Browse > Article

A Study on Secure Routing Protocol using Multi-level Architecture in Mobile Ad Hoc Network  

Yang, Hwan Seok (중부대학교/정보보호학과)
Publication Information
Abstract
Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.
Keywords
Authentication; Wireless Ad Hoc Network; Secure Routing; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kush, A., Hwang, C., Gupta, P., "Secured Routing Scheme for Adhoc Networks," International Journal of Computer Theory and Engineering(IJCTE) 3, pp.1793-1799, 2009.
2 Varadharajan, V., Shankaran, R., Hitchens, M., "Security for cluster based ad hoc networks," Computer Communications, No. 27, Vol. 5, pp.488-501, 2004.   DOI   ScienceOn
3 Gomathi, S., Duraiswamy, K., "Guaranteed Packet Transfer in MANET In and Out of Coverage Areas and Energy Saving Using Random Casting," International Journal on Computer Science and Engineering(IJCSE) 02(03), pp.865-869, 2010.
4 Tseng, Y. Min., "A heterogeneous-network aided public-key management scheme for MANET," Wiley InterScience, International Journal Net. Mgmt Vol. 17, pp.3-15, 2006.
5 V. S. Miller, "The Weil Pairing, and Its Efficient Calculation," Journal of Cryptology, Vol. 17, No. 4, pp.235-261, 2004.
6 Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," WiSe '03: Proceedings of the 2003 ACM workshop on Wireless security, pp.30-40, 2003.
7 K. Hoeper and G. Gong, "Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks," International Conference on AD-HOC Networks & Wireless (AD HOC NOW '06), LNCS 4104, Springer Verlag, pp.224-237, 2006.