We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Secure and Power Efficient Routing Scheme for Ad Hoc Networks

by Ashwani Kush, Divya Sharma, Sunil Taneja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 6
Year of Publication: 2011
Authors: Ashwani Kush, Divya Sharma, Sunil Taneja
10.5120/2515-3415

Ashwani Kush, Divya Sharma, Sunil Taneja . A Secure and Power Efficient Routing Scheme for Ad Hoc Networks. International Journal of Computer Applications. 21, 6 ( May 2011), 20-25. DOI=10.5120/2515-3415

@article{ 10.5120/2515-3415,
author = { Ashwani Kush, Divya Sharma, Sunil Taneja },
title = { A Secure and Power Efficient Routing Scheme for Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 6 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number6/2515-3415/ },
doi = { 10.5120/2515-3415 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:48.382810+05:30
%A Ashwani Kush
%A Divya Sharma
%A Sunil Taneja
%T A Secure and Power Efficient Routing Scheme for Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 6
%P 20-25
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Security and Power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The ad hoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols

References
  1. T. Karygiannis and L. Owens, ―Wireless Network Security, NIST Special Publication 800-48, November 2002.
  2. William Stallings, ―Cryptography and Network Security: Principles and Practice, pages 3–12.Second edition.Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  3. Kush A, Gupta P “Power Aware Virtual Node Routing Protocol for Ad hoc Networks” in International Journal of Ubiquitous Computing and Communication (UBICC),Vol. 2 No. 3, pp55-62, South Korea 2007.
  4. C. Parkins and E. Royer, ―Ad Hoc on demand distance vector routing, 2nd IEEE workshop on mobile computing , pages 90-100, 1999.
  5. S. Marti, T. J. Giuli, K. Lai, and M. Baker, ―Mitigating routing misbehavior in mobile ad hoc network, In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pages 255–265, 2000
  6. Yonguang Zhang and Wenke Lee, ―Intrusion detection in wireless ad-hoc networks‖, In 6th International Conference on Mobile Computing and Networking (MOBICOM’00), pp. 275– 283, Aug 2000.
  7. B. Dahill, B. N. Levine, E. Royer and C. Shields, ―A secure routing protocol for ad hoc networks, Technical Report UM-CS-2001-037, University of Massachusetts, Department of Computer Science, Aug. 2001.
  8. P. Papadimitratos and Z. J. Haas, ―Secure routing for mobile ad hoc networks, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan 2002.
  9. Y. C. Hu, A. Perrig and D. Johnson, ―Ariadne: A secure on-demand routing protocol for ad hoc networks, Technical Report TR01-383, Rice University, Dec. 2001.
  10. D. B. Johnson et al., ―The dynamic source routing protocol for mobile ad hoc networks (DSR), Internet Draft, MANET working group, Feb 2002.
  11. A. Perrig, R. Canetti, D. Song, and D. Tygar, ―Efficient and secure source authentication for multicast, In Network and Distributed System Security Symposium (NDSS’01), Feb. 2001.
  12. R. Perlman, ― Fault-tolerant broadcast of routing information, In Computer Networks, n. 7, pages 395–405, 1983.
  13. L. Zhou and Z. J. Haas, ―Securing ad hoc networks, IEEE Network Magazine, 13(6):24–30, November/December 1999.
  14. S. Marti, T. J. Giuli, K. Lai, and M. Baker, ―Mitigating routing misbehavior in mobile ad hoc networks, In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pages 255–265, 2000.Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  15. Singh, S. , Woo, M. , Raghavendra, C. S. (1998), ―Power Aware Routing in Mobile ad hoc networks," Proc. of the ACM Mobicom 98, Dallas, October, 1998.
  16. Rodoplu V. and Meng, T. H. (1998), ―Minimum energy mobile wireless networks,"Proc. of the IEEE International Conference on Communications, ICC'98, volume 3, pp. 1633-1639, Atlanda, GA, June 1998.
  17. Chang, J.-H. and Tassiulas, L. (2000), Energy conserving routing in wireless ad-hoc networks," Proc. of the IEEE INFOCOM, Tel Aviv, Israel, Mar. 2000.
  18. Gupta P. and Kumar, P. R. (1998), ―Critical power for asymptotic connectivity in wireless networks," Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming, pp. 547-566, 1998.
  19. Chlamtac, I., Petrioli, C. and Redi, J. (1999), ―Energy conserving access protocols for indentification networks," IEEE/ACM Transactions on Networking, 7(1), pp.51-59, Feb. 1999.
  20. Chockalingam, A. and Zorzi, M. (1998), ―Energy efficiency of media access protocols for mobile data networks," IEEE Transactions on Communications, 46(11), pp. 1418-1421, Nov. 1998
  21. Chen, B., Jamieson, K., Balakrishnan, H. and Morris, R. (2001), ―Span: An energy efficient coordination protocol for topology maintenance in ad hoc wireless networks," In 7th Annual Int. Conf. Mobile Computing and Networking 2001,Rome, Italy, July 2001.
  22. Xu, Y., Heidemann, J. and Estrin, D.(200), ―Adaptive energy-conserving routing for multihop ad hoc networks," Research Report 527 USC/Information Sciences Institute, October 2000.
  23. Lee, Y. Z., Gerla, M., Chen, J., and Caruso, B. Z. A. (2006), ―DFR ("Direction Forward Routing)," Ad Hoc Sensor Wireless Networks, 2(2), pp. 01-18, 2006.
  24. Kettaf, N., Abouaissa, A., Vuduong, T. and Lorenz, P. (2006), ―Admission Control enabled On demand Routing (ACOR)," available at draft-kettaf-manet-acor-00.txt, July 2006.
  25. L. Lamport, ―Password Authentication with Insecure Communication‖, Comm. of ACM, 24 (11), pp. 770-772, Nov. 1981
  26. NS Notes and Documentation, available at www.isi.edu/vint pp 15-64.
  27. Kush A., Gupta P. and Hwang C. J. (2008), ―A Hybrid Stable Routing Protocol for Mobile Ad Hoc Networks," Proc. of the World Wireless Congress" WWC 2008, San Francisco, USA, pp. 19{25, May, 2008.
  28. Kush A., Hwang, C, ―Proposed Protocol For Hash-Secured Routing Adhoc Networks‖, Masaum Journal Of Computing (MJC)(ISSN 2076-0833) Volume: 1 Issue: 2 Month: September 2009 , pp 221-226.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Security Ad hoc networks Routing protocols AODV Power status