Open Access   Article Go Back

An Improved Weighted Clustering for Ad-hoc Network Security New

Basant Kuamr Verma1 , Binod Kumar22

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-3 , Page no. 51-55, Mar-2015

Online published on Mar 31, 2015

Copyright © Basant Kuamr Verma , Binod Kumar2 . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Basant Kuamr Verma , Binod Kumar2, “An Improved Weighted Clustering for Ad-hoc Network Security New,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.51-55, 2015.

MLA Style Citation: Basant Kuamr Verma , Binod Kumar2 "An Improved Weighted Clustering for Ad-hoc Network Security New." International Journal of Computer Sciences and Engineering 3.3 (2015): 51-55.

APA Style Citation: Basant Kuamr Verma , Binod Kumar2, (2015). An Improved Weighted Clustering for Ad-hoc Network Security New. International Journal of Computer Sciences and Engineering, 3(3), 51-55.

BibTex Style Citation:
@article{Verma_2015,
author = {Basant Kuamr Verma , Binod Kumar2},
title = {An Improved Weighted Clustering for Ad-hoc Network Security New},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2015},
volume = {3},
Issue = {3},
month = {3},
year = {2015},
issn = {2347-2693},
pages = {51-55},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=419},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=419
TI - An Improved Weighted Clustering for Ad-hoc Network Security New
T2 - International Journal of Computer Sciences and Engineering
AU - Basant Kuamr Verma , Binod Kumar2
PY - 2015
DA - 2015/03/31
PB - IJCSE, Indore, INDIA
SP - 51-55
IS - 3
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2696 2543 downloads 2523 downloads
  
  
           

Abstract

Wireless network technology is most frequently used network technology. A number of variants are available on the basis of traditional wireless networking such as WSN, WMN, MANET and others. In all the variants of wireless networks routing plays the essential role. Additionally the attackers are mainly targeting the routing strategies for performing the malicious activities. In order to secure the wireless ad hoc network a new kind of security system is proposed in this presented paper. The proposed security architecture provides the security against the malicious attackers namely black-hole, wormhole, grey-hole and DDOS attacks. Additionally able to improve the performance of network in normal conditions as well as under attack conditions. The given paper includes the proposed system design and the concepts that are help to support the proposed security infrastructure

Key-Words / Index Term

ad hoc network, clustered routing, implementation, simulation, performance evaluation

References

[1] Emmanouil A. Panaousis, LevonNazaryan, Christos Politis, “Securing AODV against Wormhole Attacks in Emergency MANET Multimedia Communications”, Mobimedia, London, U.K., Vol - 09, pp (7-9), Sept 2009.
[2] F. Nait-Abdesselam, B. Bensaou, and T. Taleb, “Detecting and avoiding wormhole attacks in wireless ad hoc networks”, IEEE Communications Magazine, vol. 46, no. 4, pp. (127–133), April 2008.
[3] Pratik Gite& Sanjay Thakur, “Different Security Issues Over MANET”, International Journal of Computer Science Engineering and Information Technology, Research Vol. 3, Issue 1, pp. (233-238), Mar 2013.
[4] Pankaj Solanki, Deepak Shukla, “Detection and Prevention of Black Hole Attack To Improve Network Performance By Using Fidelity and ECARP Algorithms”, International Journal Of Engineering And Computer Science, Vol. - 3, Issue 2, pp. (3884-3890), February 2014.
[5] Ping Yia, , YafeiHouc, YipingZhongb, ShiyongZhangb, ZhoulinDaib, “Flooding attack and defence in Ad hoc networks”, Journal of Systems Engineering and Electronics, Vol. 17, Issue 2, pp. (410-416), June 2006.