{"title":"用椭圆曲线加密技术保护移动自组网中的AOMDV协议","authors":"Jeenat Sultana, Tasnuva Ahmed","doi":"10.1109/ECACE.2017.7912964","DOIUrl":null,"url":null,"abstract":"Mobile Adhoc Network (MANET) is comprised of mobile nodes where each mobile node acts as both router and terminal. While acting as a router a reliable routing protocol is chosen ensuring the packet to reach its destination and an agent is responsible for the transmission of packet while acting as a terminal. In this paper, we implemented secure packet transmission in mobile adhoc network (MANET) through Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol. AOMDV, a multipath extension of AODV (Adhoc On Demand Distance Vector) routing protocol, is more reliable than its parent protocol, though not completely restraint from attacks. To keep the packets secure in an adversary environment with multiple attackers is the main objective. Elliptic Curve Cryptography (ECC) has been chosen to secure the packets against blackhole attack. Elliptic Curve Cryptography provides security with smaller key size compared to other public-key encryption. We configured three different types of environment using NS-2.35 which is a discrete event network simulator; a secure environment without malicious activity, a hostile environment with blackhole attackers and with ECC implementation by the agent and analyzed their performance.","PeriodicalId":333370,"journal":{"name":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography\",\"authors\":\"Jeenat Sultana, Tasnuva Ahmed\",\"doi\":\"10.1109/ECACE.2017.7912964\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile Adhoc Network (MANET) is comprised of mobile nodes where each mobile node acts as both router and terminal. While acting as a router a reliable routing protocol is chosen ensuring the packet to reach its destination and an agent is responsible for the transmission of packet while acting as a terminal. In this paper, we implemented secure packet transmission in mobile adhoc network (MANET) through Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol. AOMDV, a multipath extension of AODV (Adhoc On Demand Distance Vector) routing protocol, is more reliable than its parent protocol, though not completely restraint from attacks. To keep the packets secure in an adversary environment with multiple attackers is the main objective. Elliptic Curve Cryptography (ECC) has been chosen to secure the packets against blackhole attack. Elliptic Curve Cryptography provides security with smaller key size compared to other public-key encryption. We configured three different types of environment using NS-2.35 which is a discrete event network simulator; a secure environment without malicious activity, a hostile environment with blackhole attackers and with ECC implementation by the agent and analyzed their performance.\",\"PeriodicalId\":333370,\"journal\":{\"name\":\"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECACE.2017.7912964\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Electrical, Computer and Communication Engineering (ECCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECACE.2017.7912964","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
摘要
移动自组网(MANET)由多个移动节点组成,每个移动节点同时充当路由器和终端。当作为路由器时,选择可靠的路由协议以确保数据包到达目的地,代理作为终端时负责数据包的传输。在本文中,我们通过adhoc按需多路径距离矢量(AOMDV)路由协议实现了移动自组网(MANET)中的安全分组传输。AOMDV是AODV (Adhoc On Demand Distance Vector)路由协议的多路径扩展,它比它的父协议更可靠,尽管不能完全防止攻击。在有多个攻击者的敌对环境中保持数据包的安全是主要目标。选择椭圆曲线加密(ECC)来保护数据包免受黑洞攻击。与其他公钥加密相比,椭圆曲线加密以更小的密钥大小提供安全性。我们使用离散事件网络模拟器NS-2.35配置了三种不同类型的环境;在没有恶意活动的安全环境、有黑洞攻击者的敌对环境和代理实现ECC的环境下,分析了它们的性能。
Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography
Mobile Adhoc Network (MANET) is comprised of mobile nodes where each mobile node acts as both router and terminal. While acting as a router a reliable routing protocol is chosen ensuring the packet to reach its destination and an agent is responsible for the transmission of packet while acting as a terminal. In this paper, we implemented secure packet transmission in mobile adhoc network (MANET) through Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol. AOMDV, a multipath extension of AODV (Adhoc On Demand Distance Vector) routing protocol, is more reliable than its parent protocol, though not completely restraint from attacks. To keep the packets secure in an adversary environment with multiple attackers is the main objective. Elliptic Curve Cryptography (ECC) has been chosen to secure the packets against blackhole attack. Elliptic Curve Cryptography provides security with smaller key size compared to other public-key encryption. We configured three different types of environment using NS-2.35 which is a discrete event network simulator; a secure environment without malicious activity, a hostile environment with blackhole attackers and with ECC implementation by the agent and analyzed their performance.