Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2007, Proceedings of the 6th Wseas International Conference on Electronics Hardware Wireless and Optical Communications
…
6 pages
1 file
The adhoc on demand distance vector (AODV) protocol enables dynamic, self-starting, multihop routing between participating mobile nodes wishing to establish and maintain an adhoc network. The use of AODV remains a concerned in the situations where security/ trust are the major requirements. The use of AODV is also restricted in the networks characterized by large processing, heavy data flow and uncontrolled overheads. The mechanism proposed in [1] addresses the issues related to overheads and processing in AODV but its use is restricted to network layer only. An endeavor has been made in this paper to propose a more versatile and secure AODV which can be used at network and upper layers.
This paper represents secure AODV protocol for Mobile Adhoc Network(MANET) with the objective that each data packet must be securely reached to the destination. To achieve this objective, we have divided work into two parts, pre-path security and post-path security. In pre-path security we have used secure neighbor discovery. In post-path security we have used hybrid cryptography. The proposed secure AODV protocol aims to provide security to path and data packets. After modifying AODV protocol we get marginally increased packet count, Packet Delivery Ratio and throughput.
Active and Programmable Networks, 2009
2008
The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.
MANET (Mobile and Ad hoc NETworks) is a highly challenged network environment due to its special characteristics such as decentralization, dynamic topology and neighbor based routing. MANET is networks in which nodes are mobile and link connectivity might change all the time. In this kind of networks routing, security and key management are important and complex problems. The problem of routing has been properly ad dressed by the research community. Nevertheless, the research in security and key management has been postponed or relegated to a second term. This thesis work tries to give a solution to the needs in security for MANET networks using as a base a pre-existing routing protocol: Ad Hoc On-Demand Vector Routing (AODV). The selection of AODV is because the author of this research work is one of the contributors to AODV (so he knows perfectly how it works) and because it seemed that it would be the one that could more easily accommodate the needed modifications. The proposed solution in an extension t o AODV called Secure AODV (SAODV). This thesis work includes an enhancement to AODV that allows using shorter routes, which will result in lower end-to-end delays, and longer battery life better than existence works.
International Journal of Managment, IT and Engineering, 2013
Here, authors presents a smart encryption algorithm integrated with existing AODV protocol that enhances the security of routing in MANET. Mobile Ad hoc Network's because of maliciousness that intentionally disrupts the network by using variety of attacks and due to routing protocols (e.g. AODV), which were already developed without considering security features to prevent the various kinds of attacks. And also there is infrastructure less environment, and having open peer-to-peer architecture, shared wireless medium and dynamic topology, MANETs are frequently established in insecure environments like disaster sites and military applications. Ad-hoc On-Demand Distance Vector (AODV) is widely used routing protocol. Author's strategy is to choosing one of the secure routing protocols among all according to its effectiveness. It is analyzed by its functionality and performance measurements. Then, the different existing security techniques (e.g. encryption algorithm.) were surve...
A Mobile ad hoc Network is a wireless network, which is dynamic in nature, that can be simulated by infra structure less connections in which every node itself can act as a router. There are many significant routing protocols proposed for providing significant benefits in terms of performance, reliability, security and many other issues also have been addressed. An efficient way of evaluating the performance of MANETS is to simulate them. Of the many simulators available, Ns-2 has gained increasing popularity because of its many efficient features. The main aim of this simulator is to provide better networking environment for research and educational purposes. In this paper, we try to propose a new routing protocol and tried to implement it on NS-2 . We also tried to compare the results with other protocols.
International Journal of Computer Applications, 2011
The development of mobile ad hoc network advocates selforganized wireless interconnection of communication devices that would either extend or operate in concern with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. One main challenge in design of these networks is their vulnerability to security attacks. Despite the existence of wellknown security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render such traditional solutions inapplicable. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. In MANET, any node may compromise the routing protocol functionality by disrupting the route discovery process. In this paper, we understand the various security related issues related to mobile ad hoc network. The security to the network is provided by using cryptographic schemes to build a highly secure framework
The adhoc environment is accessible to both legitimate network users and unfortunately to malicious attackers as well. Secure routing over mobile adhoc networks is hard to achieve because of dynamic topology, mobility of nodes, lack of centralized infrastructure and absence of a certification authority. When a new mobile node joins the network and it does not have any trust based relationship with other nodes in the network, the problem of secure routing may arise. While implementing data encryption and decryption in a symmetric cryptosystem, secure distribution of the secret key to legitimate nodes can be a challenge. In this paper, common secret key has been established for symmetric encryption over adhoc networks using Diffie-Hellman key agreement protocol. The concept can be used to develop a new routing protocol for mobile adhoc networks which will provide maximum security against all kinds of attacks.
International Journal of Information Technology and Computer Science, 2013
Similar to conventional wireless networks, WSNs are based on multi hop routing to ensure connectivity and data forwarding which makes the routing service a challenging task due to the nature of sensors usually limited in memory, battery and computing capacities as well as the nature of the environment which is hostile and unpredictable making the routing protocols developed for conventional wireless network useless for WSNs without modifications and adaptations for the new context of WSNs. Thus in this paper we present an optimized version of AODV protocol for WSNs which takes into consideration the traffic pattern of WSNs and sensors' constraints. In the proposed protocol we affect the task of route discovery to the base station which periodically informs sensors about its location instead of letting this task to sensors which consumes the network resources due to the broadcasting nature of the route discovery. We have also proposed a key distribution scheme destined to establish a symmetric encrypting key between each sensor and the base station, the proposed key management scheme uses the underlying routing requests to execute handshakes and key update which have greatly saved the network resources and ensured a good threshold of security.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Advanced Computer Science and Applications, 2011
International Journal of Computer Science & Engineering Survey, 2012
International Journal of Computer Applications, 2011
International Journal of Engineering Research and Technology (IJERT), 2014
International Journal of Computer Applications, 2011
IJSRD, 2013
International Journal of Computer Applications, 2016
International Journal of Communication Systems, 2014