Loading

Coherence Key Based Node Authentication for Routing in Mobile Ad Hoc Networks
P. Gowthamarayathirumal1, C. Chandrasekar2, A. Sridhar3

1Dr.P.Gowthamarayathirumal*, Assistant Professor of Computer Science, Government Arts College, Dharmapuri, Tamilnadu, India.
2Dr.C.Chandrasekar, Professor, Dept. of Computer Science, Periyar University, Salem. Tamilnadu, India.
3Dr. A. Sridhar, Assistant Professor, Dept. of Computer Science, Government Arts College, Dharmapuri, Tamilnadu, India.
Manuscript received on January 02, 2020. | Revised Manuscript received on January 15, 2020. | Manuscript published on January 30, 2020. | PP: 389-396 | Volume-8 Issue-5, January 2020. | Retrieval Number: E5020018520/2020©BEIESP | DOI: 10.35940/ijrte.E5020.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile Ad hoc network (MANETs) is a self-organizing multi-hop wireless network with dynamic topologies. Due to the absence of Control Authority in MANET, the network seems to be vulnerable that can be easily destroyed by the entry of malicious nodes. The presence of malicious nodes can destroy the data transmission of the network. So, finding and removing the malicious nodes is one of the critical issues in the MANET. With the help of the proposed Coherence Key Based Node Authentication for Routing (CKR) Algorithm, each and every mobile node are authenticated while updating the routing table by using the authentication key value that is generated with the help of random number with the secret key. Only the authenticated nodes (non-Malicious Nodes) are updated in the routing table and the remaining nodes which are not authenticated (malicious nodes) will be eliminated from the routing table. So that, the malicious node will not participated and could not destroy the data transmission. Thus, it makes this Multi-hop network as more trustful network.
Keywords: Manet Security, Coherence Key, Malicious Node, Authentication.
Scope of the Article: Big Data Security.