INTEGRATING SECURE MULTIPATH MOBILE AD HOC NETWORK WITH SELF-AUTHENTICATION STRATEGY

Supachote Lertvorratham and Pipat Hiranvanichakorn

References

  1. [1] P. Goyal, S. Batra, and A. Singh, A literature review of securityattack in mobile ad-hoc networks, International Journal ofComputer Applications, 9 (12), 2010, 11–15.
  2. [2] H. Zheng and J. Uchida, An optimal certificate dispersalalgorithm for mobile ad hoc networks, IEICE TransactingFundamentals, E88–A(5), 2005, 42–48.
  3. [3] D. Balfanz, D.K. Smetters, P. Stewart, and H.C. Wong, Talk-ing to strangers: authentication in ad-hoc wireless networks,http://citeseer.ist.psu.edu/balfanz02talking.html, 2002.
  4. [4] M.G. Gouda and E. Jung, Certificate dispersal in ad-hocnetworks, The 24th Int. Conf. on Distributed ComputingSystems, Tokyo, Japan, 2004, 616–623.
  5. [5] E. Jung, E.S. Elmallah, and M.G. Gouda, Optimal disper-sal of certificate chains, IEEE Transactions on Parallel andDistributed Systems, 18 (4), 2007, 474–484.
  6. [6] B. Lehane and L. Doyle, Shared RSA key generation in amobile ad hoc network, Military Communications Conference,2, Boston, MA, 2003, 814–819.
  7. [7] R. Bhaskar, D. Augot, C. Adjih, P. Muhlethaler, and S. Boud-jit, AGDH (Asymmetric Group Diffie Hellman) an efficientand dynamic group key agreement protocol for ad hoc net-works, New Technologies, Mobility and Security (Netherlands:Springer, 2007), 633.
  8. [8] G. Montenegro and C. Castelluccia, Statistically unique andcryptographically verifiable (SUCV) identifiers and addresses,The Ninth Annual Network and Distributed System SecuritySymposium, San Diego, CA, 2002, 1–13.
  9. [9] V. Vetriselvi and R. Parthasarathi, Secure communication formulti-path ad-hoc network, Conf. on Convergent Technologiesfor Asia-Pacific Region, 3, 2003, 1086–1090.
  10. [10] L. Zhou and Z.J. Hass, Securing ad hoc networks, IEEENetwork Magazine, 13, November/December 1999, 24–30.
  11. [11] K. Sanzgiri, B. Dahilly, B.N. Leviney, C. Shieldsz, andE.M. Belding-Royer, A secure routing protocol for ad hocnetworks, The 10th IEEE Int. Conf. on Network Protocols(ICNP’02), Paris, France, 2002, 78–87.
  12. [12] P. Papadimitratos and Z.J. Hass, The secure routing protocol(SRP) for ad hoc networks, The SCS Communication Networksand Distributed Systems Modeling and Simulation Conference(CNDS 2002), San Antonio, TX, January 2002, 27–31.
  13. [13] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygian-nis, Secure routing and intrusion detection in ad hoc network,The Third IEEE Int. Conf., Kauai, HI, March 2005, 191–199.
  14. [14] Y. Hu, D.B. Johnson, and A. Perrig, SEAD: secure efficientdistance vector routing for mobile wireless ad hoc networks,183The Fourth IEEE Workshop on Mobile Computing Systemsand Applications, Callicoon, NY, 2002, 3–13.
  15. [15] M.G. Zapata, Secure ad hoc on-demand distance vector(SAODV) routing, Mobile Computing and CommunicationsReview, 6 (3), 2002, 106–107.
  16. [16] P.M. Jawandhiya, M.M. Ghonge, and M.S. Ali, A surveyof mobile ad hoc network attacks, International Journal ofEngineering Science and Technology, 2 (9), 2010, 4063–4071.
  17. [17] S.J. Lee and M. Gerla, Split multipath routing with maximallydisjoint paths in ad hoc networks, IEEE International Conf.on Communications 2001, ICC 2001, 10, Helsinki, Finland,2001, 3201–3206.
