Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network
Virendra Singh Kushwah, Gaurav Sharma
Pages - 551 - 560     |    Revised - 31-01-2011     |    Published - 08-02-2011
Volume - 4   Issue - 6    |    Publication Date - January / February  Table of Contents
AODV, Routing, Packets, Network
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
CITED BY (5)  
1 Chaudhry, M. T., & Sher, M. Secure Group Based Biometric Authentication Approach for Mobile Ad hoc Networks.
2 Sodagudi, S., & Rao, D. K. R. (2014). Behavior based Anomaly detection technique to identify Multilayer attacks. International Journal, 2(5).
3 Kumar, R., Verma, P., & Singh, Y. (2014). Review of MANET Protocols and Introduction of a New Optimized Routing Scheme using Evolutionary Algorithms and Analytical Hierarchy Process. Wireless Communication, 6(4), 161-171.
4 Roopak, M., & Reddy, B. (2013). Blackhole Attack Implementation in AODV Routing Protocol. International Journal of Scientific & Engineering Research, 4(5), 402-406.
5 Kumar, R., Verma, P., & Singh, Y. (2013). Mobile Ad Hoc Networks and It’s Routing Protocols. World Academy of Science, Engineering and Technology International Journal of Computer, Information, Systems and Control Engineering, 7(8).
1 Google Scholar
2 Academic Journals Database
3 CiteSeerX
4 ResearchGATE
5 Libsearch
6 Bielefeld Academic Search Engine (BASE)
7 Scribd
8 SlideShare
9 PdfSR
1 1. L.Zhou and Z.Haas,“Securing AdHoc Networks,” IEEE Network, vol.13, no.6, page no.24–30, November/December 1999
2 2. B. Sukla, “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks”, In proceeding of the World Congress on Engineering and Computer Science 2008, October 22-24,2008,San Francisco,USA
3 3. Nguyen H and Morino H,“A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load”, IFIP International Federation for Information Processing 2005, LNCS 3823, page no. 905-915,2005
4 4. A.Kapil and S.Rana, “Identity-Based Key Management in MANETs using Public Key Cryptography”, International Journal of Security (IJS), Volume (3): Issue (1), published in Computer Science journal in March, 2009.
5 5. S. Capkuny, L. Buttyan, J.-P. Hubaux, “Self-organized public-key management for mobile ad hoc networks”, Technical Report 2002/34, EPFL/IC, May 2002.
6 6. Bo. Zhu, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang, “Efficient and robust key management for large mobile ad hoc networks”, In Proceedings of Computer Networks 48 (2005), page no. 657–682, 2005
7 7. Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras, "Secure and efficient key management in mobile ad hoc networks", Journal of Network and Computer Applications 30 (2007), page no. 937–954, 2007.
8 8. M. Gunasekaran, P. Sampath and B. Gopalakrishnan, “AAS: An Authenticated Acknowledgement-Based Scheme for Preventing Selfish Nodes in Mobile Ad Hoc Networks”, International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009, page no. 294-298, 2009.
9 9. Andreas Hafslund and Jon Andersson, Thales Norway AS, “2-Level Authentication Mechanism in an Internet connected MANET”, 6th Scandinavian Workshop on Wireless Ad-hoc Networks, 2006.
10 10. Marcelo M. Carvalho, Cintia B. Margi, Katia Obraczka and J. J. Garcia-Luna-Aceves, “Modeling Energy Consumption in Single-Hop IEEE 802.11 Ad Hoc Networks”, Proceeding in 13th International conference on Computer communication and networks 2004, 2004.
11 11. Qualnet 4.5.1 Network Security model library.pdf
12 12. K. Sanzgiri, D. Laflamme, B. Dahill, B. Levine, C. Shields and E. Royer. An Authenticated Routing for Secure Ad Hoc Networks. Journal on Selected Areas in Communications special issue on Wireless Ad hoc Networks, March 2005.
13 13. Man,Y.R.: Internet Security cryptographic: principles, algorithms and protocols. Wiley Publishing House, Chichester(2004).
14 14. Kimaya, S., et al.: Authenticated routing for ad hoc networks. Journal on Selected Areas in Communications 23(3), 598–610 (2005).
15 15. Zapata, M.G., Asokan, and N.: Securing Ad hoc Routing Protocols. In: Proc. of the ACM workshop on Wireless security, Atlanta, USA, pp. 1–10 (2002).
16 16. Kushwah, Virendra Singh and Tapaswi, Shashikala, “Securing Node In MANETs Using Node Based Key Management Scheme”, In proceeding of the IEEE Xplore 2010 International Conference on Advances in Computer Engineering – ACE 2010, June 21-22, 2010 at Bangalore, INDIA.
17 17. C. Yang. Designing secure e-commerce with role-based access control. International Journal of Web Engineering and Technology, 3(1):73–95, 2007.
18 18. David F. Ferraiolo, John F. Barkley, and D. Ri hard Kuhn. A role based access control model and reference implementation within a corporate intranet. In ACM Transactions on Information Systems.
19 19. Xin Wang, Yanchun Zhang, Hao Shi ;" Access Control for Human Tasks in Service Oriented Architecture "; in IEEE/ the Fourth International Conference on Computer and Information Technology (CIT’04);2004 IEEE Computer, 29(2):38–47, 1996.
20 20. Mathias Kohler and Andreas Schaad . ProActive Access Control for Business Process-driven Environments. In IEEE/ Annual Computer Security Applications Conference 156 .2008.
21 21. Barkley, J., Beznosov, K., and Uppal, J., “Supporting Relationship in Access Control Using Role Based Access Control”, Proceedings of ACM Role-Based Access Control Workshop, Fairfax, Virginia, USA, pp. 55-65, 1999.
22 22. Bernardi, P., Gandino, F., Lamberti, F., Montrucchio, B., Rebaudengo, M., and Sanchez, E.R., “An Anti-Counterfeit Mechanism for the Application Layer in Low-Cost RFID Devices”, In International Conference on Circuits and Systems for Communications, IEEE, July, pp.207-211, 2006.
23 23. Xu Feng ,Lin Guoyuan , Huang Hao , Xie Li;"Role-based Access Control System for Web Services"; In Proceedings of the 4th IEEE International Conference on Computer and Information Technology ,2004.
24 24. Ateniese, G., Camenisch, J., and Madeiros, B. de, “Untraceable RFID tags via insubvertible encryption”, Proceedings of the 12 ACM conference on Computer and communications security, November, pp.92-101, 2005.
Mr. Virendra Singh Kushwah
HIMCS, Mathura - India
Mr. Gaurav Sharma
- India