Open Access Open Access  Restricted Access Subscription or Fee Access

Hybrid Cryptographic Public Key Infrastructure Framework for Scalable Manets

Dalveer Kaur, Manju Sharma

Abstract


Mobile ad-hoc network is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. These networks introduced a new art of network establishment and can be well suited for an environment where either the infrastructure is lost or where deploy an infrastructure is not very cost effective. Due to mobility of nodes there is always a problem of providing secure communication in MANETs. Most of the attacks performed by malicious nodes can be detected and defended against by the use of secure routing protocols like AODV, DSR, SEAD, SPAAR, SRP but there remain the attacks that an authenticated selfish node can perform. To overcome this problem we propose here a new protocol named as “Authenticated Route Discovery for Adhoc Networks”. To provide the secure and reliable communication we propose an algorithm to find best route for the node because it uses the process to issue the certificates to each node. This algorithm is ignoring the malicious nodes that comes in the track of real nodes. Node table of all the nodes are stored on the server and there is a range defined to make the network scalable. There all features are providing the extension to seniority based Public Key Infrastructure model.

Keywords


AODV, ARAN, CRYPTOGRAPHY, PKI

Full Text:

PDF

References


C. E. Perkins, Ad hoc Networking, Addison-Wesley, San Francisco, CA, 2001.

V. Karpijoki, “Security in Ad Hoc Networks,”

D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Kluwer Academic Publishers, Vol 353, 1996, pp. 153-181.

Stephen Carter and Alec Yasinsac, Secure Position Aided Ad hoc Routing Protocol. Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), Nov 3-4, 2002

C. S. R. Murthy and B. S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall PTR, 2004.

Z. J. Haas, The Routing Algorithm for the Reconfigurable Wireless Networks, Proc. of ICUPC 1997, Vol 2, Oct. 1997, pp. 562-566.

W. Stallings, Cryptography and Network Security: Principles and Practice (2nd ed.), Prentice Hall, Inc., Upper Saddle River, NJ, 1999.

BOSE, P., MORIN, P., STOJMENOVIC, I. & URRUTIA, J. (2001) Routing with GuAuthenticated route discovery for adhoc networksteed Delivery in Ad Hoc Wireless Networks. Wireless Networks, 7, 609- 616.

Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc networks,” Proc. 6th Int’l. Conf. Mobile Comp. Net., MobiCom 2000, Aug. 2000, pp. 275–83.

David C. Plummer. An Ethernet Address Resolution Protocol: Or Converting Network Protocol Address to 48.bit Ethernet Addresses for Transmission on Ethernet Hardware. RFC 826, November 1982.

DavidA.Maltz, JoshBroch, and David B. Johnson. Experiences Designing andBuilding a Multi-Hop Wireless Ad Hoc Network Testbed. Technical Report 99-116, School of Computer Science, Carnegie Mellon University, March 1999. Available from http://www.monarch.cs.cmu.edu/papers.html.

E.M. Gafni and D.P. Bertsekas. Distributed algorithms for generating loop-free routes in networks with frequently changing topology. IEEE Transactions on Communications, 29(1):11–18, January 1981.

S. Murphy, “Routing Protocol Threat Analysis,” Internet Draft, draft-murphy-threat-00.txt, October 2002.

Y.-C. Hu, A. Perrig, and D.B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad hoc Networks,” Proc. 22nd Annual Joint Conf. IEEE Computer and Communications Societies (Infocom’03), San Francisco, CA, April 2003.

Black mail [21] Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks,” Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.

Y. Hu, D. Johnson, and A. Perrig, “Sead: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” IEEE WMCSA, 2002.

S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad hoc Networks,” Proc. 6th Annual ACM/IEEE Int’l. Conf. Mobile Computing and Networking (Mobicom’00), Boston, Massachusetts, August 2000, pp. 255-265.

S. Yi, P. Naldurg, and R. Kravets Security-Aware Ad hoc Routing for Wireless Networks The Second ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc'01), 2001.(another version Security-Aware Ad Hoc Routing Protocol for Wireless Networks, Report, August, 2001)


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.