Open Access Open Access  Restricted Access Subscription or Fee Access

Efficient Secure Routing Protocol for Ad hoc Networks

V. Vanitha, Dr.G. Mohankumar


Ad Hoc network is more convenient and cheaper than the networks with infrastructure in the usage and setup. As to wire network, the router and the terminals are also existed in Ad Hoc network. Compared with the roles of nodes in wire network, the major differences are which act two different roles meanwhile in Ad Hoc network. In practice, it is not only to research in communication security but also to setup the correct route becomes a very important subject. In this paper, we propose a new secure routing protocol based on IDMAC (Identity-Based Message Access code). According to our analysis, this scheme can prevent the problems of routing forging, modifying, and identity authentication on the Ad-Hoc network. Furthermore, we look into a number of “single-copy” routing schemes that use only one copy per message, and hence significantly reduce the resource requirements of flooding-based algorithms. We use NS2 (Network Simulator) to simulate our scheme and discuss how well the efficiency is from the simulation results.


Ad Hoc Network, AODV, ID-MAC Intermittent Connectivity

Full Text:



Z.J. Hass and M.R. Pearlman, “The Performance of Query Control Schemes for the Zone Routing Protocol”, IEEE/ACM Transactions on Networking, Vol. 9, No.4, pp.427-438, August 2001.

D. Johnson, D. Maltz, and J. Jetcheva, “The dynamic source routing protocol for mobile ad hoc networks,”, July 19, 2004.

J. Jubin and J. D. Tornow. “The DARPA packet radio network protocols,” Proceedings of the IEEE, Vol. 75, pp.21-32, 1987.

P. Ning and K. Sun, “How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols,” Proceedings of the 4th Annual IEEE Information Assurance Workshop, pp. 60-67, June 2003.

C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers,” ACM SIGCOMM’94, 1994.

E. M. Royer and C. K. Toh. “A Review of Current Routing Protocols for Ad hoc Mobile Wireless Networks,” IEEE Personal Communications Magazine, April 1999.

B. Dahill, K. Sanzgiri, B. N. Levine, C. Shields, and E. Royer, “A Secure Routing Protocol for Ad Hoc Networks,” in Proceeding of 10th IEEE International Conference on Network Protocols (ICNP 2002), pp. 78-87, Nov. 2002.

Y. C. Hu, D. B. Johnson, and A. Perrig., “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, June 2002.

Y. C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks,” in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12-23, Sep. 2002.

P. Papadimitratos and Z. J. Haas, “Secure message transmission in mobile ad hoc networks,” Ad Hoc Networks Journal, Vol. 1, No.1, pp.193-209, 2003.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.