Design of a Scheme for Secure Rouitng in Mobile Adhoc Networks
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© July to Aug Issue 2011 by IJCTT Journal|
|Volume-1 Issue-3 |
|Year of Publication : 2011|
|Authors : Sesha Bhargavi Velagaleti, Dr.M.Seetha, Dr.S.Viswanadha Raju.|
Sesha Bhargavi Velagaleti, Dr.M.Seetha, Dr.S.Viswanadha Raju. "Design of a Scheme for Secure Rouitng in Mobile Adhoc Networks"International Journal of Computer Trends and Technology (IJCTT),V1(3):332-335 July to Aug Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: — A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of high demand in sharing streaming video and audio in various applications, one MANET could be setup quickly to facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that have been uncovered, some attacks involving multiple nodes still receive little attention. A reason behind this is because people make use of security mechanisms applicable to wired networks in MANET and overlook the security measures that apply to MANET. Furthermore, it may also have to do with the fact that no survey or taxonomy has been done to clarify the characteristics of different multiple node attacks. In this paper, we briefly discuss about the security problems with the existing protocols and further discuss possible solutions for them.
 P. Papadimitratos, and Z.J. Haas, “Securing the Internet Routing Infrastructure,” IEEE Communications, vol. 10, no. 40, October 2002, pp. 60-68.
 R. Perlman, “Network Layer Protocols with Byzantine Robustness,” Ph.D. Dissertation, MIT/LCS/TR-429, MIT, October 1988.
 B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,” WISE’02, Atlanta, Georgia, September 2002, pp. 21-30.
 J.-F. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems,” Proc. Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 2000, pp. 7-26.
 J. Lundberg, “Routing Security in Ad hoc Networks,” http://citeseer.nj.nec.com/400961.html.
 Y.-C. Hu, A. Perrig, and D.B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad hoc Networks,” Proc. 22nd Annual Joint Conf. IEEE Computer and Communications Societies (Infocom’03), San Francisco, CA, April 2003.
 Y.-C. Hu, D.B. Johnson, and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks,” Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
 L. Zhou, and Z.J. Haas, “Securing Ad hoc Networks,” IEEE Network Magazine, vol. 6, no. 13, November/December 1999, pp. 24-30.
 F. Stajano, and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks,” Proc. 7th Int’l. Workshop on Security Protocols, Cambridge, UK, April 1999, pp. 172-194.
 An Analysis of Collaborative Attacks on Mobile Ad hoc Networks Cong Hoan Vu, Adeyinka Soneye, School of Computing Blekinge Institute of Technology Soft Center SE – 37225 RONNEBY,Sweeden.
KeywordsMobile Ad Hoc Network, Security, Protocols, Attacks.