Visible to the public A Security Mechanism in DSR Routing for MANET

TitleA Security Mechanism in DSR Routing for MANET
Publication TypeConference Paper
Year of Publication2018
AuthorsDholey, M. K., Saha, M. K.
Conference Name2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI)
ISBN Number978-1-5386-3570-4
Keywordsautonomous collection, bandwidth constraint multihop wireless network, compositionality, Conferences, cryptographic protocols, data communication, Destination address, Dsr, DSR Routing, dynamic source routing, GDH, group Diffie-Hellman key management, Hash Function, intended required destination, intermediate node, intermediate trusted node start, malicious node, MANET, MANET routing, MANET security, Metrics, mobile ad hoc networks, mobile ad-hoc network, mobile nodes, prevention mechanism, Proposals, pubcrawl, radio range, reactive routing protocols, resilience, Resiliency, route diversion, Routing Protocol, Routing protocols, RREP, security mechanism, security threads, source address, telecommunication security, wrong destination address
Abstract

Mobile Ad-hoc Network (MANET) is an autonomous collection of mobile nodes and communicate among them in their radio range. It is an infrastructure less, bandwidth constraint multi-hop wireless network. A various routing protocol is being evolved for MANET routing and also provide security mechanism to avoid security threads. Dynamic Source Routing (DSR), one of the popular reactive routing protocols for MANET, establishes path between source to destination before data communication take place using route request (RREQ) and route reply (RREP) control messages. Although in [1] authors propose to prevent route diversion due to a malicious node in the network using group Diffie-Hellman (GDH) key management applied over source address, but if any intermediate trusted node start to misbehave then there is no prevention mechanism. Here in this paper, we applied Hash function scheme over destination address to identify the misbehaving intermediate node that can provide wrong destination address. The path information towards the destination sent by the intermediate node through RREP is exactly for the intended required destination or not, here we can identified according to our proposed algorithm and pretend for further data transmission. Our proposed algorithm proves the authenticity of the destination and also prevent from misbehaving intermediate nodes.

URLhttps://ieeexplore.ieee.org/document/8553784
DOI10.1109/ICOEI.2018.8553784
Citation Keydholey_security_2018