Open Access Open Access  Restricted Access Subscription or Fee Access

Optimal Solution for Finding Secured Routes in Mobile Ad-Hoc Networks

R. P. Shyni Vinse, K. John Singh, Dr. R. Manimegalai

Abstract


A mobile Adhoc network (MANET), is a self-configuring network of mobile devices connected by wireless links. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. All nodes in ad-hoc networks are decentralized with no fixed infrastructure.  Each node in the ad-hoc network acts as a router besides transmitting the packets. The existing route discovery algorithms focus mainly on efficiency and scalability with respect to network size, traffic load and mobility. They do not give much importance for security during transmission.  In this work, an enhanced algorithm E-endairA is proposed which overcomes the problems in the existing endairA algorithm. The proposed algorithm gives a better routing solution in terms of efficiency and security when compared to the existing algorithm.


Keywords


Proactive Routing, Mobile Node, Message Authentication Code, Hidden Channel Attack, Dynamic Source Routing Protocol, Mobile Ad-hoc Networks.

Full Text:

PDF

References


P. Papadimitratos and Z. Haas, “Secure Routing for Mobile Ad Hoc Networks,” Proc. SCS Comm. Networks and Distributed Systems Modeling and Simulation Conf. (CNDS ’02), 2002.

R. Canetti, “Universally Composable Security: A New Paradigm for Cryptographic Protocols,” Proceedings of IEEE Annual Symposium on Foundations of Computer Science (FOCS ’01), pp. 136-145, 2001.

Y.C. Hu, A. Perrig, and D. Johnson, “A Survey of Secure Wireless Ad Hoc Routing Protocols,” IEEE Security and Privacy Magazine,vol. 2, no. 3, pp. 28-39, June 2004.

M. Burmester, B. De Medeiros, “On the Security of Route Discovery in MANETs”, IEEE Transactions on Mobile Computing, vol 8, no. 9, pp 1180-1188, Sept. 2009.

G. Acs, L. Buttyan, and I. Vajda, “Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks,” IEEE Trans.Mobile Computing, vol. 5, no. 11, pp. 1533-1546, Nov. 2006.

L. Buttya´n and I. Vajda, “Towards Provable Security for Ad Hoc Routing Protocols,” Proc. ACM Workshop Ad Hoc and Sensor Networks (SASN ’04), 2004.

R. Perlman and C. Kaufman, “Key Exchange in IPSEC: Analysis of IKE,” IEEE Internet Computing Magazine, vol. 4, no. 6, pp. 50-56, Nov. 2000.

M.G. Zapata, “Secure Ad Hoc On-Demand Distance Vector Routing”, Mobile Computing and Comm. Rev., vol. 6, no. 3,pp. 106-107, 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.