Total views : 234

Guarding Architecture for Unattended Deployment Applications of Ad Hoc Networks: GARUDA

Affiliations

  • St. Joseph’s College of Engineering and Technology, Palai, Kottayam - 686579, Kerala, India
  • Department of Computer Application, Cochin University of Science and Technology, Kochi - 682022, Kerala, India

Abstract


Background/Objective: Human monitoring is expensive and vulnerable due to human errors. The Ad Hoc networks are used as an alternative to monitor the sensitive areas. The major drawback of the Ad Hoc network monitoring is the unattended nature of the network which makes the system susceptible to attacks by conflicting troupes. The limited battery capacity and processing power makes it difficult to implement complex cryptographic solutions to protect the network. Methods/Statistical Analysis: The proposed system brings together a general architecture called Guarding Architecture for Unattended Deployment Applications (GARUDA) for Ad Hoc network Security. A cluster-based approach is used to classify the network nodes based on functionality and priority. A key Pre-distribution technique is used to protect the key-management schema. The modified Localized Encryption and Authentication Protocol are used for hierarchical key management. The Rivest Cipher 5 (RC5) algorithm is used for encryption of sensitive data. The system has an unmanned vehicle with sensors to protect the network from attacks and report the malicious activities to the base station. Findings: The architecture was successfully implemented in wireless sensor network, set up by micaz motes. The RC5 algorithm was programmed using nesC language in micaz mote for encrypting the sensitive data. The highly confidential data can be directly sent to the base station from the vehicle unit. The absence of key exchange and presence of individual key makes the system sheltered. Applications/Improvements: The GARUDA architecture can be used in any resource constraint monitoring application of unattended nature to make it secure. The vehicle unit can resolve network problems like time synchronization and localization in ad hoc networks.

Keywords

Ad Hoc Network, LEAP, RC5 Encryption Algorithm, Security Architecture.

Full Text:

 |  (PDF views: 188)

References


  • Erdal C, Rong C. Security in wireless ad hoc and sensor networks. John Wiley; 2009. p. 109–16.
  • Fang Y, Zhu X, Zhang Y. Securing resource-constrained wireless ad hoc networks. IEEE Wireless Communications Journal. 2009 Apr; 16(2):24–30.
  • Sasi SB, Sivanandam N. A survey on cryptography using optimization algorithms in WSNs. Indian Journal of Science and Technology. 2015 Feb; 8(3). DOI: 10.17485/ijst/2015/v8i3/59585.
  • Amalarethinam DIG, Geetha JS, Mani K. Analysis and enhancement of speed in public key cryptography using message encoding algorithm. Indian Journal of Science and Technology. 2015 Jul; 8(16). DOI: 10.17485/ijst/2015/v8i16/69809.
  • Chen X, Makki K, Yen K, Pissinou N. Sensor network security: A survey. IEEE Communications Surveys and Tutorials. 2009; 11(2):52–72.
  • Hwang J, Kim Y. Revisiting random key pre-distribution for sensor networks. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’04), Washington DC: USA; 2004. p. 43–52.
  • Roberto CH, Blanca AC, Laura O. Survey on clustering techniques for mobile Ad hoc networks. Revista Facultad de Ingeniería Journal. 2007, 2(6):145–61
  • Blackshear S, Verma R. R-LEAP+: Randomizing LEAP+ key distribution to resist replay and jamming attacks. ACM Press; 2010. p. 1985–92.
  • Mottaghi S, Zahabi MR. Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes. International Journal of Electronics and Communication. 2014 Oct; 69(2):507–14.
  • Roberto CH, Blanca AC, Laura O. Survey on clustering techniques for mobile Ad hoc networks. Revista Facultad de Ingeniería Journal. 2007; 2(6):145–61.
  • Sugumar R, Imam SBS. Symmetric encryption algorithm to secure outsourced data in public cloud storage. Indian Journal of Science and Technology. 2015 Sep; 8(23). DOI: 10.17485/ijst/2015/v8i23/79210.
  • Rivest RL. The RC5 encryption algorithm. Workshop on Fast Software Encryption; 1995. p. 86–96.
  • Rivest RL. The RC5 encryption algorithm. MIT laboratory for Computer Science; 1997. p. 1–12.
  • Onel T, Onur E, Ersoy C, Delic H. Wireless sensor networks for security: issues and challengaes. Springer; 2006; 2:95–119.
  • Wan J, Suo H, Yan H, Liu J. A general test platform for cyber-physical systems: Unmanned vehicle with wireless sensor network navigation. International Conference on Advances in Engineering, Procedia Engineering. 2011; 24:123–7.
  • Madhu A, Sreekumar A. Wireless sensor network controlled vehicle navigation system and its applications. International Journal of Information Processing. 2013; 7(2):32–40.
  • Madhu A, Sreekumar A. Wireless sensor network security in military application using unmanned vehicle. International Journal of Electronics and Communication Engineering. 2014:51–8.
  • Subburaj V, Chitra K. Multi hop secure adhoc network to eradicate cooperative diversity. Indian Journal of Science and Technology. 2014 Jan; 7(2).
  • Haripriya Y, Pavani KVB, Lavanya S, Viswanatham VM. A framework for detecting malicious nodes in mobile adhoc network. Indian Journal of Science and Technology. 2015 Jan; 8(2). DOI: 10.17485/ijst/2015/v8iS2/60285.
  • Sridhar KP, Saravanan S, Sai RV. Countermeasure against side channel power attacks in cryptography devices. Indian Journal of Science and Technology. 2014 Apr; 7(4).
  • TX2B/RX2B. Toy car remote controller with five functions. Hangzhou Silan Microelectronics; 2005.
  • Healy M, Newe T, Lewis E. Wireless sensor node hardware: A review, 7th IEEE Conference on Sensors; 2008. p. 621–4.
  • TinyOS [Internet]. 2007. [Cited 2016 Apr 03]. Available from: http://www.tinyos.net.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.