Addressing Security Concerns of Data Exchange in AODV Protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Addressing Security Concerns of Data Exchange in AODV Protocol

Authors: Monis Akhlaq, M Noman Jafri, Muzammil A Khan, Baber Aslam

Abstract:

The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.

Keywords: AODV, key management, security, wirelessnetworks.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1071174

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2039

References:


[1] IEEE Computer Society, "IEEE 802.11 Standard, IEEE Standard for Information Technology", 1999. http://standards.ieee.org/catalog/olis/lanman.html.
[2] S Corson and J. Macker. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. Internet Request for comment RFC 2501, Jan 1999.
[3] Michael Jarrett, Paul Ward, "Trusted Computing for Protecting Ad-hoc Routing," cnsr, pp. 61-68, 4th Annual Communication Networks and Services Research Conference (CNSR'06), 2006.
[4] Muhammad O Pervaiz, Mihaela Cardei and Jei Wu: Routing security in ad hoc wireless networks, Department of Computer Science and Engg, Florida Atlantic University, Boca Raton, FL 33431.
[5] C. Perkins and P Bhagwat, "Highly Dynamic Destination Sequenced Distance Vector Routing DSDV for mobile computers". In ACM SIGCOMM-94 Conference on Communication Architectures, protocols and applications, 1994, pp. 234-244.
[6] C.E. Perkins, E. Belding Royer, and S.R. Das, "Ad hoc On demand distance vector (AODV) routing", IETF RFC 3561, July 2003.
[7] Hao Yang, Haiyun Loo, Fan Ye, Sogwu Lu and Lixia Zhog: Security in mobile ad hoc networks, challenges solution, Wireless Communication, IEEE Volume I, issue I publication date Feb 2004.
[8] Bingwen He, Joakin Hagglund, QingGu: Security in Ad hoc Network. http://www.cse.fau.edu/~jie/research/publications/Publication_files/Sec ureRouting.pdf
[9] T Friiso, T Brekne, P Haaland, M Radziwill. Security challenges in self organizing wireless networks. Telenor No ISBN 82-423-0581-1, ISSN 1500-2616, project No TFPFAN programme peer to peer computing security Gr, Dec 2003.09.08.
[10] Gustav J. Simmons. Symmetric and Assymetric encryption. ACM Computing surveys (CSUR). Volume 11, Issue 4 pp 305-330, Dec 1979.
[11] Bruce Schneir: Applied Cryptography. John Wiley and sons inc, 1996.
[12] M. G. Zapata, `Secure Ad hoc On-Demand Distance Vector (SAODV) Routing', INERNET DRAFT, draft-guerrero-manet-saodv-00.txt, Aug. 2001.
[13]
[13] Seung Yi, Prasad Naldrug, Robin kravets: A security aware routing protocol for wireless ad hoc networks, In the proceedings of 3rd ACM international of mobile ad hoc networking and computing pp 226- 236, 2002.
[14]
[14] T. Dierks and C. Allen. The TLS protocol version 1.0 , RFC 2246, Jan 1999.
[15] Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei: A survey of attacks and counter measures in mobile ad hoc networks, Department of Computer Science and Engg, Florida, Atlanta university. http://student.fau.edu/jchen8/web/papers/SurveyBookchapter.pdf
[16] S. Kent and R. Atkinson. Security architecture for the Internet Protocol. Internet Request for comment RFC 2401, Internet Engineering Task Force, Nov.1998.
[17] C. R. Davis. IPSec: Securing VPNs. McGraw-Hill, New York, 2000.
[18] "Advanced Encryption Standard (AES) (FIPS PUB 197). "National Institute of Standards and Technology (NIST)". Nov 2001.
[19] Project No: IST-507102, Project full title: My Personal Adaptive Global NET (MAGNET).http://www.istmagnet.org/GetAsset.action?contentId= 942902&assetId=943011