DocumentCode :
2077838
Title :
Authenticated routing of table driven protocol in an ad-hoc environment
Author :
Janjua, Faiza Younas ; Sultan, Samia ; Muzaffar, Mariam ; Ahmed, Zaheer ; Khan, Shoab A.
Author_Institution :
Fatima Jinnah Women´´s Univ., Rawalpindi, Pakistan
fYear :
2004
fDate :
11-13 June 2004
Firstpage :
6
Lastpage :
12
Abstract :
Mobile ad-hoc networks (MANETs) are a new paradigm of wireless communication for mobile hosts. Recently, there has been an increased interest in infrastructureless secure mobile ad-hoc networks (SMANETs). One of the fundamental challenges facing the designers of the SMANETs, especially for military networks, is to provide central command and control over the network. The paper presents an optimal solution for such a network by securing an ad-hoc network running a table driven protocol. The system minimizes computation, power dissipation, and bandwidth by customizing the security algorithm for a specific application. We use a semi-centralized technique, instead of a decentralized one, which requires more computational costs along with high consumption of power and bandwidth. The optimized link state routing protocol (OLSR) is used as the protocol, but the solution can be easily tailored for other proactive protocols for ad-hoc networks. Our main focus is on authenticating each mobile node using computationally inexpensive hashing techniques and public key exchange mechanisms in an asymmetric key set-up. In order to protect the protocol from replay attacks, distributed timestamps have been utilized. The goal is a survivable system that works well even in the presence of malicious nodes.
Keywords :
ad hoc networks; authorisation; command and control systems; computational complexity; minimisation; mobile radio; power consumption; public key cryptography; routing protocols; security; telecommunication security; authenticated routing; bandwidth consumption; central command and control; computational costs; distributed timestamps; hashing techniques; link state routing protocol; military networks; power consumption; proactive protocols; public key exchange mechanisms; secure mobile ad-hoc networks; survivable system; table driven protocol; Ad hoc networks; Bandwidth; Command and control systems; Computational efficiency; Military computing; Mobile computing; Power dissipation; Power system security; Routing protocols; Wireless communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networking and Communication Conference, 2004. INCC 2004. International
Print_ISBN :
0-7803-8325-7
Type :
conf
DOI :
10.1109/INCC.2004.1366568
Filename :
1366568
Link To Document :
بازگشت