A Routing Protocol for Combating Against Compromised Nodes

Dr. Amit Goel,
Prof. Ashok Sharma
To add a paper, Login.

With recent performance advancements in wireless communication technologies, mobile wireless computing has become increasingly popular. Wireless network provide mobile users with ubiquitous communication capability and information access regardless of its location. The conventional wireless networks require centralized monitoring through a fixed infrastructure. Here every mobile node in a communication cell can reach a base station in a single hop radio transmission. In parallel with single hop network, another type of model based on radio-to-radio multihopping, has been evolving to serve a growing number of applications which rely on fast deployable multi-hop, infrastructure- less network. The classical examples are battlefield communication, disaster and recovery, search and rescue operations etc. This kind of network is known as Mobile Ad Hoc Network. It consists of a collection of mobile hosts forming a dynamic multi-hop autonomous network [1]. The salient features of MANET are the ability to configure and maintain the network by itself, flexible, low cost, etc.

In the earlier days, the medium channel access and multi-hop wireless routing were the most prominent problems on which the effort was focused. However, recent wireless research indicates security has become a primary concern in order to provide secured communication. The security mechanisms existing in wired networks cannot be directly applied in MANET due to the challenges posed by its inherent characteristics. The existing routing protocols in MANET such as DSR, DSDV, AODV, etc. assumed a trusted and cooperative environment and thus attacker can disrupt the network protocol [4]. In the wired network, router acts as a wall that separates inside and outside networks. However in MANET, each mobile host acts as a router and therefore it lacks a line of defense. In order to provide secured cum efficient routing protocol, a trade off between network performance and security strength should be achieved.This paper proposes a routing protocol for fighting against compromised nodes.

Keywords: Mobile Ad hoc Networks, Routing protocols, Security, Attacks, Compromised Nodes
Stream: Human Technologies and Useability
Presentation Type: Virtual Presentation in English
Paper: Routing Protocol for Combating Against Compromised Nodes, A

Dr. Amit Goel

Lecturer, Department of Computer Engineering, YMCA Institute of Engineering

Sh.Amit Goel received his M.Tech (Comp. Engg.) with Hons. from National Institute of Technology (NIT), Trichy (India) in the year 2003. He is a recipient of EFIP scholarship sponsored by AICTE. From Feb 2003 to June 2003, he served at NIT Kurukshetra (India). Since July 2003, he is working as Lecturer in Computer Engg. at YMCA Institute of Engineering, Faridabad (India). Currently he is pursuing his Ph.D. in the area of Mobile Ad Hoc Networks.

Prof. Ashok Sharma

Professor, Dept of Computer Engg, YMCA Institute of Engg

Ref: T06P0349