A secure on-demand source routing scheme using hierarchical clustering in mobile ad hoc networks

  • Authors:
  • Woei-Jiunn Tsaur;Haw-Tyng Pai

  • Affiliations:
  • Department of Information Management, Dayeh University, Changhwa, Taiwan, R.O.C.;Department of Information Management, Dayeh University, Changhwa, Taiwan, R.O.C.

  • Venue:
  • ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In mobile ad hoc networks (MANETs), since all of the nodes communicate each other based on the routing protocol, and an attacker could manipulate a lower-level protocol to interrupt a security mechanism in a higherlevel one, securing routing protocol is an important issue in MANETs. Recently, there exist several proposals that attempt to develop a secure routing protocol for MANETs. However, those methods are not actually secure against a variety of attacks, including the Sybil, wormhole, black hole, replay, blackmail, denial of service, and routing table poisoning attacks. Therefore, in this paper we design a secure hierarchical-clustering-based routing scheme using the self-certified public key cryptosystem, elliptic curve cryptosystem, pre-hashing, and nonce techniques against such attacks. Finally, we also analyze the advantages of our proposed scheme in terms of security and superiority.