Abstract

Problem statement: An Ad hoc network has been defined as a self-organizing, dynamic topology network formed by a group of wireless mobile nodes. Minimal configuration, absence of infrastructure and quick deployment, would make ad hoc networks convenient for emergency situations other than military applications. In recent years, security in Ad hoc Networks as a research topic had started to receive attention from a growing number of researchers. Approach: Several ad hoc network routing protocols have been proposed; only some of them consider the security problems. To secure an ad hoc network, the attributes like availability, confidentiality, integrity, authentication and non-repudiation may be considered. In this study, authentication is taken into consideration. Here, Double Hash Authentication Technique (DHT) has been incorporated for ad hoc networks. The security associations between nodes were established, when they were in the vicinity of each other, by exchanging appropriate cryptographic information. This security mechanism has been simulated on Dynamic Source Routing (DSR) protocol in addition to Self-Healing and Optimized Routing Technique (SHORT) made the routing secure for ad hoc networks. Result: The results have shown that in a moderately changing network, the Double Hash Technique has provided secure routing even in the presence of malicious nodes. Conclusion: The Double Hash Technique in association with SHORT has improved the performance of the DSR protocol.

Highlights

  • MATERIALS AND METHODSAd hoc networks are a new paradigm of wireless communication for mobile hosts

  • The packets may travel through malicious node in Dynamic Source Routing (DSR) the delivery ratio of Double Hash Authentication Technique (DHT) is better than DSR and Self-Healing and Optimized Routing Technique (SHORT) is still better

  • Dual Hash Technique has less control packets compared to DSR and SHORT has further reduced them

Read more

Summary

MATERIALS AND METHODS

Ad hoc networks are a new paradigm of wireless communication for mobile hosts (which we call nodes). The information related to the digital signatures and the hash chains is transmitted with the DSR messages each node needs to distribute a common secret by its two-hop node group. On receiving the encrypted key each node decrypts it with the corresponding private key and gets the common secret key Ks. Due to the mobility, ad hoc network can result in the change of the local node groups and the distribution of the common secrets should be adjusted timely. In DSR, the routing table at the nodes caches the hop router information for a destination and use it as long as the hop router remains active (originates or relays at least one packet for that destination within a specified time-out period) This SHORT technique is applied to Double Hash Technique to reduce the associated delay. 4.0 Simulation time-100 seconds and 900 seconds MAC Protocol-802.11b case, DHT prevents the packets entering the malicious node, as a result the packets transferred in alternate paths to destination

RESULTS
DISCUSSION
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call