Open Access Open Access  Restricted Access Subscription or Fee Access

Dynamic Routing and Agent Technology Based Security Enhanced Data Delivery with Public Key Cryptography

K. Kalaivani, P.K. Uma Chandra, I. Arul Sahaya Mary, M. Ram Murali

Abstract


Network security measures are needed to protect data during their transmission in any type of network . In this paper we propose a security enhanced dynamic routing algorithm that explores the existence of multiple routes and forces packets to take alternate paths probabilistically with the newly constructed routing table. It makes the interception and eavesdropping maximally difficult and also increases the throughput as they make use of multiple paths. It balances the load in the nodes to avoid congestion with the help of mobile agents. This paper also provides the security services such as integrity, authentication, and authorization through public key cryptography to the proposed dynamic routing table to be exchanged among nodes against various attacks.

Keywords


Improved Security Enhanced Dynamic Routing (ISEDR), Public Key Cryptography, Authentication, Authorization, RIP, DSDV, Mobile Agents

Full Text:

PDF

References


Hopps, “Analysis of an equal-cost multi path algorithms,” RFC 2992, Nov. 2000.

Villamizar, “Ospf optimized multipath (ospf-omp),” draft-iet ospfomp-03, p. 46, June 1999.

G. Apostolopoulos,V. Peris,P.Pradhan,and D. saha , “Securing Electronic Commerce: Reducing the SSL Overhead,” IEEE Network, 2000.

S. Bohacek, J.P. Hespanha, K.Obraczka, J. Lee, and Lim, “Enhancing Security via Stochastic Routing,” Proc. 11th Int’l Conf. Computer Comm. and Networks (ICCCN), 2002.

T.H. Cormen, C.E. Leiserson, and R.L. Rivest, Introduction to Algorithms. MIT Press, 1990.

M. Faloutsos, P. Faloutsos, and C. Faloutsos,“On Power-Law Relationships of the Internet Topology,”Proc. ACM SIGCOMM’99, pp. 251-262, 1999. FreeS/WAN, http://www.freeswan.org, 2008.

I. Gojmerac, T. Ziegler, F. Ricciato, and P. Reichl, “Adaptive Multipath Routing for Dynamic Traffic Engineering,” Proc. IEEE Global Telecommunications Conf. (GLOBECOM), 2003.

C. Hopps, Analysis of an Equal-Cost Multi-Path Algorithm, Request for comments (RFC 2992), Nov. 2000.

C. Kaufman, R. Perlman, and M. Speciner, Network Security PRIVATE Communication in a PUBLIC World, second ed. Prentice Hall PTR, 2002.

J.F. Kurose and K.W. Ross, Computer Networking—A Top-Down Approach Featuring the Internet. Addison Wesley, 2003.

S.-H. Liu, Y.-F. Lu, C.-F. Kuo, A.-C. Pang, and W. Kuo, “The Performance Evaluation of a Dynamic Configuration Method over IPSEC,” Proc. 24th IEEE Real-Time Systems Symp.: Works in Progress Session (RTSS WIP), 2003.

W. Lou and Y. Fang, “A Multipath Routing Approach for Secure Data Delivery,” Proc. IEEE Military Comm. Conf. (MilCom), 2001.

W. Lou, W. Liu, and Y. Fang, “SPREAD: Improving Network Security by Multipath Routing,” Proc. IEEE Military Comm. Conf. (MilCom), 2003.

G. Malkin, Routing Information Protocol (RIP) Version 2 Carrying Additional Information, Request for comments (RFC 1723), Nov.1994.

Chin-Fu Kuo, Ai-Chun Pang and Sheng-Kun Chan,” Dynamic routing with security consideration” IEEE Network, 2009.

William Stallings ” Cryptography and Network Security”, Third Edition(Pearson publication)

C. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM ’94, pp. 234-244, 1994.

Secure Sockets Layer (SSL), http://www.openssl.org/, 2008.

R.Thayer, N. Doraswamy, and R. Glenn, IP Security Document Roadmap, Request for comments (RFC 2411), Nov. 1998.

J. Yang and S. Papavassiliou, “Improving Network Security by Multipath Traffic Dispersion,” Proc. IEEE Military Comm. Conf. FreeS/WAN, http://www.freeswan.org, 2008.

D.L. Mills, DCN Local-Network Protocols, Request for comments (RFC 891), Dec. 1983

A. Kannammal , Ch.S.N. Iyengar “A Framework for Mobile Agent Security in Distributed Agent-Based E-Business Systems “

George kirov “Soft computing agents for dynamic routing “

Manal Abdullah, Helen Bakhsh “Agent-based Dynamic Routing System for MANETs’


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.