Corpus ID: 53592031

Addressing Security Concerns of Data Exchange in AODV Protocol

@article{Akhlaq2008AddressingSC,
  title={Addressing Security Concerns of Data Exchange in AODV Protocol},
  author={M. Akhlaq and M. Jafri and Muzammil Khan and B. Aslam},
  journal={Journal of information and communication convergence engineering},
  year={2008},
  volume={2},
  pages={677-681}
}
  • M. Akhlaq, M. Jafri, +1 author B. Aslam
  • Published 2008
  • Computer Science
  • Journal of information and communication convergence engineering
The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi… Expand
Data security key establishment in AODV
TLDR
The mechanism proposed in [1] addresses the issues related to overheads and processing in AODV but its use is restricted to network layer only. Expand
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
TLDR
This work identifies the security issues related to this problem, discusses the challenges to security design, and review the state of-the-art security proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel. Expand
A secure AODV routing protocol with node authentication
  • P. Yadav, Muzzammil Hussain
  • Computer Science
  • 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA)
  • 2017
TLDR
A simple mechanism to secure AODV routing protocol is proposed, which enables node authentication before route establishment by embedding digital certificate in HELLO packet, so that any unauthorized entity cannot participate in the routing process. Expand
Implementing Authentication Mechanism using Extended Public Key Cryptography in Wireless Network
Mobile ad hoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of establish infrastructure. In mobile ad hoc network, it is much more vulnerableExpand
ECAODV: Enhanced Classified Ad-Hoc on Demand Distance Vector Routing Protocol
TLDR
This paper has proposed Enhanced Classified Ad-hoc on Demand Distance Vector protocol with a unique key management infrastructure for building cost effective and establishing secure links between nodes in MANET, and provides all security features with tremendous low computation and communication cost. Expand
A Survey on Network Layer Attacks and AODV Defense in Mobile Ad Hoc Networks
TLDR
A detailed review analysis of the security requirements of the network layer security problems in MANETs is presented and network layer attacks and Ad-hoc On Demand Distance Vector routing protocol and some of its variants are carried out. Expand
Time Stamp based Cross Layer MANET Security Protocol
TLDR
A Cross layer timestamp based network security technique is developed which reduces the encryption packet overflow which is due to PKE or public key exchange, and derives the public key directly from the neighbor’s table which is transmitted using routing information exchange. Expand
Vulnerabilities, Challenges and Threats in Securing Mobile Ad-Hoc Network
TLDR
The vulnerabilities, challenges and security attacks on ad-hoc routing protocols which leads to difficulties in designing and development of a secure routing protocol and is challenging task for researcher in an open and distributed communication environments are discussed. Expand
A NOVEL CRYPTOGRAPHIC APPROACH TO SECURE DATA IN MANET
A communication network is needed in case of emergency such as disaster or any rescue operations such as Military wars. We need an immediate communication network. In such cases a temporary networkExpand
MANET Routing Protocols and Wormhole Attack against AODV
Summary: In this era of wireless devices, Mobile Ad-hoc Network (MANET) has become an indivisible part for communication for mobile devices. Therefore, interest in research of Mobile Ad-hoc NetworkExpand
...
1
2
3
4
...

References

SHOWING 1-10 OF 22 REFERENCES
Trusted computing for protecting ad-hoc routing
TLDR
This work extends AODV to ensure that only trustworthy nodes participate in the network, and proposes using trusted computing to prevent misconfigured or malicious nodes from participating in thenetwork. Expand
A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks
TLDR
This chapter provides a survey of attacks and countermeasures in MANET and puts forward an overview of MANET intrusion detection systems (IDS), which are reactive approaches to thwart attacks and used as a second line of defense. Expand
Secure Ad hoc On-Demand Distance Vector (SAODV) Routing
The Secure Ad hoc On-Demand Distance Vector (SAODV) is an extension of the AODV routing protocol that can be used to protect the route discovery mechanism providing security features like integrityExpand
Ipsec: Securing Vpns
From the Publisher: Written in conjunction with RSA Security—the most trusted name in e-security—this book gives a detailed presentation of IPSec components,implementation,and VPN interoperability.Expand
Routing Security in Ad Hoc Wireless Networks
TLDR
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. Expand
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
TLDR
The modifications address some of the previous objections to the use of Bellman-Ford, related to the poor looping properties of such algorithms in the face of broken links and the resulting time dependent nature of the interconnection topology describing the links between the Mobile hosts. Expand
Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers
TLDR
The modifications address some of the previous objections to the use of Bellman-Ford, related to the poor looping properties of such algorithms in the face of broken links and the resulting time dependent nature of the interconnection topology describing the links between the Mobile hosts. Expand
Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations
TLDR
The characteristics of Mobile Ad hoc Networks (MANETs), and their idiosyncrasies with respect to traditional, hardwired packet networks, are described, with an emphasis on routing performance evaluation considerations. Expand
The TLS Protocol Version 1.0
TLDR
This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol, which provides communications privacy over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. Expand
Ad hoc On-Demand Distance Vector (AODV) Routing
TLDR
A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity. Expand
...
1
2
3
...