Journal of Computer Science

Authentication Based and Optimized Routing Technique in Mobile Ad hoc Networks

S. Varadhaganapathy, A. M. Natarajan and S. N. Sivanandam

DOI : 10.3844/jcssp.2011.651.656

Journal of Computer Science

Volume 7, Issue 5

Pages 651-656

Abstract

Problem statement: An Ad hoc network has been defined as a self-organizing, dynamic topology network formed by a group of wireless mobile nodes. Minimal configuration, absence of infrastructure and quick deployment, would make ad hoc networks convenient for emergency situations other than military applications. In recent years, security in Ad hoc Networks as a research topic had started to receive attention from a growing number of researchers. Approach: Several ad hoc network routing protocols have been proposed; only some of them consider the security problems. To secure an ad hoc network, the attributes like availability, confidentiality, integrity, authentication and non-repudiation may be considered. In this study, authentication is taken into consideration. Here, Double Hash Authentication Technique (DHT) has been incorporated for ad hoc networks. The security associations between nodes were established, when they were in the vicinity of each other, by exchanging appropriate cryptographic information. This security mechanism has been simulated on Dynamic Source Routing (DSR) protocol in addition to Self-Healing and Optimized Routing Technique (SHORT) made the routing secure for ad hoc networks. Result: The results have shown that in a moderately changing network, the Double Hash Technique has provided secure routing even in the presence of malicious nodes. Conclusion: The Double Hash Technique in association with SHORT has improved the performance of the DSR protocol.

Copyright

© 2011 S. Varadhaganapathy, A. M. Natarajan and S. N. Sivanandam. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.