CFP last date
20 December 2024
Reseach Article

Secured Approach to Routing in Mobile Ad Hoc Networks

by Rajdeep Singh, Vaishali Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 38 - Number 5
Year of Publication: 2012
Authors: Rajdeep Singh, Vaishali Gupta
10.5120/4688-6818

Rajdeep Singh, Vaishali Gupta . Secured Approach to Routing in Mobile Ad Hoc Networks. International Journal of Computer Applications. 38, 5 ( January 2012), 39-43. DOI=10.5120/4688-6818

@article{ 10.5120/4688-6818,
author = { Rajdeep Singh, Vaishali Gupta },
title = { Secured Approach to Routing in Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 38 },
number = { 5 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume38/number5/4688-6818/ },
doi = { 10.5120/4688-6818 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:24:48.610066+05:30
%A Rajdeep Singh
%A Vaishali Gupta
%T Secured Approach to Routing in Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 38
%N 5
%P 39-43
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The main objective is to put an effort to improve security in routing protocols, especially Clustered routing Protocol using concepts of Threshold Cryptography of distributed key management and certification. Today, networks security, whatever they are wireless or not, is an important component in the network management. The works done and studied so far are limited either up to one hop networks or for application layer services only. This work thus has been proposed to implement threshold cryptography over Clustered Based Routing Protocol. This work thus has been proposed to implement threshold cryptography over Clustered Based Routing Protocol and to study its behavior of packet flow on the basis of average packet delay in which key size is compared versus number of shareholders.

References
  1. Lidong Zhou, Zygmunt J. Haas, Cornell University, Ithaca, NY, “Securing Ad Hoc Networks”, IEEE Network, 1999.
  2. Ghassan Chaddoud, Department of Scientific Services, Atomic Energy Commission of Syria, Keith Martin, Information Security Group, Royal Holloway, University of London, “Distributed Certificate Authority in Cluster-based Ad hoc networks”, ICMU 2006.
  3. Adi Shamir, Massachusetts Instt of Technology, “How to Share a secret”.
  4. Subhankar Das, San Jose State University, “MANET: Applications, Issues and Challenges for the Future”, Int’l J. of Business Data Communications and Networking, 1(2), 66-92, April-June 2005.
  5. Charles E. Perkins, “Ad Hoc Networking” Pearson Education, 2001.
  6. Krishna Gorantala, “Routing Protocols in Mobile Ad-hoc Networks”, UMEA University, Sweden, 2006.
  7. Elizabeth M. Royer, University of California, Santa Barbara, Chai-Keong Toh, Georgia Institute of Technology, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communications, April 1999.
  8. Ching-Chuan Chiang, Hsiao-Kuang Wu, Winston Liu, Mario Gerla Computer Science Department University of California, Los Angeles, “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel” Proc. IEEE SlCON '97, Apr. 1997, pp. 197-211.
  9. Jian Wan, Daomin Yuan, Xianghua Xu, Grid and Services Computing Lab, Hangzhou Dianzi University Hangzhou, China, “A Review of Cluster Formation Mechanism for Clustering Routing Protocols”,11th IEEE International Conference on Communication Technology roceedings, 2008.
  10. Yang Qin, School of EEE Nanyang Technological University Singapore, Kong Ling Pang Research and Development Division Olympus Technologies Singapore Pte Ltd Singapore, “A Fault-tolerance Cluster Head Based Routing Protocol for Ad Hoc Networks”, IEEE, 2008.
  11. Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang, “Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks”, Ninth International Conference on Network Protocols (ICNP’01), pages 251–260, 2001.
  12. Tony Larsson, Nicklas Hedman, Lulea University of Technology, Stockholm “Routing protocols in Wireless Ad-hoc Networks- A Simulation Study”, 1998.
  13. Haiyun Luo, Songwu Lu, Computer Science Department University of California, Los Angeles Los Angeles, CA 90095-1596, “Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks”October 2000.
  14. Mingliang Jiang, Jinyang Li, Y.C. Tay, draft-ietf-manet-cbrp-spec-01, 14 August 1999.
  15. R.L. Rivest, A. Shamir, and L. Adleman, Massachusetts Institute of Technology, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”.
  16. M. Gerla and J. T. C. Tsai, “Multicluster, Mobile Multimedia Radio Networks”, wireless networks vol.I 1995, pp. 255-265.
  17. Kaixin Xu, Xiaoyan Hong, M. Gerla, “An Ad hoc Network with Mobile Backbones”, ICC 2002. IEEE International Conference, Volume 5, 2002, pp. 3138-3143.
  18. C.R. Lin, and M. Gerla, “Adaptive Clustering for Mobile Wireless Networks”, IEEE Journal on selected arrears in communications, Vol. 15, No.7, Seq. 1997, pp. 1265-1275.
  19. Alia Fourati, Khaldoun Al Agha, “A shared secret-based algorithm for securing the OLSR routing protocol”, 2005
  20. Arun Khetrapal, Deptt. Of Computer Engineering, Delhi College of engineering, Delhi University, “Routing Techniques for Mobile Ad Hoc Networks Classification and Qualitative/ Quantitative Analysis”.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Networks Key Management Threshold Cryptography Clustered Routing