Route investigation for secure routing in mobile ad-hoc networks

Han Shik Kim, Byung Seok Kang, Sangheon Pack, Chul Hee Kang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Secure routing protocols in Mobile ad-hoc networks (MANET) have been extensively studied in recent years. Most Routing Protocol, however, are based on authentication, cryptographic schemes, security association and key distribution and so on. In this paper, we propose an enhanced MANET routing protocol, which prevents security threats, especially by employing route investigation. When an intermediate node that is on a path between source and destination receives two types of control messages (RREP and RERR), the intermediate node sends them to the source in pure AODV. However, in our method, the node which receives the control messages confirms it using Route Investigation Request (IREQ) and Route Investigation Reply (IREP). Through this investigation procedure, we can gain reliability of path for transmitting data packets in MANET. Simulation results show considerable improvement in the packet delivery ratio and the end-to-end latency at the expense of the moderate increase of control message overhead.

Original languageEnglish
Title of host publicationProceedings - The International Conference on Emerging Security Information, Systems, and Technologies, SECURWARE 2007
Pages163-168
Number of pages6
DOIs
Publication statusPublished - 2007
EventInternational Conference on Emerging Security Information, Systems, and Technologies, SECURWARE 2007 - Valencia, Spain
Duration: 2007 Oct 142007 Oct 20

Publication series

NameProceedings - The International Conference on Emerging Security Information, Systems, and Technologies, SECURWARE 2007

Other

OtherInternational Conference on Emerging Security Information, Systems, and Technologies, SECURWARE 2007
CountrySpain
CityValencia
Period07/10/1407/10/20

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'Route investigation for secure routing in mobile ad-hoc networks'. Together they form a unique fingerprint.

  • Cite this

    Kim, H. S., Kang, B. S., Pack, S., & Kang, C. H. (2007). Route investigation for secure routing in mobile ad-hoc networks. In Proceedings - The International Conference on Emerging Security Information, Systems, and Technologies, SECURWARE 2007 (pp. 163-168). [4385328] (Proceedings - The International Conference on Emerging Security Information, Systems, and Technologies, SECURWARE 2007). https://doi.org/10.1109/SECUREWARE.2007.4385328