ENGINEERING & TECHNOLOGY IN INDIA

Strength for Today and Bright Hope for Tomorrow

Volume 1:1 February 2016

Chief Editor
Dr. D. Nagarathinam, Ph.D., M.E. (R&AC), AMIME (Mech.)

Editors
         Dr. P. N. Rajnarayanan, Ph.D. (Power System Control), M.E. (Power Systems)
         Dr. K. Sudalaimani, M.E., Ph.D. (Civil Engineering)
         Dr. S. Ramanathan, Ph.D. (Chemistry)

Language and Style Advisors
         G. Baskaran, Ph.D.
         Sam Mohanlal, Ph.D.

Executive Editor
         M. S. Thirumalai, Ph.D.

Back Issues of Engineering & Technology in India - From 2016

HOME PAGE



BOOKS FOR YOU TO READ AND DOWNLOAD FREE!


BACK ISSUES


  • E-mail your articles and book-length reports to engineeringandtechnologyindia@gmail.com.
  • Your articles and book-length reports should be written following standard Stylesheets such as ASME reference and citation models.
  • The Editorial Board has the right to accept, reject, or suggest modifications to the articles submitted for publication, and to make suitable stylistic adjustments. High quality, academic integrity, ethics and morals are expected from the authors and discussants.
  • Would you like to announce the dates and venues of your conferences, seminars, etc., and also publish the outline proceedings of these programs? Send a report to Engineering & Technology in India, engineeringandtechnologyindia@gmail.com..

Copyright © 2015
M. S. Thirumalai




A Secure Routing Protocol for Mobile Ad hoc Network

K. Rajeshkumar


Abstract

To secure a mobile ad hoc network (MANET) inadversarial environment, a particularly challenging problem is how to feasibly detect and defend possible attacks on routing protocols, particularly internal attacks, such as a Byzantine attack. In this paper, we propose a novel algorithm that detects internal attacks by using both message and route redundancy during route discovery. The route-discovery messages are protected by pair wise secret keys between a source and destination and some intermediate nodes along a route established by using public key cryptographic mechanisms. We also propose an optimal routing algorithm with routing metric combining both requirements on a node’s trustworthiness and performance. A node builds up the trustworthiness on its neighboring nodes based on its observations on the behaviors of the neighbor nodes. Both of the proposed algorithms can be integrated into existing routing protocols for MANETs, such as ad hoc on demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present such an integrated protocol called secure routing against collusion (SRAC), in which a node makes a routing decision based on its trust of its neighboring nodes and the performance provided by them. The simulation results have demonstrated the significant advantages of the proposed attack detection and routing algorithm over some known protocols.

Keywords: Secure Routing Protocol, Mobile Ad hoc Network.

Introduction

Mobile Ad hoc Networks

As the popularity of mobile devices and wireless networks significantly increased over the past years, wireless ad hoc networks has now become one of the most vibrant and active fields of communication and networking research. Given many intriguing future applications, there are still some critical challenges and open problems to be solved.

QOS is a guarantee by the network to provide certain performance for a flow in terms of the quantities of bandwidth, delay, jitter, packet loss probability etc. Ad hoc networks make the appear an even more challenging problem than ever before, despite some of re-active routing protocols can be configured to return only paths that comply with certain desired parameters. Bandwidth is seriously limited. Our ultimate goal is to provide a model from the application layer to the MAC layer for supporting service differentiation. A transport layer protocol to support different data streams, queue management and a -supported MAC will be addressed in our future work.


This is only the beginning part of the article. PLEASE CLICK HERE TO READ THE ENTIRE ARTICLE IN PRINTER-FRIENDLY VERSION.


K. Rajeshkumar
Department of Computer Science and Engineering
Theni Kammavar Sangam College of Technology
Theni 625 534
Tamilnadu
India
kumar85rajesh@gmail.com



CONTACT EDITOR