Secured and anonymous data transmission in Manet environment using zone‐based intrusion detection system
N Soms, P Malathi - Concurrency and Computation: Practice …, 2019 - Wiley Online Library
N Soms, P Malathi
Concurrency and Computation: Practice and Experience, 2019•Wiley Online LibraryZone‐based intrusion detection is a supporting protection mechanism for mobile adhoc
environment consisting of large volume of distributed number of nodes. With the presence of
malicious nodes, security will be violated, which is focused in proposed research by
introducing Secured and Anonymous Zone‐Based Intrusion Detection System (SAZIDS).
Here, anonymous rule sharing is guaranteed by introducing the Anonymous Location‐Aided
Routing in MANET in which group signatures would be generated by all zone members …
environment consisting of large volume of distributed number of nodes. With the presence of
malicious nodes, security will be violated, which is focused in proposed research by
introducing Secured and Anonymous Zone‐Based Intrusion Detection System (SAZIDS).
Here, anonymous rule sharing is guaranteed by introducing the Anonymous Location‐Aided
Routing in MANET in which group signatures would be generated by all zone members …
Summary
Zone‐based intrusion detection is a supporting protection mechanism for mobile adhoc environment consisting of large volume of distributed number of nodes. With the presence of malicious nodes, security will be violated, which is focused in proposed research by introducing Secured and Anonymous Zone‐Based Intrusion Detection System (SAZIDS). Here, anonymous rule sharing is guaranteed by introducing the Anonymous Location‐Aided Routing in MANET in which group signatures would be generated by all zone members based on group public key provided by the intra zone leader. Thus, the exact location of zone members cannot be revealed. To ensure the secured rule sharing, Enhanced Adaptive ACKnowledgment is utilized, which would ensure the presence of malicious nodes. This is done at the time of rule sharing by the intra zone leaders. After secured sharing of rule set, in order to optimize the memory storage, in this work, rule set aggregation is performed, which would merge the rules, thus resolving the bandwidth and associated memory issues. The overall evaluation of SAZIDS is performed in the NS2 simulation environment, which proves secured and reliable transmission of data without the involvement of malicious activities.
Wiley Online Library
以上显示的是最相近的搜索结果。 查看全部搜索结果