CFP last date
22 April 2024
Reseach Article

Minimized Overhead and Administrator based Secure Routing Protocol

by Himadri Nath Saha, Dr. Debika Bhattacharyya, Dr. P. K.Banerjee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Number 9
Year of Publication: 2011
Authors: Himadri Nath Saha, Dr. Debika Bhattacharyya, Dr. P. K.Banerjee
10.5120/3060-4178

Himadri Nath Saha, Dr. Debika Bhattacharyya, Dr. P. K.Banerjee . Minimized Overhead and Administrator based Secure Routing Protocol. International Journal of Computer Applications. 25, 9 ( July 2011), 22-35. DOI=10.5120/3060-4178

@article{ 10.5120/3060-4178,
author = { Himadri Nath Saha, Dr. Debika Bhattacharyya, Dr. P. K.Banerjee },
title = { Minimized Overhead and Administrator based Secure Routing Protocol },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 25 },
number = { 9 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 22-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume25/number9/3060-4178/ },
doi = { 10.5120/3060-4178 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:18.855223+05:30
%A Himadri Nath Saha
%A Dr. Debika Bhattacharyya
%A Dr. P. K.Banerjee
%T Minimized Overhead and Administrator based Secure Routing Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 25
%N 9
%P 22-35
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As an emerging new technology a wireless communication allows users to access services electronically, wherever they might geographically be positioned. A MANET (Mobile Ad Hoc Network )is a special wireless network without any fixed infrastructure and It has dynamic topology. In this paper we have discussed a new secure routing protocol named as minimized overhead and admsinistrator based secure routing protocol(MOAP) for data packets, which is signifiacndly different from existing routing protocol. We have reduced the amount of network activity for each node required to route a data packet. We have utilized our algorithm to implement this protocol and then simulate with diffentent test cases. Finally we have discussed how this protocol prevents various attacks which may jeopardize any wireless network.

References
  1. Izhak Rubin, Arshad Behzad, Ruhne Zhang, Huiyo Luo and Eric Caballero.”TBONE: A Mobile-Backbone Protocol for Ad Hoc Wireless Networks”. In Proceedings of IEEE Aerospace Conference, 2002, vol. 6, pp. 2727-2740.
  2. Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member, IEEE, “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs” IEEE Transaction on Mobile Computing, VOL. 6, NO. 5, May 2007.
  3. S. Matri, T. J. Giuli, K. Lai and M. Baker. ”Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks”. In Proceedings of Mobicom 2000, pp. 255-265.
  4. Gonzalez- Computers & Security, Vol 25, No. 18, pp 736-744, 2000.
  5. Panagiotis Papadimitratos , Zygmunt J. Haas , “Secure message transmission in mobile ad hoc networks, Ad Hoc Networks” IEEE 2003, 193–209 .
  6. Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: ACM MobiCom’02, 2002, pp. 12–23.
  7. Y.-C. Hu, D.B. Johnson, A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002, pp. 3–13.
  8. Komala CR, Srinivas Shetty, Padmashree S., Elevarasi E., “Wireless Ad hoc Mobile Networks”, National Conference on Computing, Communication and Technology, pp. 168-174, 2010
  9. L. Zhou and Z. Hass. ”Securing Ad Hoc Networks”, IEEE Network Magazine, vol.13, pp. 24-30, 1999.
  10. Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Wormhole Attacks in Wireless Networks”, IEEE Journal on Selected Areas in Communication, pp.370-380,2006
  11. Johnson99 David B. Johnson, Davis A. Maltz, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks" October 1999 IETF Draft, 49 pages.
  12. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Royer, A secure routing protocol for ad hoc networks, in: Proceedings of the 10th IEEE International Conference on NetworkProtocols, 2002, pp. 78–87.
  13. Perkins99 Charles E. Perkins, Elizabeth M. Royer, Samir R.Das, "Ad Hoc On-demand Distance Vector Routing", October 99 IETF Draft.
  14. Perkins94 C.E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”, Comp. Comm. Rev., Oct. 1994, pp.234-244.
  15. Samir R. Das, Charles E. Perkins and Elizabeth M. Royer, “Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks”
  16. C. Perkins, E. Belding-Royer and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing”, 2003
  17. Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks http://www.scribd.com/doc/26788447/Avoiding-Black-Hole-and-Cooperative-Black-Hole-Attacks-in-Wireless-Ad-hoc-Networks
  18. Shukor Abdul Razak, Steven Furnell, Nathan Clarke, Phillip Brooke: A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks- A Friend Approach, Springer-Verlag Berlin Heidelberg 2006.
  19. David B. Johnson, David A. Maltz and Josh Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”
  20. Y. Zhang and W. Lee. ”Intrusion Detection in Wireless Ad Hoc Networks”. In Proceedings of Mobicom 2000, pp. 275-283.
  21. Rashid Hafeez Khokhar, Md Asri Ngadi and Satira Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, pp. 18-29, Volume-2 Issue-3 International Conference on Wireless Networks (ICWN’03), Las Vegas, Nevada, USA, pp. 570-575
  22. Jeremy J. Blum, Member, IEEE, and Azim Es kandarian, Member, IEEE, “A Reliable Link-Layer Protocol for Robust and Scalable Intervehicle Communications” IEEE Transactions On Intelligent Transportation Systems, vol. 8, no. 1, March 2007.
  23. N.Shanthi, Dr.Lganesan and Dr.K.Ramar,”Study of Different Attacks on Multicast Mobile Ad-hoc Network”, Journal of Theoretical and Applied Information Technology, pp.45-51
  24. Luke Klein-Berndt, “A Quick Guide to AODV Routing”
  25. Jung-San Lee, Chin-Chen Chang, “Secure communications for cluster-based ad hoc networks using node identities” Journal of Network and Computer Applications 22 October 2006 International Journal of Computer Science and Security, Volume (1): Issue (1) 67.
  26. Himadri Nath Saha,Dr Debika Bhattacharyya,Dr.P.K.Banerjee,”A Priority Based Protocol for Mitigating Different Attacks in MANET”,International Journal for Computer Science and Communication,Volume I,Number2,pp-299-302,Sept.2010
  27. Himadri Nath Saha,Dr Debika Bhattacharyya,Dr.P.K.Banerjee,”A Distributed Administration Based Approach for Detecting and Preventing Attacks in MANET”,International Journal for Scientific and Engineering Reasearch,Volume-2,Issue-3,pp-1-11,Mar-2011
  28. Himadri Nath Saha,Dr. Debika Bhattacharyya,Dr.P.K.Banerjee,”Semi-Centralized Multi-Authenticated RSSI Based `Solution to Sybil Attack”,International Journal of Computer Science and EmergingTechnologies”,VolumeI,Issue-4,pp-338- 341,Dec 2010
Index Terms

Computer Science
Information Sciences

Keywords

Administrator associative node special associative node pair traversed Administrator field watch nodes hello flooding