Skip to main content

ECAODV: Enhanced Classified Ad-Hoc on Demand Distance Vector Routing Protocol

  • Conference paper
Emerging Trends and Applications in Information Communication Technologies (IMTIC 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 281))

Included in the following conference series:

  • 1445 Accesses

Abstract

Mobile Ad-hoc Network (MANET) is independent, self-organizing and infrastructure less Ad-hoc network. Ad-hoc based routing protocols are being used for route discovery and route establishment. Among these Ad-hoc based protocols; Ad-hoc on Demand Distance Vector (AODV) is one of the reactive Ad-hoc routing protocols designed with inherited best features of DSR and DSDV. Using AODV a number of techniques have been presented for maintaining secure communication between communicating parties using symmetric and asymmetric cryptography, which have significant limitation of key management and high cost. In this paper we have proposed Enhanced Classified Ad-hoc on Demand Distance Vector protocol with a unique key management infrastructure for building cost effective and establishing secure links between nodes in MANET. Our proposed technique establishes session key between nodes in an authenticated way using signcryption and symmetric cryptographic technique Blowfish for secure data communication. The proposed protocol Enhanced Classified-AODV (ECAODV) provides all security features with tremendous low computation and communication cost. This work will greatly contribute to the security of AODV for secure MANET communication over other preceding proposed security techniques for AODV.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Haas, Z., Pearlman, M.: The performance of query control scheme for the zone routing protocol. ACM/IEEE Transactions on Networking 9(4), 427–438 (2001)

    Article  Google Scholar 

  2. Karp, B., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proc. 6th Annual International Conference on Mobile Computing and Networking (MOBICOM 2000), pp. 243–254 (2000)

    Google Scholar 

  3. Hong, X.Y., Xu, K.X., Gerla, M.: Scalable Routing Protocols for Mobile Ad Hoc Networks. IEEE Network, 11–21 (July-August 2002)

    Google Scholar 

  4. Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing. In: Proc. 2nd IEEE Workshop of Mobile Comp. Sys. and Apps., pp. 90–100 (February 1999)

    Google Scholar 

  5. Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. draft-guerrero-manet-saodv-06.txt (September 5, 2006)

    Google Scholar 

  6. Kravets, R., Yi, S., Naldurg, P.: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks. In: ACM Symp. on Mobile Ad Hoc Networking and Computing (2001)

    Google Scholar 

  7. Garg, V.K., Ghosh, R.K.: Effect of Data Encryption on Wireless Ad Hoc Network Performance. In: Sen, A., Das, N., Das, S.K., Sinha, B.P. (eds.) IWDC 2004. LNCS, vol. 3326, pp. 258–263. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Akhlaq, M., Jafri, M.N., Khan, M.A., Aslam, B.: Addressing Security Concerns of Data Exchange in AODV Protocol. World Academy of Science, Engineering and Technology 16 (2006)

    Google Scholar 

  9. Taneja, S., Kush, A., Singh, S.: Encryption Scheme for Secure Routing in Ad Hoc Networks. International Journal of Advancements in Technology 2(1), 22–29 (2011) ISSN: 0976-4860

    Google Scholar 

  10. Deswal, S., Singh, S.: Implementation of Routing Security Aspects in AODV. International Journal of Computer Theory and Engineering 2(1), 135–138 (2010)

    Google Scholar 

  11. Dahshan, H., Irvine, J.: An Elliptic Curve Distributed Key Management for Mobile Ad Hoc Networks. In: IEEE 71st Vehicular Technology Conference (VTC 2010-Spring) (2010)

    Google Scholar 

  12. Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security 10(3), 213–219 (2010)

    Google Scholar 

  13. Rizwan, A., Amin, N., Shah, M., Siddique, U.: Security Technique in Routing Protocol for Mobile Ad-Hoc Network (MANET). In: International Conference on Engineering and Information Management (ICEIM 2011) (2011)

    Google Scholar 

  14. Zheng, Y., Imai, H.: How to construct signcryption schemes on elliptic curve. Information Processsing Letters 68 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Amin, N., Nizamuddin, Ibrahim, A. (2012). ECAODV: Enhanced Classified Ad-Hoc on Demand Distance Vector Routing Protocol. In: Chowdhry, B.S., Shaikh, F.K., Hussain, D.M.A., Uqaili, M.A. (eds) Emerging Trends and Applications in Information Communication Technologies. IMTIC 2012. Communications in Computer and Information Science, vol 281. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28962-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28962-0_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28961-3

  • Online ISBN: 978-3-642-28962-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics