Secure Data Transmission in Mobile Ad Hoc Networks
#1

ABSTRACT
The vision of nomadic computing with its ubiquitous access hasstimulated much interest in the Mobile Ad Hoc Networking(MANET) technology. However, its proliferation strongly dependson the availability of security provisions, among other factors. In theopen, collaborative MANET environment practically any node canmaliciously or selfishly disrupt and deny communication of othernodes. In this paper, we present and evaluate the Secure MessageTransmission (SMT) protocol, which safeguards the datatransmission against arbitrary malicious behavior of other nodes.SMT is a lightweight, yet very effective, protocol that can operatesolely in an end-to-end manner. It exploits the redundancy of multipathrouting and adapts its operation to remain efficient andeffective even in highly adverse environments. SMT is capable ofdelivering up to 250% more data messages than a protocol that doesnot secure the data transmission. Moreover, SMT outperforms analternative single-path protocol, a secure data forwarding protocolwe term Secure Single Path (SSP) protocol. SMT imposes up to68% less routing overhead than SSP, delivers up to 22% more datapackets and achieves end-to-end delays that are up to 94% lowerthan those of SSP. Thus, SMT is better suited to support QoS forreal-time communications in the ad hoc networking environment.The security of data transmission is achieved without restrictiveassumptions on the network nodes’ trust and network membership,without the use of intrusion detection schemes, and at the expenseof moderate multi-path transmission overhead only. C.2 [Computer-Communication Networks]: Network protocols,Security and protection; C.4 [Performance of Systems]: FaulttoleranceGeneral TermsSecurity, Reliability, Performance, Algorithms
KeywordsMANET security, Secure Message Transmission, Multi-pathRouting, Secure Routing, Secure Routing Protocol
1. INTRODUCTION
The communication in mobile ad hoc networks comprises twophases, the route discovery and the data transmission. In an adverseenvironment, both phases are vulnerable to a variety of attacks.First, adversaries can disrupt the route discovery by impersonatingthe destination, by responding with stale or corrupted routinginformation, or by disseminating forged control traffic. This way,attackers can obstruct the propagation of legitimate route controltraffic and adversely influence the topological knowledge of benignnodes. However, adversaries can also disrupt the data transmissionphase and, thus, incur significant data loss by tampering with,fraudulently redirecting, or even dropping data traffic or injectingforged data packets.To provide comprehensive security, both phases of MANETcommunication must be safeguarded. It is noteworthy that securerouting protocols, which ensure the correctness of the discoveredtopology information, cannot by themselves ensure the secure andundisrupted delivery of transmitted data. This is so, sinceadversaries could abide with the route discovery and be placed onutilized routes. But then, they could tamper with the in-transit datain an arbitrary manner and degrade the network operation.Upper layer mechanisms, such as reliable transport protocols, ormechanisms currently assumed by the MANET routing protocols,such as reliable data page link or acknowledged routing, cannot cope withmalicious disruptions of the data transmission. In fact, thecommunicating nodes may be easily deceived for relatively longperiods of time, thinking that the data flow is undisrupted, while noactual communication takes place.One way to counter security attacks would be to cryptographicallyprotect and authenticate all control and data traffic. But toaccomplish this, nodes would have to have the means to establishthe necessary trust relationships with each and every peer they aretransiently associated with, including nodes that just forward theirdata. Even if this were feasible, such cryptographic protectioncannot be effective against denial of service attacks, withadversaries simply discarding data packets.


Download full report
http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: secure routing in ad hoc networks, data transmission in ad hoc network using matlab, cable networks for data transmission, anonymous secure routing in mobile ad hoc networks doc, secure data transmission methods, bluetooth based ad hoc networks for voice transmission report, data caching mobile ad hoc networks,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 2 5,222 19-06-2018, 06:10 PM
Last Post: KavyaIyengar
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 19,055 17-08-2016, 09:23 AM
Last Post: jaseela123d
  WIRE LESS SPEED CONTROL OF AC MOTOR (USING MOBILE) smart paper boy 6 11,353 24-02-2016, 02:05 PM
Last Post: seminar report asees
  Mobile incoming call indicator smart paper boy 5 5,786 09-01-2016, 11:02 AM
Last Post: seminar report asees
  Home appliance control by mobile phone (DTMF) seminar class 17 18,989 10-01-2015, 10:05 PM
Last Post: seminar report asees
  COIN BASED MOBILE CHARGER full report seminar class 25 23,042 08-12-2014, 11:40 PM
Last Post: seminar report asees
  Measuring the Performance of IEEE 802.11p Using ns-2 Simulator for Vehicular Networks smart paper boy 3 2,572 07-10-2014, 06:34 PM
Last Post: seminar report asees
  wireless charging of mobile phones using microwaves ramki86 33 21,580 05-08-2014, 09:29 PM
Last Post: seminar report asees
  SMS Based Wireless Electronic Notice Board using GSM/CDMA/3G Mobile Phone seminar class 20 18,363 30-04-2014, 10:43 PM
Last Post: ShawnHasson
  SECURE ATM BY IMAGE PROCESSING seminar class 6 9,892 06-04-2014, 05:49 PM
Last Post: Guest

Forum Jump: