Identity Based Secure Routing For Wireless Ad-Hoc Networks
#1

Abstract

In this paper, we propose an Identity (ID)-based Secure Routing Scheme for secure routing in wireless ad-hoc networks. It make use of Identity based Signature scheme and hash chains to secure the AODV (Ad-hoc on demand distance vector routing) messages. We have used ID based Signature scheme for the immutable fields, that is the fields that remain same throughout the journey of the routing packet and Hash Chains for the mutable fields (fields which changes from node to node) e.g. Hop Count. This system has the following advantages as compared to the previous solutions, most of which uses RSA based Public Key Cryptographic solutions. Firstly, it makes use of Identity based signature scheme which is certificateless thus saving overhead costs of communication and storage. Secondly, in ID based schemes we can use our identity, like our IP address or email ID as our public key, which leads to smaller key size as compared to other cryptographic techniques. Also this system does not require establishment of any third party like PKI (Public-key Infrastructure) at the initial stages of network establishment.

Introduction

A Mobile Ad hoc Network, or MANET, consists of a group of cooperating wireless mobile hosts (nodes) that dynamically constructs a short lived and self-configuring network without the support of a centralized network infrastructure. The mobile nodes can be cell-phones, PDAs and laptops and typically support wireless connectivity like 802.11, Bluetooth, etc. MANETs are fundamentally different from their wired-side counterparts. They provide no fixed infrastructure, base stations or switching centers. Moreover, the nodes of a MANET are computationally constrained and have limited power.
Routing is an important function in any network, be it wired or wireless. The protocols designed for routing in these two types of networks, however, have completely different characteristics. Routing protocols for wired networks typically do not need to handle mobility of nodes within the system. These protocols also do not have to be designed so as to minimize the communication overhead, since wired networks typically have high bandwidths. Very importantly, the routing protocols in wire line networks can be assumed to execute on trusted entities, namely the routers.
These characteristics change completely when considering ad hoc wireless networks. Mobility is a basic feature in such networks. Resource constraints like limited bandwidth and computing power of the devices also aggravates the problem of designing routing protocols for such networks which do not require high bandwidths. Ad hoc networks also do not have trusted entities such as routers, since every node in the network is expected to participate in the routing function. Therefore, routing protocols need to be specifically designed for wireless ad hoc networks.
Ad-hoc routing protocols, including AODV (Ad-Hoc Distance Vector Routing) , DSR (Dynamic Source Routing), OLSR (Optimized Link State Routing), etc are designed for performance, not security, and thus all of them are subjected to some kind of attacks. These attacks include, packet dropping, modification of packets (modifying sequence numbers, hop count, etc), impersonation, replaying of old routing information etc. These attacks can partition a network or may introduce excessive load into the network by causing retransmission and inefficient routing.
The Ad hoc On Demand Distance Vector (AODV)routing algorithm is a reactive routing protocol designed for ad hoc mobile networks. To transmit data over an adhoc network, the AODV protocol enables dynamic, selfstarting, multi-hop routing between mobile devices. It allows these mobile computers, or nodes, to pass messages through their neighbors to nodes with which they cannot directly communicate.

Please visit http://academypublisherijrte/vol02/no01/ijrte02012832.pdf for more details.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: friend based ad hoc routing ppt, ad hoc wireless networks book, wireless ad hoc networksadhoc networks, project on mobile ad hoc networks secure distance based localization, wireless ad hoc sensors networks seminar topics, automated eb billing system through gsm and ad hoc wireless routing, vtu ad hoc wireless networks notes,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,242 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 31,135 07-10-2016, 09:02 AM
Last Post: ijasti
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,182 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,854 14-07-2015, 02:24 PM
Last Post: seminar report asees
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,588 26-02-2015, 08:03 PM
Last Post: Guest
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,559 10-02-2015, 05:52 PM
Last Post: seminar report asees
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,414 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Shallow Water Acoustic Networks (SWANs project report helper 2 1,872 24-03-2014, 10:10 PM
Last Post: seminar report asees
Music Blast Wireless (Download Full Report And Abstract) computer science crazy 8 6,660 18-02-2014, 01:13 AM
Last Post: Guest
  WiMAX for Broadband Wireless Access full report seminar topics 7 7,366 07-10-2013, 09:02 PM
Last Post: Guest

Forum Jump: