Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Routing in Wireless Ad-hoc Network using ARD Mechanism and Elliptic Curve Routing Algorithm

C. Chandra Prabha, Dr. S. Krishnaveni

Abstract


Ad-hoc networks are utilized to setupwirelesscommunicationsintoday’senvironment for more advanced infrastructure. It has become more essential for large places to centralize the main point to authorize and authenticate with the changing nature of network topology. There are number of attacks that can be used to manipulate the routing in an ad-hoc network. The protocol, named Authentication Routing Dynamic (ARD) for Ad-hoc networks, uses encrypting mechanisms to defeat all identified attacks. This ARD mechanism detects and protects malicious actions by third parties and peers. It also presentssecurity, message reliability and non-repudiation to routing in ad-hoc networks. It isan important issue in any wireless network. Many protocols are being designed for providing security in ad-hoc network to protect the data or network from various threads and attacks. Security is being provided by Elliptic Curve Routing Algorithm (ECRA) which consumes less energy and provides greater security over the network. It proposed protocols such as AODV and OSP present in the network.


Keywords


Wireless Ad-Hoc Network, ARD Mechanism, Open Shortest Path Routing Protocol, Elliptic Curve Routing Algorithm, AODV Protocol, Digital Signatures, Certificates.

Full Text:

PDF

References


B Narasimhan, R Vadivel, “Secured Reliable Multipath Routing Protocol (SRMRP) using Trust Computation and Carrier Sense Multiple Access with Collision Intimation (CSMA/CI) for Heterogeneous IP-based Mobile Ad-hoc Networks”, International Journal of Computer Applications, vol. 60, pp:12-16, 2012.

Ms. Reshna Wilson A, Mr. BijuBalakrishnan, “Securing Location and trust extended authentication in mobile ad hoc network” International Journal of Innovative Research in Computer and Communication Engineering, vol.2, special issue 1, pp: 4103 – 4108, 2013.

Arafat S.M. Qaed and T Devi, “Link Quality, delay and energy Aware Routing Protocol (LQDEARP) for Mobile AD HOC Networks”, International Journal of Computer and Communication Technology, vol. 4, pp: 49-54, 2013.

MoazamBidaki and Mohammad Masdar, (2013), “Reputation based Clustering Algorithms in MANET”, IJAST, Vol-54.

Heenavarshney and Pradeepkumar, (2013), “Secure Communication architecture on “BBCMS” clustering algorithm for MANET”, IJITEE, Vol-3.

Murthy, C.S.R and Manoj, B.S. (2008), “Ad Hoc Wireless Networks”, Pearson Education.

Balakrishnan, V.,Varadharajan, V., Tupakula, U.K. and Lucs, P.(2007), “Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks,” ISWCS 2007, pp. 592-596.

Mu, C., Li, X., Huang, H. and S. Tian, (2008), “Online RiskAssessment of Intrusion Scenarios Using D-S Evidence Theory,” Proc.13th European Symp. Research in Computer Security (ESORICS '08),pp. 35-48.

Basagni, S., Chlamtac, I., Syrotiuk, V. and Woodward, B. (1998), “Adistance routing effect algorithm for mobility (DREAM)”, in Proc.ACM Mobicom’98, pp. 76 - 84.

Marti, S. (2000), “Mitigating Routing Misbehavior in Mobile Ad-hoc Networks,” 6th MobiCom, Boston, MA.

Balakrishnan, V.,Varadharajan, V., Tupakula, U.K. and Lucs, P.(2007),“Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks,” ISWCS 2007, pp. 592-596.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.