Open Access Open Access  Restricted Access Subscription or Fee Access

Analysis of Reliable Secure Transmission for Unobservable Secure Table Driven Protocol

S. Vimal, R. Laxminarayanan, V. Jackins, L. Jerartjulus


USOR solves the problem of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can’t incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N[12]. which is a routing protocol that uses the decentralization of the knowledge about the best route through the network — no single node has all the data. This technique eliminates the need to spread information concerning network changes to every node in the network. The individual node only saves information about the ―direction‖ it received data from and sends its data accordingly. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.USOR schemes delivery packet ratio has been an enormous session management system in networking communications.


USOR, ID- Based Encryption, B. A. T. M. A. N

Full Text:



J. Kong and X. Hong, ―ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks,‖ in Proc. ACM MOBIHOC’ 03, pp. 291–302.

B. Zhu, Z. Wan, F. Bao, R. H. Deng, and M. KankanHalli, ―Anonymous secure routing in mobile ad-hoc networks,‖ in Proc. 2004 IEEE Conference on Local Computer Networks, pp. 102–108.

L. Song, L. Korba, and G. Yee, ―AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks,‖ in Proc. 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 33–42.

A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, ―SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks,‖ in Proc. 2004 IEEE LCN, pp. 618–624.

D. Sy, R. Chen, and L. Bao, ―ODAR: on-demand anonymous routing in ad hoc networks,‖ in 2006 IEEE Conference on Mobile Ad-hoc and Sensor Systems.

Y. Zhang, W. Liu, and W. Lou, ―Anonymous communications in mobile ad hoc networks,‖ in 2005 IEEE INFOCOM.

K. E. Defrawy and G. Tsudik, ―ALARM: anonymous location-aided routing in suspicious MANETs,‖ IEEE Trans. Mobile Comput., vol. 10, no. 9, pp. 1345–1358, 2011.

David Johnson, Ntsibane Ntlatlapa, and Corinna Aichel , ―Simple pragmatic approach to mesh routing using BATMAN‖, 2nd IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries, 2008

Elis Kulla, Makoto Ikeda, Leonard Brolli, Rozeta Miho, ―Impact of Source and Destination Movement on MANET Performance Considering BATMAN and AODV Protocols‖, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

Dr. V. Kavitha, S. Balaji, R. Jeeva,‖ ESAC Based Channel Aware Routing Using Route Handoff‖, International Journal on Computer Science and Engineering (IJCSE).

Dr. V. Kavitha , S. Balaji , R. Jeeva,‖ RMAC-A New Encryption Scheme for Arithmetic Coding to evade CCA Attacks‖, in 2011 IEEE Conference on Advanced Computing.

Zhiguo Wan, Kui Ren, and Ming Gu, ―USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks‖, in IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 5, MAY 2012..

G. Riley, "The Georgia Tech Network Simulator," in ACMSIGCOMM Workshop on Models, Methods and Tools for Reproducible Network Research Karlsruhe, Germany, 2003

T. Clouqueur, V. Phipatanasuphorn, P. Ramanathan and K. k. Saluja,―Sensor Deployment Strategy for Target Detection,‖ First ACM International Workshop on Wireless Sensor Networks and Applications,2002.

W.R. Heinzelman, A. Chandrakasan, and H.Balakrishnan, "Energy- Efficient Communication Protocol for Wireless Sensor Networks," in Proceedings of the 33th Hawaii International Conference on System Sciences. vol. 2, 2000

R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms and Applications. Upper Saddle River, NJ: Prentice-Hall, 1993.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.