Design and Implementation of Secure LAR Routing Protocol in MANETs

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2016 by IJCOT Journal
Volume - 6 Issue - 4
Year of Publication : 2016
Authors : Y.V.S.Sai Pragathi, S.P.Setty
DOI : 10.14445/22492593/IJCOT-V34P311

Citation

Y.V.S.Sai Pragathi, S.P.Setty"Design and Implementation of Secure LAR Routing Protocol in MANETs", International Journal of Computer & organization Trends (IJCOT), V6(4):1-3 Jul - Aug 2016, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract MANET is a collection of mobile nodes connected by wireless links without infrastructure. Due to inherent properties of MANETs like limited resources, dynamic topology, wireless medium, the possibility of attacks is more. So, there is a need for provisioning of security in Manets. Different cryptographic algorithms are investigated and Secure LAR is designed. From the results it is found that Secure LAR(S-LAR) with ECC provides security with minimum energy consumption.

References

[1] S.Giordan and W.W.Lu, “Challenges in mobile ad hoc networking”, IEEE Communications Magazine, vol.39, no.6,pp. 129-181, June 2001.
[2] Book: Silvia Giordano, Stefano Basagni, Marco Conti and Ivan Stojmenovic, Mobile adhoc networking, Pg.no 286.
[3] Y.Ko and N.H.Vaidya, “Location-aided routing (LAR) in mobile ad hoc networks,” in Proc. of the ACM/ IEEE International Conference on Mobile Computing and Networking (Mobicom), 1998, pp. 66–75.
[4] Vasil Hnatyshin and Malik Ahmed “A comparative study of location aided routing protocols for MANET”, IEEE, 978-1-4577-2028-4/11 2011.
[5] Y.V.S.Sai Pragathi and S.P. Setty, “Hybrid anonymous location-aided routing protocol for privacy preserving and authentication in manet”, Journal of Theoretical and Applied Information Technology, Vol.55, No.2, Sep.2013.
[6] M.Uma and Dr.G.Padmavathi, “A comparative study and performance evaluation of reactive quality of service routing protocols in mobile ad hoc networks” JATIT, Vol.6, No.2, 2009
[7] P.ChannaReddy, “Performance Analysis of Ad hoc network routing protocols, IEEE 2006”, 1-4244-0731-1/06.
[8] https://en.wikipedia.org/wiki/RSA_(cryptosystem)
[9] https://en.wikipedia.org/wiki/Elliptic_curve_cryptography
[10] Network Simulator -2, http://www.isi.edu/nsnam/ns/.

Keywords
MANETs, LAR, ECC, RSA, Secure LAR, NS2, Encryption Algorithms.