Design and Development of a Secured Routing Scheme for Mobile Adhoc Network

The development of mobile ad hoc network advocates selforganized wireless interconnection of communication devices that would either extend or operate in concern with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. One main challenge in design of these networks is their vulnerability to security attacks. Despite the existence of wellknown security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render such traditional solutions inapplicable. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. In MANET, any node may compromise the routing protocol functionality by disrupting the route discovery process. In this paper, we understand the various security related issues related to mobile ad hoc network. The security to the network is provided by using cryptographic schemes to build a highly secure framework

[1]  Daryl McCullough,et al.  Noninterference and the composability of security properties , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[2]  Michael K. Reiter,et al.  Networked cryptographic devices resilient to capture , 2003, International Journal of Information Security.

[3]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[4]  Martín Abadi,et al.  Authentication in distributed systems: theory and practice , 1991, SOSP '91.

[5]  Eytan Modiano,et al.  Dynamic power allocation and routing for time varying wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Matthew K. Franklin,et al.  Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.

[7]  John McLean,et al.  A General Theory of Composition for a Class of "Possibilistic'' Properties , 1996, IEEE Trans. Software Eng..

[8]  Martín Abadi,et al.  Authentication in the Taos operating system , 1993, SOSP '93.

[9]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[10]  E. Stewart Lee,et al.  A general theory of security properties , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[11]  David Tse,et al.  Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.

[12]  Malik,et al.  January 2000! , 2000, American journal of physiology. Lung cellular and molecular physiology.

[13]  J. J. Garcia-Luna-Aceves,et al.  Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[14]  Virgil D. Gligor A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.

[15]  Michael J. Neely,et al.  Dynamic power allocation and routing for satellite and wireless networks with time varying channels , 2003 .

[16]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[17]  F. Javier Thayer,et al.  Security and the Composition of Machines , 1988, CSFW.

[18]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .

[19]  Mukesh Singhal,et al.  Deadlock detection in distributed systems , 1989, Computer.

[20]  John S. Baras,et al.  On the Negotiation of Access Control Policies , 2001, Security Protocols Workshop.

[21]  Chris J. Mitchell,et al.  Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.

[22]  H. Mehta Dynamic Adaptive Routing in Mobile Ad Hoc Networks , 2002 .

[23]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[24]  Léon J. M. Rothkrantz,et al.  Ant-Based Load Balancing in Telecommunications Networks , 1996, Adapt. Behav..

[25]  Yongguang Zhang,et al.  An integrated environment for testing mobile ad-hoc networks , 2002, MobiHoc '02.

[26]  Bruce Schneier,et al.  Semantic network attacks. , 2000 .

[27]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[28]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[29]  Munindar P. Singh,et al.  Detecting deception in reputation management , 2003, AAMAS '03.

[30]  Seif Haridi,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.

[31]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[32]  Marie-Pierre Gleizes,et al.  Agents and Multi-Agent Systems , 2011, Self-organising Software.

[33]  Eytan Modiano,et al.  Capacity and delay tradeoffs for ad hoc mobile networks , 2004, IEEE Transactions on Information Theory.

[34]  Zhen Liu,et al.  Capacity, delay and mobility in wireless ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[35]  Martin Vetterli,et al.  Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[36]  Jonathan K. Millen,et al.  A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[37]  Jonathan K. Millen,et al.  Hookup security for synchronous machines , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.

[38]  Piyush Gupta,et al.  Critical Power for Asymptotic Connectivity in Wireless Networks , 1999 .

[39]  E. Stewart Lee,et al.  The compatibility of policies , 1994, CCS '94.

[40]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[41]  Martín Abadi,et al.  Authentication in the Taos operating system , 1994, TOCS.

[42]  Virgil D. Gligor,et al.  A Specification and Verification Method for Preventing Denial of Service , 1990, IEEE Trans. Software Eng..

[43]  Marianne Winslett,et al.  Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation , 2001, NDSS.

[44]  Eytan Modiano,et al.  Improving Delay in Ad-Hoc Mobile Networks Via Redundant Packet Transfers , 2003 .

[45]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.