Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Minimized Overhead and Administrator based Secure Routing Protocol

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Number 9 - Article 5
Year of Publication: 2011
Authors:
Himadri Nath Saha
Dr. Debika Bhattacharyya
Dr. P. K.Banerjee
10.5120/3060-4178

Himadri Nath Saha, Dr. Debika Bhattacharyya and Dr. P K.Banerjee. Article: Minimized Overhead and Administrator based Secure Routing Protocol. International Journal of Computer Applications 25(9):22-35, July 2011. Full text available. BibTeX

@article{key:article,
	author = {Himadri Nath Saha and Dr. Debika Bhattacharyya and Dr. P. K.Banerjee},
	title = {Article: Minimized Overhead and Administrator based Secure Routing Protocol},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {25},
	number = {9},
	pages = {22-35},
	month = {July},
	note = {Full text available}
}

Abstract

As an emerging new technology a wireless communication allows users to access services electronically, wherever they might geographically be positioned. A MANET (Mobile Ad Hoc Network )is a special wireless network without any fixed infrastructure and It has dynamic topology. In this paper we have discussed a new secure routing protocol named as minimized overhead and admsinistrator based secure routing protocol(MOAP) for data packets, which is signifiacndly different from existing routing protocol. We have reduced the amount of network activity for each node required to route a data packet. We have utilized our algorithm to implement this protocol and then simulate with diffentent test cases. Finally we have discussed how this protocol prevents various attacks which may jeopardize any wireless network.

Reference

  • Izhak Rubin, Arshad Behzad, Ruhne Zhang, Huiyo Luo and Eric Caballero.”TBONE: A Mobile-Backbone Protocol for Ad Hoc Wireless Networks”. In Proceedings of IEEE Aerospace Conference, 2002, vol. 6, pp. 2727-2740.
  • Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member, IEEE, “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs” IEEE Transaction on Mobile Computing, VOL. 6, NO. 5, May 2007.
  • S. Matri, T. J. Giuli, K. Lai and M. Baker. ”Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks”. In Proceedings of Mobicom 2000, pp. 255-265.
  • Gonzalez- Computers & Security, Vol 25, No. 18, pp 736-744, 2000.
  • Panagiotis Papadimitratos , Zygmunt J. Haas , “Secure message transmission in mobile ad hoc networks, Ad Hoc Networks” IEEE 2003, 193–209 .
  • Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: ACM MobiCom’02, 2002, pp. 12–23.
  • Y.-C. Hu, D.B. Johnson, A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002, pp. 3–13.
  • Komala CR, Srinivas Shetty, Padmashree S., Elevarasi E., “Wireless Ad hoc Mobile Networks”, National Conference on Computing, Communication and Technology, pp. 168-174, 2010
  • L. Zhou and Z. Hass. ”Securing Ad Hoc Networks”, IEEE Network Magazine, vol.13, pp. 24-30, 1999.
  • Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Wormhole Attacks in Wireless Networks”, IEEE Journal on Selected Areas in Communication, pp.370-380,2006
  • Johnson99 David B. Johnson, Davis A. Maltz, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks" October 1999 IETF Draft, 49 pages.
  • K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Royer, A secure routing protocol for ad hoc networks, in: Proceedings of the 10th IEEE International Conference on NetworkProtocols, 2002, pp. 78–87.
  • Perkins99 Charles E. Perkins, Elizabeth M. Royer, Samir R.Das, "Ad Hoc On-demand Distance Vector Routing", October 99 IETF Draft.
  • Perkins94 C.E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”, Comp. Comm. Rev., Oct. 1994, pp.234-244.
  • Samir R. Das, Charles E. Perkins and Elizabeth M. Royer, “Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks”
  • C. Perkins, E. Belding-Royer and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing”, 2003
  • Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks http://www.scribd.com/doc/26788447/Avoiding-Black-Hole-and-Cooperative-Black-Hole-Attacks-in-Wireless-Ad-hoc-Networks
  • Shukor Abdul Razak, Steven Furnell, Nathan Clarke, Phillip Brooke: A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks- A Friend Approach, Springer-Verlag Berlin Heidelberg 2006.
  • David B. Johnson, David A. Maltz and Josh Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”
  • Y. Zhang and W. Lee. ”Intrusion Detection in Wireless Ad Hoc Networks”. In Proceedings of Mobicom 2000, pp. 275-283.
  • Rashid Hafeez Khokhar, Md Asri Ngadi and Satira Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, pp. 18-29, Volume-2 Issue-3 International Conference on Wireless Networks (ICWN’03), Las Vegas, Nevada, USA, pp. 570-575
  • Jeremy J. Blum, Member, IEEE, and Azim Es kandarian, Member, IEEE, “A Reliable Link-Layer Protocol for Robust and Scalable Intervehicle Communications” IEEE Transactions On Intelligent Transportation Systems, vol. 8, no. 1, March 2007.
  • N.Shanthi, Dr.Lganesan and Dr.K.Ramar,”Study of Different Attacks on Multicast Mobile Ad-hoc Network”, Journal of Theoretical and Applied Information Technology, pp.45-51
  • Luke Klein-Berndt, “A Quick Guide to AODV Routing”
  • Jung-San Lee, Chin-Chen Chang, “Secure communications for cluster-based ad hoc networks using node identities” Journal of Network and Computer Applications 22 October 2006 International Journal of Computer Science and Security, Volume (1): Issue (1) 67.
  • Himadri Nath Saha,Dr Debika Bhattacharyya,Dr.P.K.Banerjee,”A Priority Based Protocol for Mitigating Different Attacks in MANET”,International Journal for Computer Science and Communication,Volume I,Number2,pp-299-302,Sept.2010
  • Himadri Nath Saha,Dr Debika Bhattacharyya,Dr.P.K.Banerjee,”A Distributed Administration Based Approach for Detecting and Preventing Attacks in MANET”,International Journal for Scientific and Engineering Reasearch,Volume-2,Issue-3,pp-1-11,Mar-2011
  • Himadri Nath Saha,Dr. Debika Bhattacharyya,Dr.P.K.Banerjee,”Semi-Centralized Multi-Authenticated RSSI Based `Solution to Sybil Attack”,International Journal of Computer Science and EmergingTechnologies”,VolumeI,Issue-4,pp-338- 341,Dec 2010