Proceedings ArticleDOI
Emulating cryptographic operations for secure routing in Ad-hoc Network
B. N. Jagdale,Mrunal S. Patil +1 more
- pp 1-4
Reads0
Chats0
TLDR
This work proposes unobservable secure routing protocol where data packets and control packets are completely protected and achieves content unobservability by applying group signature and ID-based encryption.Abstract:
MANET is used by many researchers to provide security and to implement protocols for secure routing. Privacy and security are important in applications like Military and Law-Enforcement MANETs. Communication in MANET is more susceptible due to broadcasting nature of radio transmission. It is necessary to provide security against inside and outside adversaries. There are many existing schemes which provide privacy preserving routing. These schemes do not offer complete unlink ability and unobservability. We propose unobservable secure routing protocol where data packets and control packets are completely protected. It achieves content unobservability by applying group signature and ID-based encryption. This protocol works in two stages anonymous key establishment and unobservable route discovery. We implement unobservable secure routing protocol with security algorithms RSA, AES, DES with AODV in NS-2 and compare it with AODV. Our protocol is more efficient than existing schemes.read more
Citations
More filters
Book ChapterDOI
A Modified RSA Cryptography Algorithm for Security Enhancement in Vehicular Ad Hoc Networks
Debasish Roy,Prodipto Das +1 more
TL;DR: A modified RSA algorithm called MRSA with three prime numbers j, k, and l for VANETs to increase the level of security in vehicular communication and enhance thelevel of security with small key size is proposed.
Journal ArticleDOI
Trust-based secure routing in IoT network based on rider foraging optimization algorithm
Kore Amit Vijay,Manoj Mishra +1 more
TL;DR: In this article , the authors proposed a secure routing in IoT with minimal delay, minimal energy consumption and high throughput. But, the proposed RFO algorithm selects the optimal path using the fitness factors, such as trust, energy, and delay constraints.
References
More filters
Book ChapterDOI
Short Group Signatures
TL;DR: In this article, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Journal Article
Short group signatures
TL;DR: In this paper, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Proceedings ArticleDOI
Optimized link state routing protocol for ad hoc networks
TL;DR: OLSR is an optimization over a pure link state protocol as it compacts the size of information sent in the messages, and furthermore, reduces the number of retransmissions to flood these messages in an entire network.
Book ChapterDOI
Privacy-preserving set operations
Lea Kissner,Dawn Song +1 more
TL;DR: By building a framework of multiset operations, employing the mathematical properties of polynomials, this work designs efficient, secure, and composable methods to enable privacy-preserving computation of the union, intersection, and element reduction operations.
Proceedings ArticleDOI
AODV routing protocol implementation design
TL;DR: The event triggers required for AODV operation, the design possibilities and the decisions for the ad hoc on-demand distance vector routing protocol implementation, A ODV-UCSB are described.