An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks

Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs becaus...

Full description

Bibliographic Details
Main Authors: C.C. Suma, H.L. Gururaj, B. Ramesh
Format: Article
Language:English
Published: "Nicolae Titulescu" University of Bucharest 2017-01-01
Series:Computational Methods in Social Sciences
Subjects:
Online Access:http://cmss.univnt.ro/wp-content/uploads/vol/split/vol_IV_issue_2/CMSS_vol_IV_issue_2_art.001.pdf
_version_ 1827850646663987200
author C.C. Suma
H.L. Gururaj
B. Ramesh
author_facet C.C. Suma
H.L. Gururaj
B. Ramesh
author_sort C.C. Suma
collection DOAJ
description Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.
first_indexed 2024-03-12T10:21:25Z
format Article
id doaj.art-238dcb0c7d1544408149dab14dff3760
institution Directory Open Access Journal
issn 2344-1232
2344-1232
language English
last_indexed 2024-03-12T10:21:25Z
publishDate 2017-01-01
publisher "Nicolae Titulescu" University of Bucharest
record_format Article
series Computational Methods in Social Sciences
spelling doaj.art-238dcb0c7d1544408149dab14dff37602023-09-02T10:05:18Zeng"Nicolae Titulescu" University of BucharestComputational Methods in Social Sciences2344-12322344-12322017-01-0142511An authenticated encrypted routing protocol against attacks in mobile ad-hoc networksC.C. Suma0H.L. Gururaj1B. Ramesh2PG scholar, Dept of CS&E, Malnad College of Engineering, Hassan, IndiaAssistant Professor, Dept of CS&E, Malnad College of Engineering, Hassan, IndiaProfessor, Dept of CS&E, Malnad College of Engineering, Hassan, IndiaMobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.http://cmss.univnt.ro/wp-content/uploads/vol/split/vol_IV_issue_2/CMSS_vol_IV_issue_2_art.001.pdfAnonymityAuthenticated routingMobile-ad-hoc networks(MANETs)Group signature
spellingShingle C.C. Suma
H.L. Gururaj
B. Ramesh
An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks
Computational Methods in Social Sciences
Anonymity
Authenticated routing
Mobile-ad-hoc networks(MANETs)
Group signature
title An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks
title_full An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks
title_fullStr An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks
title_full_unstemmed An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks
title_short An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks
title_sort authenticated encrypted routing protocol against attacks in mobile ad hoc networks
topic Anonymity
Authenticated routing
Mobile-ad-hoc networks(MANETs)
Group signature
url http://cmss.univnt.ro/wp-content/uploads/vol/split/vol_IV_issue_2/CMSS_vol_IV_issue_2_art.001.pdf
work_keys_str_mv AT ccsuma anauthenticatedencryptedroutingprotocolagainstattacksinmobileadhocnetworks
AT hlgururaj anauthenticatedencryptedroutingprotocolagainstattacksinmobileadhocnetworks
AT bramesh anauthenticatedencryptedroutingprotocolagainstattacksinmobileadhocnetworks
AT ccsuma authenticatedencryptedroutingprotocolagainstattacksinmobileadhocnetworks
AT hlgururaj authenticatedencryptedroutingprotocolagainstattacksinmobileadhocnetworks
AT bramesh authenticatedencryptedroutingprotocolagainstattacksinmobileadhocnetworks