Abstract
Mobile Ad-hoc Network (MANET) is independent, self-organizing and infrastructure less Ad-hoc network. Ad-hoc based routing protocols are being used for route discovery and route establishment. Among these Ad-hoc based protocols; Ad-hoc on Demand Distance Vector (AODV) is one of the reactive Ad-hoc routing protocols designed with inherited best features of DSR and DSDV. Using AODV a number of techniques have been presented for maintaining secure communication between communicating parties using symmetric and asymmetric cryptography, which have significant limitation of key management and high cost. In this paper we have proposed Enhanced Classified Ad-hoc on Demand Distance Vector protocol with a unique key management infrastructure for building cost effective and establishing secure links between nodes in MANET. Our proposed technique establishes session key between nodes in an authenticated way using signcryption and symmetric cryptographic technique Blowfish for secure data communication. The proposed protocol Enhanced Classified-AODV (ECAODV) provides all security features with tremendous low computation and communication cost. This work will greatly contribute to the security of AODV for secure MANET communication over other preceding proposed security techniques for AODV.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Haas, Z., Pearlman, M.: The performance of query control scheme for the zone routing protocol. ACM/IEEE Transactions on Networking 9(4), 427–438 (2001)
Karp, B., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proc. 6th Annual International Conference on Mobile Computing and Networking (MOBICOM 2000), pp. 243–254 (2000)
Hong, X.Y., Xu, K.X., Gerla, M.: Scalable Routing Protocols for Mobile Ad Hoc Networks. IEEE Network, 11–21 (July-August 2002)
Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing. In: Proc. 2nd IEEE Workshop of Mobile Comp. Sys. and Apps., pp. 90–100 (February 1999)
Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. draft-guerrero-manet-saodv-06.txt (September 5, 2006)
Kravets, R., Yi, S., Naldurg, P.: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks. In: ACM Symp. on Mobile Ad Hoc Networking and Computing (2001)
Garg, V.K., Ghosh, R.K.: Effect of Data Encryption on Wireless Ad Hoc Network Performance. In: Sen, A., Das, N., Das, S.K., Sinha, B.P. (eds.) IWDC 2004. LNCS, vol. 3326, pp. 258–263. Springer, Heidelberg (2004)
Akhlaq, M., Jafri, M.N., Khan, M.A., Aslam, B.: Addressing Security Concerns of Data Exchange in AODV Protocol. World Academy of Science, Engineering and Technology 16 (2006)
Taneja, S., Kush, A., Singh, S.: Encryption Scheme for Secure Routing in Ad Hoc Networks. International Journal of Advancements in Technology 2(1), 22–29 (2011) ISSN: 0976-4860
Deswal, S., Singh, S.: Implementation of Routing Security Aspects in AODV. International Journal of Computer Theory and Engineering 2(1), 135–138 (2010)
Dahshan, H., Irvine, J.: An Elliptic Curve Distributed Key Management for Mobile Ad Hoc Networks. In: IEEE 71st Vehicular Technology Conference (VTC 2010-Spring) (2010)
Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security 10(3), 213–219 (2010)
Rizwan, A., Amin, N., Shah, M., Siddique, U.: Security Technique in Routing Protocol for Mobile Ad-Hoc Network (MANET). In: International Conference on Engineering and Information Management (ICEIM 2011) (2011)
Zheng, Y., Imai, H.: How to construct signcryption schemes on elliptic curve. Information Processsing Letters 68 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Amin, N., Nizamuddin, Ibrahim, A. (2012). ECAODV: Enhanced Classified Ad-Hoc on Demand Distance Vector Routing Protocol. In: Chowdhry, B.S., Shaikh, F.K., Hussain, D.M.A., Uqaili, M.A. (eds) Emerging Trends and Applications in Information Communication Technologies. IMTIC 2012. Communications in Computer and Information Science, vol 281. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28962-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-28962-0_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28961-3
Online ISBN: 978-3-642-28962-0
eBook Packages: Computer ScienceComputer Science (R0)