Design and Development of a Secured Routing Scheme for Mobile Ad hoc Networks (MANETs)

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Sep to Oct Issue 2011 by IJCTT Journal
Volume-1 Issue-2                          
Year of Publication : 2011
Authors :Payal Kansal, Viksit Kumar Sharma, Shashiraj Teotia, Dr. Sohan Garg.

MLA

Payal Kansal, Viksit Kumar Sharma, Shashiraj Teotia, Dr. Sohan Garg. "Design and Development of a Secured Routing Scheme for Mobile Ad hoc Networks (MANETs)"International Journal of Computer Trends and Technology (IJCTT),V2(2):325-331  Sep to Oct Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - The development of Ad hoc Wireless Networks advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, MANETs do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. One main challenge in design of these networks is their vulnerability to security attacks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render such traditional solutions inapplicable. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. In MANET, any node may compromise the routing protocol functionality by disrupting the route discovery process. In this paper, we understand the various security related issues related to MANET. The security to the network is provided by using cryptographic schemes to build a highly secure framework

References-

[1] M. J. Neely. Dynamic Power Allocation and Routing for Satellite and Wireless Networks with Time Varying Channels. PhD thesis, Massachusetts Institute of Technology, LIDS, 2003.
[2] M. J. Neely and E. Modiano.” Capacity and delay tradeoffs for ad-hoc mobile networks”. (Invited Paper) IEEE BroadNets, San Jose, CA, Oct. 2004.
[3] R.L. Cruz and A. V. Santhanam.” Hierarchical link scheduling and power control in multihop wireless networks.” Proceedings of the 40th Annual Allerton Conference on Communication, Control, and Computing, Oct.2002.
[4] M. J. Neely, E. Modiano, and C. E Rohrs. “Dynamic power allocation and routing for time varying wireless networks”. IEEE Journal on Selected. Areas in Communications, January 2005.
[5] M. Grossglauser and D. Tse. “Mobility increases the capacity of ad-hoc wireless networks”. Proceedings of IEEE INFOCOM, 2001.
[6] P. Gupta and P.R. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, vol. 46, no. 2:pp. 388–404, March2000.
[7] N. Bansal and Z. Liu. “Capacity, delay and mobility in wireless ad-hoc networks”. IEEE Proceedings of INFOCOM, April 2003.
[8] M. Grossglauser and M. Vetterli. “Locating nodes with ease: Last encounter routing in ad hoc networks through mobility diffusion”. IEEE Proceedings of INFOCOM, April 2003.
[9] Bruce Schneier. Secrets and Lies. Digital Security in a Networked World. John Wiley $ Sons, Inc, 1st edition, 2000.
[10] Bradley R. Smith, Shree Murthy, and J.J. Garcia-Luna-Aceves. “Securing distance-vector routing protocols.” In Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA, pages 85–92, February 1997.
[11] Po-Wah Yau and Chris J. Mitchell. “Reputation methods for routing security for mobile ad hoc networks.” In Joint IST Workshop on Mobile Future and Symposium on Trends in Communications (SympoTIC ’03), Bratislava, Slovakia, October 2003.
[12] Seung Yi, Prasad Naldurg, and Robin Kravets. “Security-aware ad-hoc routing for wireless networks”. MobiHOC Poster Session, 2001.

KeywordsCryptography, Genetic Algorithm, Ad hoc Wireless Networks, Security