Research Article |
Challenges in Mobile Ad Hoc Network for Secure Data Transmission
Author(s): Rahul Misra and Prashant Sharma
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 1, Issue 1
Publisher : FOREX Publication
Published : 30 June 2013
e-ISSN : 2347-470X
Page(s) : 8-12
Abstract
An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The primary goal of such an ad-hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. LAR is an on-demand protocol who is based on the DSR (Dynamic Source Routing). The Location Aided Routing protocol uses location information to reduce routing overhead of the ad-hoc network! Normally the LAR protocol uses the GPS (Global Positioning System) to get these location information’s. With the availability of GPS, the mobile hosts knows there physical location. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks - multiple routes between nodes to defend routing against denial of service attacks.
Keywords: LAR
, DSR
, MANETs
, Hand-off
, self-organization
.
Rahul Misra1*, Research Scholar Department of Electronics & Comm. MITS, Gwalior (MP), India; Email: misra.rahul@gmail.com
Prashant Sharma2, Research Scholar Department of Electronics & Comm. MITS, Gwalior (MP), India; Email: prashants158@gmail.com
-
[1] IEEE Std. 802.11 – 1999: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications, Inst. Elec. Electron. Eng., New York, USA, 1999.ISBN 0-7381-1658-0
-
[2] IPN Progress Report, August 15, 2002, Analysis of Energy Consumption for Ad Hoc Wireless Sensor Networks Using a Bit-Meter-Per-Joule Metric, J.L.Gao.
-
[3] A Distributed Light-Weight Authentication Model for Ad-hoc Networks.
-
[4] M. Satyanarayanan. Fundamental challenges in mobile computing Submitted paper.
-
[5] M. Haardt W. Mohr R. Becher, M. Dillinger. Broadband wireless access and future communication networks. Proceedings of the IEEE, 89(1), 2001.
-
[6] S.Chessa, P.Santi, “Comparison Based System-Level Fault Diagnosis in Ad-Hoc Networks”, Proc. IEEE 20th Symp. on Reliable Distributed Systems (SRDS),New Orleans, pp. 257-266, October 2001.
-
[7] Erik Skow, Jiejun Kong, Thomas Phan, Fred Cheng,Richard Guy Rajive Bagrodia, Mario Gerla, and Songwu Lu, “A Security Architecture for Application Session Handoff”
-
[8] Lidong Zhou, Zygmunt J. Haas, “Securing Ad Hoc Networks”.
-
[9] David B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications,December 1994.
-
[10] Ljubica Blazevic, Levente Buttyan, Srdan Capkun, Silvia Giordano, Jean-Pierre, Hubaux and Jean-Yves Le Boudec, “Self- Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes”
-
[11] J. A. Freebersyser and B. Leinerr, “A DoD perspective on mobile ad hoc networks,” in Ad Hoc Networking, C. E. Perkin, Ed. Addison-Wesley, 2001, pp. 29–51.
-
[12] B. Leiner, R. Ruth, and A. R. Sastry, “Goals and challenges of the DARPA GloMo program,” IEEE Personal Communications, vol. 3, no. 6, pp. 34–43, December 1996.
-
[13] R. Ruppe, S. Griswald, P. Walsh, and R. Martin, “Near term digital radio (NTDR) system,” in Proceedings of IEEE MILCOM, vol. 3, November 1997, pp. 1282– 1287