Abstract
Wireless mobile ad hoc networks are the special type of networks where a collection of mobile devices forms a temporary network without any established infrastructure aid. Having no central infrastructure and random devices movement cause some problems in ad hoc networks such as routing and security. Routing is a critical function in mobile ad hoc networks. The most important requirement for routing protocols is the capability to act in adversarial environments. In this article a secure routing algorithm is suggested to increase confidentiality and authentication in ad hoc routing protocols. The secure routing algorithm presented with two methods high secure AODV authenticated with asymmetric algorithms (HSAODV1) and high secure AODV authenticated with MAC algorithms (HSAODV2) which every one of them has two phases as follows: at the first phase of HSAODV1, the source, destination and intermediate nodes authenticate by using digital signature and asymmetric algorithms, and in the second phase, the protocol utilizes one way key-chain for increased data confidentiality. In the first phase of HSAODV2, the destination and intermediate nodes authenticate by using MAC algorithm for source node and the second phase operates approximately as the second phase of HSAODV1. In order to assess the functionality of these algorithms, security matrix, normalized routing overhead and energy consumption are evaluated for the proposed algorithm.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.