High Secure Routing Protocol with Authentication and Confidentiality Increased in Wireless Ad Hoc Networks

被引:0
作者
Mahdi Taheri
Mahdi Bagheri
机构
[1] Islamic Azad University,Saveh Branch, Department of Electrical engineering
来源
Arabian Journal for Science and Engineering | 2014年 / 39卷
关键词
Security; Routing; Digital Signature; Hash function; Confidentiality; NS-2;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless mobile ad hoc networks are the special type of networks where a collection of mobile devices forms a temporary network without any established infrastructure aid. Having no central infrastructure and random devices movement cause some problems in ad hoc networks such as routing and security. Routing is a critical function in mobile ad hoc networks. The most important requirement for routing protocols is the capability to act in adversarial environments. In this article a secure routing algorithm is suggested to increase confidentiality and authentication in ad hoc routing protocols. The secure routing algorithm presented with two methods high secure AODV authenticated with asymmetric algorithms (HSAODV1) and high secure AODV authenticated with MAC algorithms (HSAODV2) which every one of them has two phases as follows: at the first phase of HSAODV1, the source, destination and intermediate nodes authenticate by using digital signature and asymmetric algorithms, and in the second phase, the protocol utilizes one way key-chain for increased data confidentiality. In the first phase of HSAODV2, the destination and intermediate nodes authenticate by using MAC algorithm for source node and the second phase operates approximately as the second phase of HSAODV1. In order to assess the functionality of these algorithms, security matrix, normalized routing overhead and energy consumption are evaluated for the proposed algorithm.
引用
收藏
页码:1135 / 1145
页数:10
相关论文
共 19 条
[1]  
Hu Y.C.(2005)Ariadne: a secure on-demand routing protocol for ad hoc networks Wirel. Netw. 11 21-38
[2]  
Perrig A.(2007)An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks IEEE J. Mag. Commun. 25 192-203
[3]  
Johnson D.B.(2007)A survey of routing attacks in mobile ad hoc networks IEEE Wirel. Commun. 14 85-91
[4]  
Chou C.(2008)Impact of denial of service attacks on ad hoc networks IEEE ACM Trans. Netw. 16 791-802
[5]  
Wei D.S.L.(2009)Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment Eur. J. Sci. Res. 32 430-443
[6]  
Kuo C.C.J.(2009)Simulation study of blackhole attack in the mobile ad hoc networks J. Eng. Sci. Technol. 4 243-250
[7]  
Naik K.(undefined)undefined undefined undefined undefined-undefined
[8]  
Kannhavong B.(undefined)undefined undefined undefined undefined-undefined
[9]  
Nakayama H.(undefined)undefined undefined undefined undefined-undefined
[10]  
Nemoto Y.(undefined)undefined undefined undefined undefined-undefined