CFP last date
20 December 2024
Reseach Article

Delay Efficient Authenticated Anonymous Secure Routing for MANETs

by Sunetra P. Salunkhe, Hitendra D. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 148 - Number 4
Year of Publication: 2016
Authors: Sunetra P. Salunkhe, Hitendra D. Patil
10.5120/ijca2016911089

Sunetra P. Salunkhe, Hitendra D. Patil . Delay Efficient Authenticated Anonymous Secure Routing for MANETs. International Journal of Computer Applications. 148, 4 ( Aug 2016), 29-33. DOI=10.5120/ijca2016911089

@article{ 10.5120/ijca2016911089,
author = { Sunetra P. Salunkhe, Hitendra D. Patil },
title = { Delay Efficient Authenticated Anonymous Secure Routing for MANETs },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 148 },
number = { 4 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume148/number4/25747-2016911089/ },
doi = { 10.5120/ijca2016911089 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:52:27.277429+05:30
%A Sunetra P. Salunkhe
%A Hitendra D. Patil
%T Delay Efficient Authenticated Anonymous Secure Routing for MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 148
%N 4
%P 29-33
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The mobile ad hoc network (MANET) is nothing but the wireless connection of mobile nodes which provides the communication and mobility among wireless nodes without the need of any physical infrastructure or centralized devices such as access point or base station. The communications in MANET is done by routing protocols. At present MANET is used in many real time applications and hence such networks are vulnerable to different kinds of security threats. MANET networks suffered more from security attacks due to use of free wireless communication frequency spectrum and dynamic topology. Therefore it becomes very tough to provide secure to MANET under different adversarial environments like battlefields. For MANET, anonymous communications are vital under the adversarial environments, in which the identification of nodes as well as routes is replaced by pseudonyms or random numbers for the purpose of protection. There are many protocols presented for anonymous communication security for MANET, however suffered from limitations like worst delay, vulnerable to DoS attacks etc. In this paper presents Delay Efficient Authenticated Anonymous Secure Routing [DEAASR] which is extension of existing AASR approach presented recently. The main aim of DEAASR protocol is to provide secure data communication with the goal of improving performance packet delay and routing efficiency for different attacks in MANET.

References
  1. Wei Liu and Ming Yu, “AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments” IEEE Transactions on VehicularTechnology,Volume:63, No:9,November 2014.
  2. S. William and W. Stallings, Cryptography and Network Security, 4th Edition. Pearson Education India, 2006.
  3. M. G. Reed, P. F. Syverson, and D. M. Goldschlag, “Anonymous Connections and Onion Routing,” IEEE Journal on Selcted Area in Comm., vol. 16, no. 4, pp. 482–494, May 1998.
  4. D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Proc. Int. Cryptology Conf. (CRYPTO’04), Aug. 2004.
  5. A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, “SDAR: a Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad hoc Networks,” in Proc. IEEE Int’l Conf. Local Computer Networks (LCN’04), Nov. 2004, pp. 618–624.
  6. J. Kong, X. Hong, and M. Gerla, “ANODR: An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks,” IEEE Trans. on Mobile Computing, vol. 6, no. 8, pp. 888–902, Aug. 2007.
  7. R. Song, L. Korba, and G. Yee, “AnonDSR: efficient anonymous dynamic source routing for mobile ad hoc networks,” in Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN’05), Nov. 2005.
  8. Y. Zhang, W. Liu, W. Lou, and Y. G. Fang, “MASK: Anonymous On-Demand Routing in Mobile Ad hoc Networks,” IEEE Trans. on Wireless Comms., vol. 5, no. 9, pp. 2376–2386, Sept. 2006.
  9. L. Yang, M. Jakobsson, and S. Wetzel, “Discount anonymous on demand routing for mobile ad hoc networks”, in Proc. Int. Conf. SECURECOMM, pp. 1–10, Aug. 2006.
  10. J. Paik, B. Kim, and D. Lee, “A3RP: Anonymous and Authenticated Ad hoc Routing protocol,” in Proc. International Conf. on Information Security and Assurance (ISA’08), Apr. 2008.
  11. C. Perkins, E. Belding-Royer, S. Das, et al., “RFC 3561 - Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet RFCs, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

AASR Anonymous Routing delay efficient routing