Enhanced routing for secured ad-hoc network

Kumaran U, Ramachandran A, Jegan J, Subramanian E.K.

Abstract


A self configured network forming an arbitrary topology of mobile routers through wireless connection is commonly referred as MANET (mobile ad-hoc network).  Random movement of routers allows the network to organize arbitrarily hence rapid unpredictable changes may occur in the topology of the wireless network. When there is no possibility of setting up permanent networks, MANETs are set up for carrying out the operations temporarily. As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs. The nodes participating in packet routing in ad-hoc networks faces security issues such as maintaining the confidentiality of the packets, integration, availability of the network to meet the traffic, requirement of authentication for reliable data communication etc. An attempt is made in this paper to analyze these issues and classify the mechanisms to understand the strengths & threats of the protocols used for routing to suggest a concrete solution for the problems related to the mobile ad-hoc networks.


Keywords


Mobile ad-hoc network;Reliability; Authentication; Vulnerability;Security attacks

References


.L.Zhou and Z.Haas, Securing ad hoc networks," IEEE Network Magazine, vol. 13, November/December 1999

.Sergio Marti and T.J.Giuli and Kevin Lai and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. Mobile Computing and Networking (2000)

Jim Parker, Anand Patwardhan, and Anupam Joshi, “Detecting Wireless Misbehavior through Cross-layer Analysis,” in Proceedings

of the IEEE Consumer Communications and Networking Conference Special Sessions (CCNC’2006), Las Vegas, Nevada, 2006.

Panagiotis Papadimitraos and Zygmunt J. Hass, “Securing Mobile Ad Hoc Networks”, in Book The Handbook of Ad Hoc Wireless

Networks (Chapter 31), CRC Press LLC, 2003.

. D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Ed., Kluwer, 1996.

. C. Perkins and E Royer, “Ad Hoc On-Demand Distance Vector Routing,” 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., 1999.

. IEEE Std. 802.11, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” 1997.

. B. Schneier, Secret and Lies, Digital Security in a Networked World, Wiley, 2000.

. Shuyao Yu, Youkun Zhang, Chuck Song, and Kai Chen. A security architecture for Mobile Ad Hoc Networks.

. Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks,“ ACM MOBICOM, 2002.




DOI: http://doi.org/10.11591/ijeecs.v19.i2.pp%25p
Total views : 13 times

Refbacks



Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

shopify stats IJEECS visitor statistics