An authenticated encrypted routing protocol against attacks inmobile ad-hoc networks
C.C. Suma (),
H.L. Gururaj () and
B. Ramesh ()
Additional contact information
C.C. Suma: PG scholar, Dept of CS&E, Malnad College of Engineering, Hassan, India
H.L. Gururaj: Assistant Professor, Dept of CS&E, Malnad College of Engineering, Hassan, India
B. Ramesh: Professor, Dept of CS&E, Malnad College of Engineering, Hassan, India
Computational Methods in Social Sciences (CMSS), 2016, vol. 4, issue 2, 5-11
Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTEâ€™s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.
Keywords: Cloud Computing; Intercloud; Cloud Interoperability; Model Driven Architecture (MDA); Service Oriented Architecture (SOA) (search for similar items in EconPapers)
References: View complete reference list from CitEc
Citations Track citations by RSS feed
Downloads: (external link)
http://cmss.univnt.ro/wp-content/uploads/vol/split ... _issue_2_art.001.pdf First version, 2016 (application/pdf)
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
Persistent link: http://EconPapers.repec.org/RePEc:ntu:ntcmss:vol4-iss2-16-05
Access Statistics for this article
Computational Methods in Social Sciences (CMSS) is currently edited by Bogdan Oancea
More articles in Computational Methods in Social Sciences (CMSS) from "Nicolae Titulescu" University of Bucharest, Faculty of Economic Sciences Contact information at EDIRC.
Series data maintained by Stefan Ciucu ().