The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Security Enhancement and Certificate Revocation in MANET using Position and Energy based

Monitoring,
Mobile Ad-hoc Network (MANET) has an advantage over their mobility and ease of deployment but it is vulnerable to various attacks to degrade the security in the network. Using cluster based certificate revocation with combination of both voting and non-voting based mechanism, attacker’s certificate is revocated. But this mechanism is vulnerable to the detection of false accusation in quicker time and attacks related to high energy consumption like stretch and carousel attack. To overcome this issue and to enhance the security, Cluster based scheme along with position and energy based monitoring is proposed to revocate the certificate of the attacker node by the Cluster Authority (CA) node. Guaranteed secure network services and low energy consumption of 9% and 13% is obtained after avoiding stretch and carousel attacks respectively. It increases the Quality of Service (QoS) and reduces the packet loss in the network.


[1] Al-Jaroodi J., “Routing Security in Open/Dynamic Mobile Ad Hoc Networks,” The International Arab Journal of Information Technology, vol. 4, no. 1, pp. 17-26, 2007.

[2] Arboit G., Crepeau C., Davis R., and 3= 6 183 10 13 909 = 86Threshold Energy . . J J 96 The International Arab Journal of Information Technology, Vol. 16, No. 1, January 2019 Maheswaran M., “A Localized Certificate Revocation Scheme for Mobile Ad Hoc Networks,” Ad Hoc Network, vol. 6, no. 1, pp. 17-31, 2008.

[3] Ayyasamy R. and Subramani P., “An Enhanced Certificate Authority Scheme for Authentication in Mobile Ad Hoc Networks,” The International Arab Journal of Information Technology, vol. 9, no. 3, pp. 291-298, 2012.

[4] Buttyan L. and Hubaux J., “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, 2002.

[5] Clulow J. and Moore T., “Suicide for the Common Good: A New Strategy for Credential Revocation in Self-Organizing Systems,” ACMSIGOPS Operating Systems Review, vol. 40, no. 3, pp. 18-21, 2006.

[6] Crepeau C. and Davis C., “A Certificate Revocation Scheme for Wireless Ad Hoc Networks,” in Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, pp. 54-61, 2003.

[7] Farzana T. and Babu A., “A Light Weight PLGP based Method for Mitigating Vampire Attacks in Wireless Sensor Networks,” International Journal of Engineering and Computer Science, vol. 3 no. 7, pp. 6888-6895, 2014.

[8] Ganapathy S., Vijayakumar P., Yogesh P., and Kannan A., “An Intelligent CRF Based Feature Selection for Effective Intrusion Detection,” The International Arab Journal of Information Technology, vol. 13, no. 1, pp. 44-50, 2015.

[9] Jadoon M., Madani S., Hayat K., and MahlKnecht S., “Location and Non-Location Based Ad-Hoc Routing Protocols under Various Mobility Models: A Comparative Study,” The International Arab Journal of Information Technology, vol. 9, no. 5, pp. 418-427, 2012.

[10] Kalpana G. and Punithavalli M., “Reliable Broadcasting using Efficient Forward Node Selection for Mobile Ad Hoc Networks,” The International Arab Journal of Information Technology, vol. 9, no. 4, pp. 299-305, 2012.

[11] Kef M., Chergui L., and Benmohammed M., “Self-Organization and Topology's Control for Mobile Ad-Hoc Networks,” The International Arab Journal of Information Technology, vol. 8, no. 3, pp. 414-227, 2011.

[12] Khan S., Loo K., and Din Z., “Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks,” The International Arab Journal of Information Technology, vol. 7, no. 4, pp. 435- 440, 2010.

[13] Kong J., Hong X., Yi Y., Liu J., and Gerla M., “A Secure Ad-Hoc Routing Approach Using Localized Self-Healing Communities,” in Proceedings of 6th ACM International Symposium, Mobile Ad Hoc Networking and Computing, New York, pp. 254-265, 2005.

[14] Liu W., Nishiyama H., Ansari N., Yang J., and Kato N., “Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 2, pp. 239-249, 2013.

[15] Luo H., Kong J., Zerfos P., Lu S., and Zhang L., “URSA:Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 6, pp. 1049-1063, 2004.

[16] Mauve M., Widmer J., and Hartenstein H., “A Survey on Position-Based Routing in Mobile AdHoc Networks,” IEEE Networks, vol. 15, no. 6, pp. 30-39, 2001.

[17] Mohammed Y. and Abdullah A., “Security Mechanism for Manets,” Journal of Engineering Science and Technology, vol. 4, no. 2, pp. 231- 241, 2009.

[18] Mohammed Y. and Abdullah A., “I2MANET Security Logical Specification Framework,” The International Arab Journal of Information Technology, vol. 9, no. 6, pp. 495-503, 2012.

[19] Newsome J., Shi E., Song D., and Perrig A., “The Sybil Attack in Sensor Network: Analysis & Defenses,” in Proceedings of 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, pp. 259-268, 2004.

[20] Omer K. and Lobiyal D., “Performance Evaluation of Location Update Scheme for MANET,” The International Arab Journal of Information Technology, vol. 6, no. 3, pp. 274- 282, 2009.

[21] Park K., Nishiyama H., Ansari N., and Kato N., “Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks,” in Proceedings of 71st IEEE Vehicular Technology Conferance, Taipei, pp.16-19, 2010.

[22] Pathan A., Monowar M., Rabbi M., Alam M., and Hong C., “NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks,” The International Arab Journal of Information Technology, vol. 5, no. 1, pp. 102- 107, 2008.

[23] Yi P., Dai Z., Zhong Y., and Zhang S., “Resisting Flooding Attacks in Ad Hoc Networks,” in Proceedings of International Conference on Information Technology: Coding and Computing, Las Vegas, pp. 657-662, 2005.

[24] Zapata M. and Asokan N., “Securing Ad Hoc Routing Protocols,” in Proceedings of ACM Workshop on Wireless Security, Atlanta, pp. 1- 10, 2002.

[25] Zhou L., Cchneider B., and VanRenesse R., “COCA: A Secure Distributed Online Certification Authority,” ACM Transactions. Security Enhancement and Certificate Revocation in MANET using Position ... 97 Computer Systems, vol. 20, no. 4, pp. 329-368, 2002.

[26] Zhou L. and Haas Z., “Securing Ad Hoc Networks,” IEEE Network, vol. 13, no. 6, pp. 24- 30, 1999. Karpura Dheepan received his B.E degree in Computer Science and Engineering from Adhiyamaan College of Engineering, Hosur, Anna University, Chennai, India, in 2009 and M.E degree in Computer Science and Engineering from Sona College of Technology, Salem, Anna University, Chennai, India, in 2011. He has done his Ph.D in Information and Communication Engineering from PSG College of Technology, Coimbatore, Anna University, Chennai, India in 2017. He is now working as an assistant professor in Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology, Vel Tech University, Chennai. His Current research interests are Wireless Sensor Networks, MANET, Networking and IOT.