Secure Protocol and Signature Based Intrusion Detection for Spontaneous Wireless AD HOC Network?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 5)Publication Date: 2014-05-30
Authors : Nikhil Varghane; Bhakti Kurade;
Page : 758-768
Keywords : public key; private key; cryptography; secure protocol; spontaneous network; wireless ad hoc networks; peer to peer network; signature based detection; intrusion detection;
Abstract
Network security become important aspect in wireless network creation &wireless communication so we proposed a complete independent self-configured network creation there is no need any fixed infrastructure as well as no need any central administrator to handle the services and share the secure data and there is no need any external support for handling the functionality of the network. Proposed a secure protocol for spontaneous wireless ad hoc networks which uses a hybrid public, private key scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. The protocol offers Network creation, protocol messages, and network management communication intrusion detection. We presenting self-configured secure protocol that is able to create the network and share networks secure services. The network allows sharing resources and new services among users in a secure environment. Likewise In this paper we focus on intrusion detection in wireless networks and here we used signature detection technique to trace the intruders we also investigate a relationship between the probability of detecting an intrusion and the number of nodes that must participate in the process of detecting intrusions. Our proposal has been implemented in order to test the protocol procedure and working. Finally, we compare the protocol with other spontaneous ad hoc network protocols in order to highlight its features and we provide a security analysis of the system. A Spontaneous ad-hoc network is a complete self-configured secure protocol which is able to create the network and share secure services without any previous setup. The network permits sharing resources and offering new services among users in a securely. The protocol contains all functionality required to operate without any outer support. Design of a protocol permits the creation and management of a spontaneous wireless ad hoc network
Other Latest Articles
- Fast and Robust Method for Nuclei segmentation in Cytological Images of Breast FNAC Samples?
- A Review Data Safeguard for Cloud Computing?
- Analysis of Low Power Flip Flops using an Efficient Embedded Logic?
- Improving Classification Accuracy Using Ensemble Learning Technique (Using Different Decision Trees)?
- Energy Efficient Administrator Based Routing Approach in MANET?
Last modified: 2014-05-27 21:16:01