduced to encrypt the information applying a key to increase the security in MANET. In MANETs, performance may decrease when the networks size is beyond a certain threshold. As a result, when the network’s size is small, many routing algorithms perform well. A clustering structure improves the network’s scalability and fault tolerance, and reduction of communication overheads.

Keywords: MANET, FMNK, Biometrics, Fingerprint Minutiae, Inter/Intra cluster Routing, CBR, Authentication, Security.

Title: Security in MANET Routing Table from DOS Attack Using Cryptography Model

Author: Parameswaran T., Dr. PalaniSamy C, Elankathir .E

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Research Publish Journals

Vol. 3, Issue 4, October 2015 – December 2015

Citation
Share : Facebook Twitter Linked In

Citation
Security in MANET Routing Table from DOS Attack Using Cryptography Model by Parameswaran T., Dr. PalaniSamy C, Elankathir .E