Hashing Routing

Daljeet Singh Matharu, Priyanka Kaura, Vikas *

Abstract


A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Mostly work has been concentrated on routing aspect. Most of the protocols in this category are not incorporating proper security features. Security is one of the most important concepts in ad hoc networks. It has been observed that different protocols need different strategies for security. The study here proposes a theory in this article based on Hashing as a tool. This scheme can make most of the on demand protocols secure. The study should help in making protocols more robust against attacks and standardize parameters for security in routing protocols.

Keywords


Security, Ad hoc networks, MANET, Hashing

Full Text:

PDF

References


Stallings W. Network and Internetwork Security: Principles and Practice. Englewood Cliffs, NJ: Prentice Hall, 1995. [2] Secure Hash Standard (SHS). Federal Information Processing Standards Publication National Institute of Standards and Technology, Springfield, Virginia. FIPS Pub, 180. May 1993. [3] Bayya A. Security in Ad-hoc Networks, Computer Science Department. University of Kentucky, Lexington, USA. [4] Yih-Chun H, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for ad-hoc networks. Springer Science + Business Media, Inc., 2005; 11: 21-38.

J. Adv. Res. Netw. Comm. Engi. 2016; 3(1&2) Matharu DS et al.

Yih-Chun H, Perrig A, Johnson DB. Sead: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Elsevier 2003; 1: 175-92. [6] Tang D, Chang C, Tanaka K et al. Resource Discovery in Ad-Hoc networks. Computer System Laboratory, Stanford University, California, 1998. [7] Inkinen K. New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes. HUT T-110.551 Seminar on Internetworking. Sjokulla, 2004. [8] Yang H, Luo H, Ye F et al. Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 2004; 11(1): 38-47.

Zapata MG. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. Mobile Computing and Communications Review 2001; 6(3). [10] Zapata MG, Asokan N. Securing Ad Hoc Routing Protocol. WiSe, Atlanta, Georgia, USA, 2002. [11] Po-Wah Y, Mitchell CJ. Security Vulnerabilities in AdHoc Networks. Royal Holloway, University of London, Surrey, UK. [12] Young Ho P, Hwangjun S, Kyung Keun L et al. Secure Route Discovery Protocol for Ad Hoc Networks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2007; E90-A(2)


Refbacks

  • There are currently no refbacks.