Routing and Data Security Scheme Based on Double Encryption in Mobile Ad Hoc Networks

Considering the results from routing attack, this paper proposes a routing and data security scheme based on double encryption in Mobile Ad Hoc Networks. After building the route, the end-to-end routing test and verification ensures the validity of the route with asymmetric encryption and data encryption ensures the safety of data on this route with symmetric encryption. Additional, the symmetric encryption key is encapsulated in routing test and verify packet and then is asymmetrically encrypted together to be sent to destination node. The simulation results show that the scheme has a better performance in complexity and system overhead. And it can protect routing and data security at the same time.

[1]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[2]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[3]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[4]  Dharma P. Agrawal,et al.  Security enhancements in AODV protocol for wireless ad hoc networks , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[5]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[6]  Jane Zhen,et al.  Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[10]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[11]  Chu-Hsing Lin,et al.  I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[12]  Nie Zhi-qiang Concept similarity analysis in ontology's automatic extraction , 2007 .

[13]  A. Pirzada,et al.  Circumventing Sinkholes and Wormholes in Wireless Sensor Networks , 2005 .

[14]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[15]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.