Multi-Path Encrypted Data Security Architecture for Mobile Ad hoc Networks
Suresha k1, S.B.Mallikarjuna2
Citation : Suresha k, S.B.Mallikarjuna, Multi-Path Encrypted Data Security Architecture for Mobile Ad hoc Networks International Journal of Research Studies in Computer Science and Engineering 2014, 1(1) : 52-56
Mobile ad hoc networks have self-organizing network architecture where a collection of mobile nodes with wireless network interfaces may form a temporary network without any established infrastructure or centralized administration. According to the IETF (Internet Engineering Task Force) definition a mobile ad hoc network is an autonomous system of mobile routers connected by wireless links. The mobile nodes can communicate without an infrastructure. Wireless networking is an emerging
technology that will allow users to access information and services regardless of their geographic position. In contrast to infrastructure based networks, all nodes are mobile and can be connected dynamically in an arbitrary manner. Ad hoc networks proved their efficiency being used in different fields but they are highly vulnerable to security attacks and dealing with this is one of the main challenges of these networks today. Implementing security in such dynamically changing networks is a hard task. Sending confidential data on
one path helps attackers to get the complete data easily. Whereas sending confidential data on multiple paths increases the security and confidentiality, because it is almost impossible to obtain all the divided message parts of an original message.
In this study, we focus on improving the flow transmission confidentiality in ad hoc networks based on multipath routing. Indeed, we take advantage of the existence of multiple paths between nodes in an ad hoc network to increase the confidentiality & robustness of transmitted data. In our approach the original message is split into different parts that are encrypted and transmitted along different disjointed multiple paths between sender and receiver. In our solution, Even if an attacker succeeds to obtain one or more
transmitted message parts, the probability that the original message reconstruction is very difficult or almost impossible. Proposed technique is better compared to previous techniques.