A Secure and Power Efficient Routing Scheme for Ad Hoc Networks

A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Security and Power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The ad hoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols

[1]  Philip Tavel,et al.  Modeling and Simulation Design , 2011 .

[2]  Michele Zorzi,et al.  Energy efficiency of media access protocols for mobile data networks , 1998, IEEE Trans. Commun..

[3]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[4]  Imrich Chlamtac,et al.  Energy-conserving access protocols for identification networks , 1999, TNET.

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  William M. McEneaney,et al.  Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming , 2012 .

[7]  Phalguni Gupta,et al.  A hybrid stable routing protocol for mobile ad hoc networks , 2009, 2009 Global Mobile Congress.

[8]  S. M. Heemstra de Groot,et al.  Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.

[9]  P. Gupta,et al.  Power Aware Virtual Node Routing Protocol for Ad hoc Networks , .

[10]  Radia J. Perlman,et al.  Fault-Tolerant Broadcast of Routing Information , 1983, Comput. Networks.

[11]  Leandros Tassiulas,et al.  Energy conserving routing in wireless ad-hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[12]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[13]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[14]  Phalguni Gupta,et al.  Secured Routing Scheme for Adhoc Networks , 2009 .

[15]  Teresa H. Meng,et al.  Minimum energy mobile wireless networks , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[16]  Piyush Gupta,et al.  Critical Power for Asymptotic Connectivity in Wireless Networks , 1999 .

[17]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[18]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[19]  Pla Uni,et al.  Secure Routing for Mobile Ad hoc Networks , 2005 .

[20]  Marcel Worring,et al.  NIST Special Publication , 2005 .

[21]  Deborah Estrin,et al.  Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks , 2000 .

[22]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[23]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[24]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[25]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[26]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[27]  Phalguni Gupta,et al.  Secured power aware virtual node routing scheme for ad-hoc networks , 2013 .

[28]  J. Ludden,et al.  Principles and Practice , 1998, Community-based Learning and Social Movements.

[29]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.

[30]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .