A Novel Algorithm HSHA to Secure Wireless Ad hoc Network

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. Here we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks — multiple routes between nodes — to defend routing against denial of service attacks. We use replication and new cryptographic schemes, such as HSHA Key cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework. It helps the network to let the intruder cannot access the packet without the proper authentication. Unauthorized user cannot access the packet. There are various consequences of this algorithm.

[1]  Vasileios Karyotis,et al.  A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.

[2]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues , 2000, NDSS.

[3]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[4]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[5]  Tat Chee Wan,et al.  Performance evaluation of IEEE 802.15.4 wireless multi-hop networks: simulation and testbed approach , 2007, Int. J. Ad Hoc Ubiquitous Comput..

[6]  Raúl Aquino-Santos,et al.  Performance evaluation of routing protocols in vehicular ad-hoc networks , 2005, Int. J. Ad Hoc Ubiquitous Comput..

[7]  Susanne Wetzel,et al.  Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.

[8]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[9]  Sheng-Ti Li,et al.  Enhanced Security Design for Threshold Cryptography in Ad Hoc Network Sheng-Ti Li , , 2004 .

[10]  Falko Dressler Reliable and semi-reliable communication with authentication in mobile ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[11]  Izhak Rubin,et al.  Robust throughput and routing for mobile ad hoc wireless networks , 2009, Ad Hoc Networks.

[12]  Nitesh Saxena,et al.  Public Key Cryptography Sans Certificates in Ad Hoc Networks , 2006, ACNS.

[13]  Jelena V. Misic,et al.  MAC layer security of 802.15.4-compliant networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[14]  Yi Mu,et al.  An identity-based Broadcast Encryption Scheme for mobile ad-hoc networks , 2006 .

[15]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[16]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[17]  Chai-Keong Toh,et al.  Evaluating the communication performance of an ad hoc wireless network , 2002, IEEE Trans. Wirel. Commun..

[18]  Dijiang Huang Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.

[19]  Mário Serafim Nunes,et al.  Performance evaluation of IEEE 802.11e , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.