CFP last date
20 May 2024
Reseach Article

POR: Privacy-Preserving On-Demand Routing Scheme to Mitigate Malicious Nodes in Mobile Ad Hoc Networks

by M. Gunasekaran, K. Premalatha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 10
Year of Publication: 2013
Authors: M. Gunasekaran, K. Premalatha
10.5120/14156-2368

M. Gunasekaran, K. Premalatha . POR: Privacy-Preserving On-Demand Routing Scheme to Mitigate Malicious Nodes in Mobile Ad Hoc Networks. International Journal of Computer Applications. 82, 10 ( November 2013), 42-48. DOI=10.5120/14156-2368

@article{ 10.5120/14156-2368,
author = { M. Gunasekaran, K. Premalatha },
title = { POR: Privacy-Preserving On-Demand Routing Scheme to Mitigate Malicious Nodes in Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 10 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 42-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number10/14156-2368/ },
doi = { 10.5120/14156-2368 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:57:25.874691+05:30
%A M. Gunasekaran
%A K. Premalatha
%T POR: Privacy-Preserving On-Demand Routing Scheme to Mitigate Malicious Nodes in Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 10
%P 42-48
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. Providing privacy and security is a critical problem when implementing MANET in an adversarial environment. A malicious node may pose a serious security threats for communication in the network. Such nodes participate in the route discovery and data forwarding phase and degrade routing performance. A privacy-preserving on-demand routing (POR) scheme is proposed to mitigate the effects of malicious nodes through anonymity related features. The POR is designed based on the combination of an identity-based group signature scheme and cryptographic onion – a cryptographic scheme is used to achieve anonymity. The simulation results show the importance of anonymity through the analysis of traceable ratio and routing performance of the proposed scheme.

References
  1. Miranda H. and Rodrigues H. 2002. Preventing Selfishness in Open Mobile Ad Hoc Networks, In Proceedings of CaberNet Radicals Workshop.
  2. Abusalah, L, Khokhar, A. and Guizani, M, "A Survey of Secure Mobile Ad Hoc Routing Protocols", IEEE Communications Surveys & Tutorials, 2008, 10, (4), pp. 78-93.
  3. Kannhavong B. , Nemoto Y. and Kato N. , "A Survey of Routing Attacks in Mobile Ad Hoc Networks", IEEE Wireless Communications, vol. 14, no. 5, pp. 85-91, 2007.
  4. Abusalah L. , Khokhar A. and Guizani M. , "A Survey of Secure Mobile Ad Hoc Routing Protocols, IEEE Communications Surveys and Tutorials, vol. 10, no. 4, pp. 78-93, 2008.
  5. Andel T. R. and Yasinsac A. , "Surveying Security Analysis Techniques in MANET Routing Protocols", IEEE Communications Surveys and Tutorials, vol. 9, no. 4, pp. 70-84, 2007.
  6. Boneh D. and Frankliny M. 2003. Identity-Based Encryption from the Weil Pairing", In Proceedings of Advances in Cryptology.
  7. Han, S, Wang, J. and Liu, W. 2004. An Efficient Identity-Based Group Signature Scheme over Elliptic Curves", Springer LNCS.
  8. Reed, M, G, Syverson, P, F. and Goldschlag, D, M. "Anonymous Connections and Onion Routing", IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 482-494, 1998.
  9. Kong, J. and Hong, H. 2003. ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks, In Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing.
  10. Seys, S. and Preneel, B. 2006. ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks, In Proceedings of the International Conference on Advanced Information Networking and Applications.
  11. Sy, D, Chen, R. and Bao, L. 2006. ODAR: On-Demand Anonymous Routing in Ad Hoc Networks, In Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems.
  12. Liu, J, Hong, X, Kongt, J, Zheng, Q. and Bradford, P, G. 2006. A. Hierarchical Anonymous Routing Scheme for Mobile Ad-Hoc Networks", In Proceedings of the International Conference on Military Communication.
  13. Zhang, Y, Liu, W, Lou, W. and Fang, Y, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks", IEEE Transactions On Wireless Communications, vol. 5, no. 9, pp. 2376 –2385, 2006.
  14. Pan, J. and Li, J. 2009. MASR: An Efficient Strong Anonymous Routing Protocol for Mobile Ad Hoc Networks, In Proceedings of the International Conference on Management and Service Science.
  15. Defrawy, K,E. and Tsudik, G, "ALARM: Anonymous Location-Aided Routing in Suspicious MANETs", IEEE Transaction on Mobile Computing, vol. 10, no. 9, pp. 1345 –1358, 2011.
  16. Heesook C. , William E. , Jaesheungn S. , Patrick D. M. and Thomas F. L. P. , "ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks", Wireless Networks, pp. 525-539, 2009.
  17. Z. Wan, K. Kui, and M. Gu, "USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks", IEEE Transaction on Wireless Communications, vol. 11, no. 5, pp. 1922-1932, 2012.
  18. Schnorr, C, "Efficient Signature Generation from Smart Card", Journal of Cryptography, Springer –Verlag, vol. 4, no. 3, pp. 239-252, 1991.
  19. Perkins, C, Belding-Royer, E. and Das, S. 2003. Ad Hoc On-Demand Distance Vector (AODV) routing, RFC 3561.
  20. Fall K. and Varadhan K. , ns manual. isi. edu /nsnam/ns/doc.
Index Terms

Computer Science
Information Sciences

Keywords

Anonymity Privacy Security Routing MANET