  18. [18] S.J. Lee and M. Gerla, AODV-BR: backup routing in ad hocnetworks, Wireless Communications and Networking Confer-ence, 2000, WCNC 2000 IEEE, 3, Chicago, IL, 2000, 1311–1316.
  19. [19] A. Nasipuri and S.R. Das, On-demand multipath routing formobile ad hoc networks, The Eighth Int. Conf. on ComputerCommunications and Networks, Boston, MA, 1999, 64–70.
  20. [20] W. Wei and A. Zakhor, Multipath unicast and multicast videocommunication over wireless ad hoc networks, The First Int.Conf. on Broadband Networks, San Jose, CA, 2004, 496–505.
  21. [21] S. Lertvorratham and P. Hiranvanichchakorn, Path selectionstrategies for multipath ad hoc network, The IASTED Int.Conf. on Communication Systems and Networks (AsiaCSN2007 ), Phuket, Thailand, April 2007, 164–170.
  22. [22] L. Chen and W. Heinzelman, Network architecture to supportQoS in mobile ad hoc networks, 2004 IEEE Int. Conf. onMultimedia and Expo, Naples, Italy, 2004, 1715–1718.
  23. [23] L. Chen and W. Heinzelman, QoS-aware routing based onbandwidth estimation for mobile ad hoc networks, IEEEJournal on Selected Areas in Communications, 23 (3), 2005,561–572.
  24. [24] H. Sun and H. Hughes, Adaptive multi-path routingscheme for QoS support in mobile ad-hoc networks,http://www.scs.org/scsarchive/getDoc.cfm?id=2454, 2003.
  25. [25] K. Wu and J. Harms, QoS support in mobile ad hoc networks,Crossing Boundaries, 1 (1), 2001, 92–106.
  26. [26] M. Jain, P. Sharma, and S. Banerjee, QoS-guaranteed pathselection algorithm for service composition, The 14th IEEEInt. Workshop on Quality of Service, New Haven, CT, June2006, 288–289.
  27. [27] A. Bavejay and A. Srinivasanz, Approximation algorithmsfor disjoint paths and related routing and packing problems,Mathematics of Operations Research, 255 (2), 2000, 255–280.
  28. [28] R. Vidhya and G.P.R. Kuma, Securing data in ad hoc networksusing multipath routing, International Journal of Advances inEngineering and Technology, 1 (5), 2011, 337–341.
  29. [29] B.M. Manjre and V.A. Gulhane, Secure and reliable ad-hoc ondemand multipath distance vector routing protocol for mobilead hoc networks, Proc. 2011 Int. Conf. on Information andNetwork Technology IPCSIT, 4, Singapore, 2011, 79–83.
  30. [30] P. Hiranvanichchakorn and S. Lertvorratham, Using regressionanalysis for improving multipath ad hoc network performance,The International Journal of Computers and Applications,32 (2), 2010, 206–214.
  31. [31] IEEE, ANSI/IEEE Std 802.11, 1999 Edition (R2003) – Part 11:Wireless LAN Medium Access Control (MAC) and PhysicalLayer (PHY) Specifications, June 2003.
  32. [32] National Institute of Standards and Technology (NIST), SecureHash Standard, Federal Information Processing Standards(FIPS) Publication 180-1, May 1993.
  33. [33] R.L. Rivest, The MD5 message-digest algorithm, RFC 1321,April 1992.
  34. [34] M.O. Pervaiz, M. Cardei, and J. Wu, Routing security inad hoc wireless network, IEEE Communications Magazine,40 (10), 2002, 70–75.
  35. [35] R. Bar, JiST – Java in simulation time user guide,http://jist.ece.cornell.edu/docs/040319-jist-user.pdf, March2004.
  36. [36] R. Bar, SWANS – scalable wireless ad hoc network simula-tor user guide, http://jist.ece.cornell.edu/docs/040319-swans-user.pdf, March 2004.

Important Links:

Go Back