scispace - formally typeset
Proceedings ArticleDOI

Emulating cryptographic operations for secure routing in Ad-hoc Network

B. N. Jagdale, +1 more
- pp 1-4
Reads0
Chats0
TLDR
This work proposes unobservable secure routing protocol where data packets and control packets are completely protected and achieves content unobservability by applying group signature and ID-based encryption.
Abstract
MANET is used by many researchers to provide security and to implement protocols for secure routing. Privacy and security are important in applications like Military and Law-Enforcement MANETs. Communication in MANET is more susceptible due to broadcasting nature of radio transmission. It is necessary to provide security against inside and outside adversaries. There are many existing schemes which provide privacy preserving routing. These schemes do not offer complete unlink ability and unobservability. We propose unobservable secure routing protocol where data packets and control packets are completely protected. It achieves content unobservability by applying group signature and ID-based encryption. This protocol works in two stages anonymous key establishment and unobservable route discovery. We implement unobservable secure routing protocol with security algorithms RSA, AES, DES with AODV in NS-2 and compare it with AODV. Our protocol is more efficient than existing schemes.

read more

Citations
More filters
Book ChapterDOI

A Modified RSA Cryptography Algorithm for Security Enhancement in Vehicular Ad Hoc Networks

TL;DR: A modified RSA algorithm called MRSA with three prime numbers j, k, and l for VANETs to increase the level of security in vehicular communication and enhance thelevel of security with small key size is proposed.
Journal ArticleDOI

Trust-based secure routing in IoT network based on rider foraging optimization algorithm

TL;DR: In this article , the authors proposed a secure routing in IoT with minimal delay, minimal energy consumption and high throughput. But, the proposed RFO algorithm selects the optimal path using the fitness factors, such as trust, energy, and delay constraints.
References
More filters
Book ChapterDOI

Short Group Signatures

TL;DR: In this article, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Journal Article

Short group signatures

TL;DR: In this paper, the authors proposed a group signature scheme based on the Strong Diffie-Hellman assumption and a new assumption in bilinear groups called the Decision Linear assumption.
Proceedings ArticleDOI

Optimized link state routing protocol for ad hoc networks

TL;DR: OLSR is an optimization over a pure link state protocol as it compacts the size of information sent in the messages, and furthermore, reduces the number of retransmissions to flood these messages in an entire network.
Book ChapterDOI

Privacy-preserving set operations

TL;DR: By building a framework of multiset operations, employing the mathematical properties of polynomials, this work designs efficient, secure, and composable methods to enable privacy-preserving computation of the union, intersection, and element reduction operations.
Proceedings ArticleDOI

AODV routing protocol implementation design

TL;DR: The event triggers required for AODV operation, the design possibilities and the decisions for the ad hoc on-demand distance vector routing protocol implementation, A ODV-UCSB are described.
Related Papers (5)