Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network
Rajender Nath , Pankaj Kumar Sehgal
Pages - 16 - 22 | Revised - 20-03-2009 | Published - 15-03-2009
MORE INFORMATION
KEYWORDS
Ad Hoc Network, Routing Protocol, Simulator
ABSTRACT
Significant progress has been made for making mobile ad hoc networks secure and dynamic. The unique characteristics like infrastructure-free and absence of any centralized authority make these networks more vulnerable to security attacks. Due to the ever-increasing security threats, there is a need to develop algorithms and protocols for a secured ad hoc network infrastructure. This paper presents a secure routing protocol, called EDSR (Encrypted Dynamic Source Routing). EDSR prevents attackers or malicious nodes from tampering with communication process and also prevents a large number of types of Denial-of-Service attacks. In addition, EDSR is efficient, using only efficient symmetric cryptographic primitives. We have developed a new program in c++ for simulation setup.
11. I. Chakeres et. Al.,“Dynamic MANET On-demand (DYMO)Routing”,draft-ietf-manet-dymo-14, June 25, 2008. | |
C Kaufman, “DASS: Distributed Authentication Security Service”, RFC 1507, 1993. | |
C. R. Davis., “IPSec: Securing VPNs”, Osborne/McGraw-Hill, New York, 2001. | |
C. S. R. Murthy and B. S. Manoj, “Ad Hoc Wireless Networks: A Architectures and Protocols”, Prentice Hall PTR, 2004. | |
D. Johnson and D. Maltz., “Dynamic source routing in ad-hoc wireless networks routing protocols”, In Mobile Computing, pages 153-181. Kluwer Academic Publishers, 1996. | |
E. Ayannoglu et al., “ Diversity Coding for Transparent Self-Healing and Fualt-Tolerant Communication Networks”, IEEE Trans. Comm. 41(11), 1993. | |
I. Chakeres et. Al.,“IANA Allocations for MANET Protocols”,draft-ietf-manet-iana-07, November 18, 2007. | |
IEEE-SA Standards Board. IEEE Std 802.11b-1999, 1999. | |
J. Macker et Al., “Simplified Multicast Forwarding for MANET”, draft-ietf-manet-smf-07, February 25, 2008. | |
J. Tardo and K. Algappan, “SPK: Global Authentication Using Public Key Ceriticates”, Proc. IEEE Symp. Security and Privacy, CA, 1991. | |
L. Zhou and Z. Haas, “Securing Ad Hoc Networks”, IEEE Networks, 13(6), 1999. | |
M. Gasser et al., “The Digital Distributed Systems Security Architecture”, Proc. 12th Natl. Comp. Security Conf., NIST, 1989. | |
N.Bhalaji, A.Shanmugam, Druhin mukherjee, Nabamalika banerjee, “Direct trust estimated on demand protocol for secured routing in mobile Adhoc networks”, in IJCSS: International Journal of Computer Science and Security, "Volume 2, Issue 5, pages 6-12, September/ October 2008. | |
P. Gutmann. Cryptlib encryption tool kit. http://www.cs.auckland.ac.nz/~pgut001/cryptlib. | |
P. Papadimitratos and Z. J. Haas, “Secure Routing for Mobile Ad hoc Networks”, In Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002. | |
R. Droms, “ Dynamic Host Configuration Protocol”, IETF RFC 2131, 1997. | |
R.Asokan , A.M.Natarajan, C.Venkatesh, “Ant Based Dynamic Source Routing Protocol to Support Multiple Quality of Service (QoS) Metrics in Mobile Ad Hoc Networks”, in IJCSS: International Journal of Computer Science and Security, "Volume 2, Issue 3, pages 48-56, May/June 2008. | |
Rashid Hafeez Khokhar, Md Asri Ngadi, Satria Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, in IJCSS: International Journal of Computer Science and Security, "Volume 2, Issue 3, pages 18-29, May/June 2008. | |
S. Buchegger and J. LeBoudec, “ Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustnes in Mobile Ad Hoc Network,” Proc. 10th Euromicro PDP , Gran Canaria, 2002. | |
S. Das et Al. “Ad Hoc On-Demand Distance Vector (AODV) Routing”, draft-ietf-manet-aodv- 17, February, 2003. | |
S. Marti et al., “Mitigating Routing Behavior in Mobile Ad Hoc Networks”, Proc. Mobicom, 2000. | |
T. Clausen et Al., “MANET Neighborhood Discovery Protocol (NHDP)”, draft-ietf-manetnhdp- 06, March 10, 2008. | |
T. Clausen et Al., “Representing multi-value time in MANETs”, draft-ietf-manet-timetlv-04, November 16, 2007. | |
T. Clausen et. Al.,“The Optimized Link State Routing Protocol version 2”, draft-ietf-manetolsrv2- 06, June 6, 2008. | |
T. Clausen et. Al.,” Generalized MANET Packet/Message Format”, draft-ietf-manet-packetbb- 13, June 24, 2008. | |
Y. –C. Hu, D. B. Johnson and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks”, Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), Jun. 2002 | |
Y. Desmedt and Y. Frankel, “Threshold Cryptosystems”, Advances in Cryptography- Crypto’ 89, G. Brassard, Ed. Springer- Verlag, 1990. | |
Y. Desmedt “Threshold Cryptography”, Euro. Trans. Telecom., 5(4), 1994. | |
Y. Zhang and W.Lee, “Intrusion Detection in Wireless Ad Hoc Networks”, Proc. Mobicom. 2000. | |
Dr. Rajender Nath
Dept of Computer Science and Applications - India
Mr. Pankaj Kumar Sehgal
MM Institute of Computer Technology and Business Management - India
pankajkumar.sehgal@gmail.com
|
|
|
|
View all special issues >> | |
|
|