CFP last date
15 May 2024
Call for Paper
June Edition
IJAIS solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 15 May 2024

Submit your paper
Know more
Reseach Article

A Novel Algorithm HSHA to Secure Wireless Ad hoc Network

by Atul Patel, Paresh Virparia, Ruchi Kansara
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 3
Year of Publication: 2012
Authors: Atul Patel, Paresh Virparia, Ruchi Kansara
10.5120/ijais12-450149

Atul Patel, Paresh Virparia, Ruchi Kansara . A Novel Algorithm HSHA to Secure Wireless Ad hoc Network. International Journal of Applied Information Systems. 1, 3 ( February 2012), 33-37. DOI=10.5120/ijais12-450149

@article{ 10.5120/ijais12-450149,
author = { Atul Patel, Paresh Virparia, Ruchi Kansara },
title = { A Novel Algorithm HSHA to Secure Wireless Ad hoc Network },
journal = { International Journal of Applied Information Systems },
issue_date = { February 2012 },
volume = { 1 },
number = { 3 },
month = { February },
year = { 2012 },
issn = { 2249-0868 },
pages = { 33-37 },
numpages = {9},
url = { https://www.ijais.org/archives/volume1/number3/76-0149/ },
doi = { 10.5120/ijais12-450149 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:41:16.421412+05:30
%A Atul Patel
%A Paresh Virparia
%A Ruchi Kansara
%T A Novel Algorithm HSHA to Secure Wireless Ad hoc Network
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 1
%N 3
%P 33-37
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. Here we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks — multiple routes between nodes — to defend routing against denial of service attacks. We use replication and new cryptographic schemes, such as HSHA Key cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework. It helps the network to let the intruder cannot access the packet without the proper authentication. Unauthorized user cannot access the packet. There are various consequences of this algorithm.

References
  1. Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo. Secure Border Gateway Protocol (S-BGP) . Real World Performance and Deployment Issues. In Proceedings of the 2000 Symposium on Network and Distributed Systems Security (NDSS '00), pages 103.116, February 2000.
  2. Jiejun Konh, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In Proceedings of the Ninth International Conference on Network Protocols (ICNP'01), pages 251.260, November 2001.
  3. Bridget Dahill, Kimaya Sanzgiri, Brian Neil Levine, Elizabeth Royer, and Clay Shields. A Secure Routing Protocol for Ad hoc Networks. In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP '02), November 2002.
  4. Manel Guerrero Zapata and N. Asokan. Securing Ad Hoc Routing Protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2002), September 2002.
  5. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless adhoc networks: a survey. Comput. Netw. 2002; 38(4):393–422, doi:http://dx.doi.org/10.1016/S1389-1286(01)00302-4.
  6. V. B. Misic, J. Fung, and J. Misic. MAC Layer Security of 802.15.4-Compliant Networks. In 2nd IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE MASS 2005): International Workshop on Wireless and adhoc Networks Security, Washington, DC, USA, November 2005.
  7. F. Dressler. Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks. In 2nd IEEE International Conference on Mobile Ad Hoc and Sensor Systems (IEEE ASS 2005): International Workshop on Wireless and adhoc Networks Security, pages 781–786, Washington, DC, USA, November 2005.
  8. Izhak Rubin, Runhe Zhang, "Adhoc Robust throughput and routing for mobile ad hoc wireless networks", Ad Hoc Networks Elsevier Volume 7, Issue 2, March 2008, Pages 265-280.
  9. Nitesh Saxena, “Public Key Cryptography Sans Certificates in Ad Hoc Networks”, ACNS 2006, LNCS 3989, pp. 375-389.
  10. Dijiang Huang, “Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks”, Int. J. Security and Networks, Vol. 2, Nos. 3/4, 2007 pp272-283.
  11. Jared Cordasco, Susanne Wetzel, “Cryptography vs. Trust-based Methods for MANET Routing Security”, Electronic Notes in Theoretical Computer Science TM 2007.
  12. Ching Yu Ng, Yi Mu, and Willy Susilo, "An identity-based broadcast encryption scheme for mobile ad hoc networks", Journal of Telecommunication and Information Technology, 1/2006, pp 23-29.
  13. Sheng-Ti Li, Xiong Wang, "Enhanced Security Design for Threshold Cryptography in Ad Hoc Network", NEW2AN 2004, St.Petersburg,Russia, pp27-31.
  14. C.K. Toh, M. Delwar, D. Allen, "Evaluating the communication performance of an ad hoc wireless network", IEEE Transactions on Wireless Communications 1 (3) (2002), pp 402-414.
  15. A. Santos, A. Edwards, R.M. Edwards, N.L. Seed, "Performance evaluation of routing protocols in vehicular ad-hoc networks”, International Journal of Ad Hoc and Ubiquitous Computing 2005 - Vol. 1, No.1/2 pp. 80 – 91
  16. Wilson T.H. Woon, Tat-Chee Wan, "Performance evaluation of IEEE 802.15.4 wireless multi-hop networks: simulation and testbed approach", International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC) Volume 3 - Issue 1 - 2008, pp57 - 66.
Index Terms

Computer Science
Information Sciences

Keywords

Ad hoc network Cryptography Wireless network Key Management