Tytuł artykułu
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
With advent of technology MANET is becoming more and more ubiquitous, and so is the vulnerability of such networks to attacks. In this paper, we propose a secure, lightweight, on-demand routing protocol for MANETs. It uses the concept of fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that neighbor or not. To combat attacks efficiently new packets like report and recommendation are used. After receiving a few of these packets a node can conclude about the behavior of a node, thereby identifying and blacklisting the malicious nodes. We try to impose bounds for the fidelity with reference to the battery of the node, which restricts a node to increase its fidelity to infinity and become dominant in the network. This protocol not only finds a secure route to transmit data, but also identifies the malicious nodes in the network. Our protocol exhibits high packet delivery fraction, with low normalized routing load and low end to end delay; which has been observed while simulating in GloMoSim platform. We have observed that our protocol performs not only better than other existing secure routing protocol in a malicious environment, but also combats, many attacks which have not been dealt with these protocols.
Słowa kluczowe
Rocznik
Tom
Strony
267--298
Opis fizyczny
Bibliogr. 16 poz., rys.
Twórcy
autor
- Department of Computer Science and Engineering, Institute of Engineering & Management, Kolkata, India
autor
- Department of Computer Science and Engineering, Institute of Engineering & Management, Kolkata, India
autor
- Department of Computer Science and Engineering, Institute of Engineering & Management, Kolkata, India
autor
Bibliografia
- [1] Bagrodia R., Meyerr R., PARSEC: A Parallel Simulation Environment for Complex System, UCLA technical report, 1997.
- [2] Broch, J., Maltz A.D., Johnson B.D., Hu C.Y., Jetcheva J., A performance comparison of multi-hop wireless ad hoc network routing protocols, Journal of Mobile Computing and Networking, 1998, 85-97.
- [3] Capkun S.,Buttya L., Hubaux J.P., Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions On Mobile Computing, 2, 1, 2003,1-13.
- [4] Corson S., Macker J., Mobile Ad hoc Networking (MANET): routing protocol performance issues and evaluation considerations, Network Working Group, RFC:2501,1999.
- [5] Eastlake D., Jones P., US secure hash algorithm 1 (SHA1). Network Working Group.RFC-3174, 2001.
- [6] Grobler T. L., Penzhorn W. T., Fast decryption methods for rsa cryptosystem, In 7th AFRICON Conference in Africa,1, 2004,361-364.
- [7] Huang Q., Cukier J., Kobayashi H., Liu B., Zhang J., Fast authenticated key establishment protocols for self-organizing sensor networks, Mitsubishi Electric Research Laboratories,2004.
- [8] Lamport L., Password authentication with insecure communication. Communications of ACM, 24,11,1981,770-772.
- [9] Nekkanti R.K., Lee C.W., Trust based adaptive on demand ad hoc routing protocol. In: Proceedings Of The 42nd Annual Southeast Regional Conference, 2004, 88-93.
- [10] Rivest R.L., Shamir A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Communications of ACM, 21,2, 1978, 120-126.
- [11] Saha H.N., Bhattacharyya D., Banerjee B., Mukherjee S., Singh R. and Ghosh D., Self-Organized key management based on fidelity relationship list and dynamic path. International Journal of Application or Innovation in Engineering & Management (IJAIEM),3,7,2014,97-100.
- [12] Saha H.N, Bhattacharyya D., Banerjee B., Mukherjee S., Singh R., Ghosh D., A review on attacks and secure routing protocols in MANET, In CIBTech, International Journal of Innovative Research and Review (JIRR), 1, 2, 2013,12-31.
- [13] Saha H N., Bhattacharyya D., Banerjee P K., Fidelity based on demand secure (FBOD) routing in mobile adhoc network, International Journal of Advanced Computer Science and Applications,Special Issue on Wireless & Mobile Networks(IJACSA), 2011,26-34.
- [14] Sanzgiri K., Dahill B., Levine B., Belding-Royer E., A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols (ICNP), 2002,78-87.
- [15] Zapata M., Asokan N., Securing ad hoc routing protocols. In: Proceedings of the ACM Workshop on Wireless Security (WiSe), 2002,1-10.
- [16] Zeng, X., Bagrodia. R., Gerla M., GloMoSim: a library for parallel simulation of large-scale wireless networks, In Proc. of 12th Workshop on Parallel and Distributed Simulation (PADS),1998,154 - 161.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e36511ee-8b19-4493-97bf-a74433110e7f