Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Delay Efficient Authenticated Anonymous Secure Routing for MANETs

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Sunetra P. Salunkhe, Hitendra D. Patil
10.5120/ijca2016911089

Sunetra P Salunkhe and Hitendra D Patil. Delay Efficient Authenticated Anonymous Secure Routing for MANETs. International Journal of Computer Applications 148(4):29-33, August 2016. BibTeX

@article{10.5120/ijca2016911089,
	author = {Sunetra P. Salunkhe and Hitendra D. Patil},
	title = {Delay Efficient Authenticated Anonymous Secure Routing for MANETs},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2016},
	volume = {148},
	number = {4},
	month = {Aug},
	year = {2016},
	issn = {0975-8887},
	pages = {29-33},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume148/number4/25747-2016911089},
	doi = {10.5120/ijca2016911089},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The mobile ad hoc network (MANET) is nothing but the wireless connection of mobile nodes which provides the communication and mobility among wireless nodes without the need of any physical infrastructure or centralized devices such as access point or base station. The communications in MANET is done by routing protocols. At present MANET is used in many real time applications and hence such networks are vulnerable to different kinds of security threats. MANET networks suffered more from security attacks due to use of free wireless communication frequency spectrum and dynamic topology. Therefore it becomes very tough to provide secure to MANET under different adversarial environments like battlefields. For MANET, anonymous communications are vital under the adversarial environments, in which the identification of nodes as well as routes is replaced by pseudonyms or random numbers for the purpose of protection. There are many protocols presented for anonymous communication security for MANET, however suffered from limitations like worst delay, vulnerable to DoS attacks etc. In this paper presents Delay Efficient Authenticated Anonymous Secure Routing [DEAASR] which is extension of existing AASR approach presented recently. The main aim of DEAASR protocol is to provide secure data communication with the goal of improving performance packet delay and routing efficiency for different attacks in MANET.

References

  1. Wei Liu and Ming Yu, “AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments” IEEE Transactions on VehicularTechnology,Volume:63, No:9,November 2014.
  2. S. William and W. Stallings, Cryptography and Network Security, 4th Edition. Pearson Education India, 2006.
  3. M. G. Reed, P. F. Syverson, and D. M. Goldschlag, “Anonymous Connections and Onion Routing,” IEEE Journal on Selcted Area in Comm., vol. 16, no. 4, pp. 482–494, May 1998.
  4. D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Proc. Int. Cryptology Conf. (CRYPTO’04), Aug. 2004.
  5. A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, “SDAR: a Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad hoc Networks,” in Proc. IEEE Int’l Conf. Local Computer Networks (LCN’04), Nov. 2004, pp. 618–624.
  6. J. Kong, X. Hong, and M. Gerla, “ANODR: An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks,” IEEE Trans. on Mobile Computing, vol. 6, no. 8, pp. 888–902, Aug. 2007.
  7. R. Song, L. Korba, and G. Yee, “AnonDSR: efficient anonymous dynamic source routing for mobile ad hoc networks,” in Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN’05), Nov. 2005.
  8. Y. Zhang, W. Liu, W. Lou, and Y. G. Fang, “MASK: Anonymous On-Demand Routing in Mobile Ad hoc Networks,” IEEE Trans. on Wireless Comms., vol. 5, no. 9, pp. 2376–2386, Sept. 2006.
  9. L. Yang, M. Jakobsson, and S. Wetzel, “Discount anonymous on demand routing for mobile ad hoc networks”, in Proc. Int. Conf. SECURECOMM, pp. 1–10, Aug. 2006.
  10. J. Paik, B. Kim, and D. Lee, “A3RP: Anonymous and Authenticated Ad hoc Routing protocol,” in Proc. International Conf. on Information Security and Assurance (ISA’08), Apr. 2008.
  11. C. Perkins, E. Belding-Royer, S. Das, et al., “RFC 3561 - Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet RFCs, 2003.

Keywords

AASR, Anonymous Routing, delay efficient routing