IDEAS home Printed from https://ideas.repec.org/a/rau/journl/v6y2012i2p396-409.html
   My bibliography  Save this article

Applying Puzzle Encryption In The On-Demand Routing Protocols In Mobile Ad Hoc Networks (Manets)

Author

Listed:
  • Ahmad Alomari

    (University of Bucharest, Bucharest)

Abstract

Recently, the use of Mobile Ad Hoc Networks (MANETs) systems in our life has rapidly increased. Nevertheless, we need for this efficiency and privacy routing protocols to exchange the information between the nodes in this kind of networks. We propose a new scheme to apply it on the On-Demand routing because it is one of the most popular and usable in the MANETs. The main goal in our paper is to promote and improve the authentication between the nodes in the MANETs by applying the puzzle encryption before they start exchange the data packet between them. The new scheme is based on combined use of cryptographic puzzles and weakly secret bit commitment (WSBC) function. The scheme has to offer privacy protection of the confidential information stored in the nodes, that is identifier ID and encryption puzzle. The identifier allows the unequivocal identification of the nodes on the mobile networks. The anonymity of messages is crucial to avoid traceability and replay attacks and denial services. The puzzles function use one way encryption functions whereas the keys must be enough to avoid a brute force attack. We use also the bit commitment function with puzzle encryption in our scheme to commit a value without revealing that value. This scheme will offer moderate protection concerning privacy and traceability when a node communicates with each other in the Mobile Ad hoc Networks (MANETs).

Suggested Citation

  • Ahmad Alomari, 2012. "Applying Puzzle Encryption In The On-Demand Routing Protocols In Mobile Ad Hoc Networks (Manets)," Romanian Economic Business Review, Romanian-American University, vol. 6(2), pages 396-409, December.
  • Handle: RePEc:rau:journl:v:6:y:2012:i:2:p:396-409
    as

    Download full text from publisher

    File URL: http://www.rebe.rau.ro/RePEc/rau/jisomg/WI12/JISOM-WI12-A16.pdf
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    MANET; AODV; RSA; puzzle function; WSBC;
    All these keywords.

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:rau:journl:v:6:y:2012:i:2:p:396-409. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Alex Tabusca (email available below). General contact details of provider: https://edirc.repec.org/data/firauro.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.