Title | RAD: Reinforcement Authentication DYMO Protocol for MANET |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Hamamreh, Rushdi A., Ayyad, Mohammad, Jamoos, Mohammad |
Conference Name | 2019 International Conference on Promising Electronic Technologies (ICPET) |
Date Published | oct |
Keywords | authentication, authentication technique, average throughput, compositionality, cryptographic operations, cryptographic protocols, delays, demand protocol, DYMO, dynamic MANET, Encryption, Encryption technique, end to end delay, infrastructure centralized server, learning (artificial intelligence), malicious node, MANET, MANET security, MD5, message authentication, Message Digest 5, Metrics, mobile ad hoc network, mobile ad hoc networks, mobility management (mobile radio), packet delivery ratio, pubcrawl, RAD, reinforcement authentication DYMO protocol, reinforcement learning, Reinforcement., Resiliency, Routing, Routing protocols, Secret key, telecommunication computing, telecommunication security, Throughput |
Abstract | Mobile ad hoc network (MANET) does not have fixed infrastructure centralized server which manage the connections between the nodes. Rather, the nodes in MANET move randomly. Thus, it is risky to exchange data between nodes because there is a high possibility of having malicious node in the path. In this paper, we will describe a new authentication technique using message digest 5 (MD5), hashing for dynamic MANET on demand protocol (DYMO) based on reinforcement learning. In addition, we will describe an encryption technique that can be used without the need for a third party to distribute a secret key. After implementing the suggested model, results showed a remarkable enhancement in securing the path by increasing the packet delivery ratio and average throughput. On the other hand, there was an increase in end to end delay due to time spent in cryptographic operations. |
DOI | 10.1109/ICPET.2019.00032 |
Citation Key | hamamreh_rad_2019 |