An Analysis on Endaira: A Provably Secure On-Demand Source Routing Protocol
نویسندگان
چکیده
Routing is one of the most basic networking functions in mobile ad hoc networks. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network operation. Hence, an adversary can easily paralyze the operation of the network by attacking the routing protocol. This has been realized by many researchers, and several “secure” routing protocols have been proposed for ad hoc networks. There are some secure routing protocols that have been proposed to reduce the risk of attacking the routing protocol by Denial of Service, hackers and so on. In this research, we will explore and discuss a new ondemand source routing protocol, called ENDAIRA, and we demonstrate the usage of our framework by proving that it is most secure routing protocol. We assess the simulation study to compare and prove the strength of ENDAIRA model among the other secure routing protocol.
منابع مشابه
Comparative Analysis of Endaira and E-endaira Secure Source Routing Protocol for Manets
Mobile Ad hoc networks (MANETs) are collections of wireless devices with restricted broadcast range and resources and no fixed infrastructure. Communication is achieved by relaying data along appropriate routes that are dynamically discovered (on-demand) and maintained through collaboration between the nodes. Routing is the basic network functionality that supports communication for multi hop m...
متن کاملFlaws in Endair-A Secure Routing Protocol for MANETS
Routing is the one of the essential criteria at network level in mobile ad hoc networks. Ad hoc network routing protocols are difficult to design, and secure because unable to handle rapid node mobility and network topology changes. It has been realized by many researchers, and several “secure” routing protocols have been proposed for ad hoc networks. However, the security of those protocols ha...
متن کاملCan Ad Hoc Routing Protocols be Shown Provably Secure?
Formal security analysis of ad hoc routing protocols has historically been lacking, normally following non-formal inspection to identify flaws and attacks. This leads to a cycle of published development, attack, development, attack, ... . Recent formal models and methods attempt to introduce rigor into the analysis approach. We discuss flaws in a previously proposed security framework based on ...
متن کاملMultipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...
متن کاملCryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
We present the first cryptographically sound security proof of a routing protocol for mobile ad-hoc networks. More precisely, we show that the route discovery protocol does not output a non-existing path under arbitrary active attacks, where on a non-existing path there exists at least one pair of neighboring nodes without communication connection during the run of the route discovery protocol....
متن کامل