Secure Routing Using ASOR Protocol for MANETs

Abstract

Privacy protection is one of the critical issues in Mobile Adhoc Networks. To provide unobservability and unlinkability on the network was the major requirements. Although ,there was number of secure protocols available previously, still the mobile nodes are insecure and the requirements on the network was not completely satisfied. The risk of security attacks increases, if the distance between the node increases. In order to provide security, the QOS requirements have to be met. Onion routing and group signature are used in this paper to provide secure routing and broadcasting to find secure route for data transmission. Onion routing is used to record a discovered route and to provide intermediate node to modify the routing packets. Without disturbing the anonymity, Group signature is used for authentication.ASOR provides security regarding both inside and outside attacks.

Authors and Affiliations

KALAIMANI A , AMBIKA B , KOUSALYA S , SUBATHRA S R

Keywords

Related Articles

A NEW STATISTICAL APPROACH FOR IMAGE FUSION TECHNIQUE

Image Fusion is an emerging area of research in image processing and computer vision. This paper proposes an algorithm which is statistical based and it overcomes the shortcomings of the traditional image fusion algorith...

System for Devices mobile based in recognition facial

In this paper is documents the development of the work of a security system for mobile devices based on Facial recognition. This recognition is based on the algorithm of Wu and SUSAN, it was obtained for 80% efficiency a...

ANALYSIS OF LAND SURFACE TEMPERTURE AND PREDICTING THE UNKNOWN VALUES USING SPATIAL INTERPOLATION METHODS

This paper compares five spatial interpolation methods of Kriging-exponential, Krigingspherical,Kriging- Gaussian with different weighting values are unity and 1/Standard Deviation in temperature interpolation,utilizing...

PROPOSED ARCHITECTURE: CLOUD BASED MEDICAL INFORMATION RETRIEVAL NETWORK

The latest developments and advancements in the computer science and information technology promise a massive potential that can be harnessed for the improvement of healthcare services especially in the developing countr...

Temporary centralized network Using On-Demand Routing Protocol 

Applications such as conferences, meetings, lectures, crowd control, search and rescue, disaster recovery, and Army battlefields typically do not have central administration or central infrastructure available.In these s...

Download PDF file
  • EP ID EP100253
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

KALAIMANI A, AMBIKA B, KOUSALYA S, SUBATHRA S R (2015). Secure Routing Using ASOR Protocol for MANETs. International Journal of Computer Science & Engineering Technology, 6(1), 1-4. https://europub.co.uk/articles/-A-100253