IDEAS home Printed from https://ideas.repec.org/a/ntu/ntcmss/vol4-iss2-16-05.html
   My bibliography  Save this article

An authenticated encrypted routing protocol against attacks inmobile ad-hoc networks

Author

Listed:
  • C.C. Suma

    (PG scholar, Dept of CS&E, Malnad College of Engineering, Hassan, India)

  • H.L. Gururaj

    (Assistant Professor, Dept of CS&E, Malnad College of Engineering, Hassan, India)

  • B. Ramesh

    (Professor, Dept of CS&E, Malnad College of Engineering, Hassan, India)

Abstract

Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.

Suggested Citation

  • C.C. Suma & H.L. Gururaj & B. Ramesh, 2016. "An authenticated encrypted routing protocol against attacks inmobile ad-hoc networks," Computational Methods in Social Sciences (CMSS), "Nicolae Titulescu" University of Bucharest, Faculty of Economic Sciences, vol. 4(2), pages 5-11, December.
  • Handle: RePEc:ntu:ntcmss:vol4-iss2-16-05
    as

    Download full text from publisher

    File URL: http://cmss.univnt.ro/wp-content/uploads/vol/split/vol_IV_issue_2/CMSS_vol_IV_issue_2_art.001.pdf
    File Function: First version, 2016
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ntu:ntcmss:vol4-iss2-16-05. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Stefan Ciucu (email available below). General contact details of provider: https://edirc.repec.org/data/feuntro.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.