Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network
Rajender Nath , Pankaj Kumar Sehgal
Pages - 16 - 22     |    Revised - 20-03-2009     |    Published - 15-03-2009
Volume - 3   Issue - 1    |    Publication Date - February 2009  Table of Contents
Ad Hoc Network, Routing Protocol, Simulator
Significant progress has been made for making mobile ad hoc networks secure and dynamic. The unique characteristics like infrastructure-free and absence of any centralized authority make these networks more vulnerable to security attacks. Due to the ever-increasing security threats, there is a need to develop algorithms and protocols for a secured ad hoc network infrastructure. This paper presents a secure routing protocol, called EDSR (Encrypted Dynamic Source Routing). EDSR prevents attackers or malicious nodes from tampering with communication process and also prevents a large number of types of Denial-of-Service attacks. In addition, EDSR is efficient, using only efficient symmetric cryptographic primitives. We have developed a new program in c++ for simulation setup.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 Socol@r  
9 ResearchGATE 
10 Libsearch 
11 Bielefeld Academic Search Engine (BASE) 
12 Scribd 
13 WorldCat 
14 SlideShare 
16 PdfSR 
17 Chinese Directory Of Open Access 
18 Free-Books-Online 
1 M. Gasser et al., “The Digital Distributed Systems Security Architecture”, Proc. 12th Natl. Comp. Security Conf., NIST, 1989.
2 J. Tardo and K. Algappan, “SPK: Global Authentication Using Public Key Ceriticates”, Proc. IEEE Symp. Security and Privacy, CA, 1991.
3 C Kaufman, “DASS: Distributed Authentication Security Service”, RFC 1507, 1993.
4 Y. Desmedt and Y. Frankel, “Threshold Cryptosystems”, Advances in Cryptography- Crypto’ 89, G. Brassard, Ed. Springer- Verlag, 1990.
5 Y. Desmedt “Threshold Cryptography”, Euro. Trans. Telecom., 5(4), 1994.
6 L. Zhou and Z. Haas, “Securing Ad Hoc Networks”, IEEE Networks, 13(6), 1999.
7 Y. –C. Hu, D. B. Johnson and A. Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks”, Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), Jun. 2002
8 C. S. R. Murthy and B. S. Manoj, “Ad Hoc Wireless Networks: A Architectures and Protocols”, Prentice Hall PTR, 2004.
9 S. Das et Al. “Ad Hoc On-Demand Distance Vector (AODV) Routing”, draft-ietf-manet-aodv- 17, February, 2003.
10 J. Macker et Al., “Simplified Multicast Forwarding for MANET”, draft-ietf-manet-smf-07, February 25, 2008.
11 11. I. Chakeres et. Al.,“Dynamic MANET On-demand (DYMO)Routing”,draft-ietf-manet-dymo-14, June 25, 2008.
12 I. Chakeres et. Al.,“IANA Allocations for MANET Protocols”,draft-ietf-manet-iana-07, November 18, 2007.
13 T. Clausen et. Al.,“The Optimized Link State Routing Protocol version 2”, draft-ietf-manetolsrv2- 06, June 6, 2008.
14 T. Clausen et. Al.,” Generalized MANET Packet/Message Format”, draft-ietf-manet-packetbb- 13, June 24, 2008.
15 T. Clausen et Al., “Representing multi-value time in MANETs”, draft-ietf-manet-timetlv-04, November 16, 2007.
16 T. Clausen et Al., “MANET Neighborhood Discovery Protocol (NHDP)”, draft-ietf-manetnhdp- 06, March 10, 2008.
17 D. Johnson and D. Maltz., “Dynamic source routing in ad-hoc wireless networks routing protocols”, In Mobile Computing, pages 153-181. Kluwer Academic Publishers, 1996.
18 C. R. Davis., “IPSec: Securing VPNs”, Osborne/McGraw-Hill, New York, 2001.
19 E. Ayannoglu et al., “ Diversity Coding for Transparent Self-Healing and Fualt-Tolerant Communication Networks”, IEEE Trans. Comm. 41(11), 1993.
20 P. Papadimitratos and Z. J. Haas, “Secure Routing for Mobile Ad hoc Networks”, In Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002.
21 Y. Zhang and W.Lee, “Intrusion Detection in Wireless Ad Hoc Networks”, Proc. Mobicom. 2000.
22 R. Droms, “ Dynamic Host Configuration Protocol”, IETF RFC 2131, 1997.
23 IEEE-SA Standards Board. IEEE Std 802.11b-1999, 1999.
24 S. Buchegger and J. LeBoudec, “ Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustnes in Mobile Ad Hoc Network,” Proc. 10th Euromicro PDP , Gran Canaria, 2002.
25 S. Marti et al., “Mitigating Routing Behavior in Mobile Ad Hoc Networks”, Proc. Mobicom, 2000.
26 P. Gutmann. Cryptlib encryption tool kit. http://www.cs.auckland.ac.nz/~pgut001/cryptlib.
27 Rashid Hafeez Khokhar, Md Asri Ngadi, Satria Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, in IJCSS: International Journal of Computer Science and Security, "Volume 2, Issue 3, pages 18-29, May/June 2008.
28 R.Asokan , A.M.Natarajan, C.Venkatesh, “Ant Based Dynamic Source Routing Protocol to Support Multiple Quality of Service (QoS) Metrics in Mobile Ad Hoc Networks”, in IJCSS: International Journal of Computer Science and Security, "Volume 2, Issue 3, pages 48-56, May/June 2008.
29 N.Bhalaji, A.Shanmugam, Druhin mukherjee, Nabamalika banerjee, “Direct trust estimated on demand protocol for secured routing in mobile Adhoc networks”, in IJCSS: International Journal of Computer Science and Security, "Volume 2, Issue 5, pages 6-12, September/ October 2008.
Dr. Rajender Nath
Dept of Computer Science and Applications - India
Mr. Pankaj Kumar Sehgal
MM Institute of Computer Technology and Business Management - India