A Novel Security Authentication Analysis on Manets Networks
Main Article Content
Abstract
Ad hoc networks are a collection of nodes that are connected to rapidly changing topologies via a wireless medium. Attacks on protocols of ad-hoc network routing disturb network performance and solution reliability. We present briefly the most common protocols that are followed by on-demand approaches based on the table and source. The combined performance of the proposed solutions and ad hoc network parameters is demonstrated by stable protocols. The inherent characteristics make it an ideal choice in military and civil communication.Such types of networks' main performance constraints are due to security threats due to complex topology and the absence of centralized supervision. The normal functionality of the network is negatively affected by passive and active attacks. The network traffic and network nodes are monitored by passive attackers. Active attacks such as Blackhole attackers can partially or entirely drop packets from the network. A secure protocol can mask path, source and destination identities and locations, to ensure safety and privacy in the event of attacks by intruders.Therefore, this paper introduces a route selection method for MANET, which improves source, destination and route security features against passive and specified assaults. The method developed division the whole communication area dynamically into different zones and selects a position as a temporary destination from the divided zones. The position-approximate node is chosen as the random sponsor node and data is transmitted via random forwarder node with GPSR. The method is anonymous to the nodes both in terms of identity and location. Methods to prevent timing attacks are also proposed.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.