Title :
Emulating cryptographic operations for secure routing in Ad-hoc Network
Author :
Jagdale, B.N. ; Patil, Mrunal S.
Author_Institution :
Dept. Of Inf. Technol., MITCOE, Pune, India
Abstract :
MANET is used by many researchers to provide security and to implement protocols for secure routing. Privacy and security are important in applications like Military and Law-Enforcement MANETs. Communication in MANET is more susceptible due to broadcasting nature of radio transmission. It is necessary to provide security against inside and outside adversaries. There are many existing schemes which provide privacy preserving routing. These schemes do not offer complete unlink ability and unobservability. We propose unobservable secure routing protocol where data packets and control packets are completely protected. It achieves content unobservability by applying group signature and ID-based encryption. This protocol works in two stages anonymous key establishment and unobservable route discovery. We implement unobservable secure routing protocol with security algorithms RSA, AES, DES with AODV in NS-2 and compare it with AODV. Our protocol is more efficient than existing schemes.
Keywords :
cryptographic protocols; data privacy; mobile ad hoc networks; routing protocols; telecommunication security; AES security algorithms; AODV security algorithms; DES security algorithms; ID-based encryption; NS-2 simulation; RSA security algorithms; anonymous key establishment; control packets; cryptographic operations; data packets; group signature; law-enforcement MANETs; mobile ad hoc network; privacy preserving routing; radio transmission; secure routing protocol; unobservable route discovery; Cryptography; Delays; Mobile ad hoc networks; Protocols; Routing; MANET; anonymity; group signature; privacy; routing; security; unobservability;
Conference_Titel :
Pervasive Computing (ICPC), 2015 International Conference on
Conference_Location :
Pune
DOI :
10.1109/PERVASIVE.2015.7086969