skip to main content
10.1145/2905055.2905351acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Secure Content Dissemination in Small Topological Environment by Enhancing Security of DSR

Published: 04 March 2016 Publication History

Abstract

Content dissemination is performed between wireless mobile nodes in an infrastructure-less mobile ad-hoc environment. So, securing content is a major problem in MANETs because mobile nodes cannot trust their neighbor nodes. We present a security approach for small topological environments by adding crypto-graphical mechanism into DSR routing protocol. Our aim is to secure the traffic and reduce the effect of possible attacks without affecting network performances.

References

[1]
Echchaachoui, Adel, et al. "Asymmetric and dynamic encryption for routing security in MANETs." Multimedia Computing and Systems (ICMCS), 2014 International Conference on. IEEE, 2014.
[2]
Changhui Hu, Tat Wing Chim, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li" Efficient HMAC-based secure communication for VANETs", Article -11 April 2012
[3]
Shiva Murthy G, Robert John D'Souza, and Golla Varaprasad," Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks", 1530-437X, IEEE 2012
[4]
Sandeep Thadvai, Deep Narayan Tiwari, Debasish Jena, Maode Ma, "A novel authenticated encryption scheme with convertibility", Article -17 July 2012
[5]
M A Matin, Md. Monir Hossain, Md Foizul Islam, Muhammad Nazrul Islam, M Mofazzal ossain, "Performance Evaluation of Symmetric Encryption Algorithm in MANET and WLAN", 10.1109/TECHPOS.2009.5412055, IEEE 2009
[6]
Nadeem, Aamer, and Michael P. Howarth. "A survey of MANET intrusion detection & prevention approaches for network layer attacks." Communications Surveys & Tutorials, IEEE 15.4 (2013): 2027--2045.
[7]
Sadeghi, Mohammad, and Saadiah Yahya. "Analysis of Wormhole attack on MANETs using different MANET routing protocols." Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on. IEEE, 2012.
[8]
Jawandhiya, Pradip M., et al. "A survey of mobile ad hoc network attacks."International Journal of Engineering Science and Technology 2.9 (2010): 4063--4071.
[9]
Chan, King Sun, and Mohammad Rafiqul Alam. "TCBWD: Topological comparison-based Byzantine wormhole detection for MANET." Wireless and Mobile Computing, Networking and Communications (WiMob), 2011 IEEE 7th International Conference on. IEEE, 2011.
[10]
Kannhavong, Bounpadith, et al. "Analysis of the node isolation attack against OLSR-based mobile ad hoc networks." Computer Networks, 2006 International Symposium on. IEEE, 2006.
[11]
Agrawal, Sudhir, Sanjeev Jain, and Sanjeev Sharma. "A survey of routing attacks and security measures in mobile adhoc networks." arXiv preprint arXiv:1105.5623 (2011).
[12]
Usha, G., and Sayan Bose. "Impact of Gray hole attack on adhoc networks." Information Communication and Embedded Systems (ICICES), 2013 International Conference on. IEEE, 2013.
[13]
Zargar, Saman Taghavi, Jyoti Joshi, and David Tipper. "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks." Communications Surveys & Tutorials, IEEE 15.4 (2013): 2046--2069.
[14]
Venkanna, U., and R. Leela Velusamy. "Black hole attack and their counter measure based on trust management in manet: A survey." Advances in Recent Technologies in Communication and Computing (ARTCom 2011), 3rd International Conference on. IET, 2011.
  1. Secure Content Dissemination in Small Topological Environment by Enhancing Security of DSR

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
      March 2016
      843 pages
      ISBN:9781450339629
      DOI:10.1145/2905055
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 March 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Asymmetric Cryptography
      2. DSR
      3. RSA

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICTCS '16

      Acceptance Rates

      Overall Acceptance Rate 97 of 270 submissions, 36%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 62
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 02 Mar 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media