Call for Paper - March 2022 Edition
IJCA solicits original research papers for the March 2022 Edition. Last date of manuscript submission is February 22, 2022. Read More

An Efficient and Secured AOMDV Routing Protocol with Shamir’s Secret Sharing Scheme

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 33 - Number 4
Year of Publication: 2011
Authors:
Lt.Dr. S. Santhosh Baboo
C. Chandrasekar
10.5120/4012-5698

Lt.Dr. Santhosh S Baboo and C Chandrasekar. Article: An Efficient and Secured AOMDV Routing Protocol with Shamir's Secret Sharing Scheme. International Journal of Computer Applications 33(4):44-48, November 2011. Full text available. BibTeX

@article{key:article,
	author = {Lt.Dr. S. Santhosh Baboo and C. Chandrasekar},
	title = {Article: An Efficient and Secured AOMDV Routing Protocol with Shamir's Secret Sharing Scheme},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {33},
	number = {4},
	pages = {44-48},
	month = {November},
	note = {Full text available}
}

Abstract

Security has turned out to be a most important concern to facilitate secured communication between mobile nodes in a wireless environment. It is essential to protect the network from several kinds of security attacks. Recently, large numbers of routing protocols have been developed. But, most of the available protocols are single path or makes use of only a certain path at a particular time or can not prevent both the passive attacks and active attacks at the same time. Hence, propose a secured Ad-hoc On-demand Distance Vector routing protocol (AOMDV) based on secret sharing. Cryptography is one of the efficient technique to provide security to data being broadcasted in wireless communications systems. Enhanced information security can be offered by integrating AOMDV and Shamir's secret sharing scheme. In this approach, keys are produced by source and transmitted to the other nodes in the network. AOMDV and SAOMDV (AOMDV with Shamir's Secret Sharing Scheme) are simulated and the performance of both the protocols are evaluated. The performance of Secured AOMDV was stable but that of AOMDV was found to be degrading sharply with intrusion of malicious nodes in the network.

Reference

  • Luo Junhai, Ye Danxia, Xue Liu, and Fan Mingyu, “A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks”, IEEE Communications Surveys & Tutorials, Vol. 11, No. 1, Pp. 78-91, 2009.
  • Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, “Survey of routing attacks in Mobile Ad-Hoc Networks”, IEEE wireless communication, Pp. 85-91, 2007.
  • Hongmei Deng, Wei Li, and Dharma P. Agarwal “Routing security in wireless Ad Hoc networks”, IEEE Communications Magazine, 2002.
  • M. Guerrero Zapata and N. Asokan, “Securing Ad hoc Routing Protocols,” in Proceedings of the 1st ACM workshop on Wireless security, Atlanta, GA, USA, Sep 2002, pp. 1–10.
  • C. E. Perkin, E. M. Royer, “Ad-hoc on demand distance vector(AODV)routing”, The Second IEEE Workshop on Mobile Computing Systems and Applications, 1999.
  • Naeem, M.; Ahmed, Z.; Mahmood, R.; Azad, M.A.; “QOS based performance evaluation of secure on-Demand routing protocols for MANET's”, International Conference on Wireless Communication and Sensor Computing, 2010, pages 1-6, ICWCSC 2010.
  • Cerri, D. Ghioni, A. “Securing AODV: the A-SAODV secure routing prototype”, IEEE Communications Magazine, Vol. 46, No. 2, page(s): 120 – 125, 2008.
  • Kotzanikolaou, P.; Mavropodi, R.; Douligeris, C.; “Secure Multipath Routing for Mobile Ad Hoc Networks”, WONS 2005. Second Annual Conference on Wireless On-demand Network Systems and Services, Page(s): 89 – 96, 2005.
  • R. Perlman, Fault-tolerant broadcast of routing information, Computer Networks, 7, 395–405 (1983).
  • L. Zhou, and Z. J. Haas, Securing ad-hoc networks, IEEE Network Mag., 13, 24–30 (1999).
  • Perkins CE, Royer EM, “Ad hoc on-demand distance vector routing”, In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), 1999.
  • Perkins CE, Belding-Royer E, Das SR, “Ad hoc on-demand distance vector (AODV) routing”, http://www.ietf.org/rfc/rfc3561.txt, 2003.
  • Marina MK, Das SR, “Performance of route caching strategies in dynamic source routing”, In Proceedings of Workshop on Wireless Networks and Mobile Computing (WNMC) in conjunction with International Conference on Distributed Computing Systems (ICDCS), 2001.
  • Marina MK, Das SR, “Routing performance in the presence of unidirectional links in multihop wireless networks”, In Proceedings of ACM MobiHoc, 2002.
  • Nasipuri A, Castaneda R, Das SR, “Performance of multipath routing for on-demand protocols in mobile ad hoc networks”, ACM/Kluwer Mobile Networks and Applications (MONET), Vol. 6, No. 4, Pp. 339–349, 2001.
  • A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, ISBN 0-8493-8523-7, 1997.
  • 17 Adi Shamir, “How to Share a Secret”, Communications of the ACM, Vol. 22, No. 11, Pp. 612-613, 1979.