Submit Paper

Article Processing Fee

Pay Online

           

Crossref logo

  DOI Prefix   10.20431


 

International Journal of Research Studies in Computer Science and Engineering
Volume 1, Issue 1, 2014, Page No: 52-56

Multi-Path Encrypted Data Security Architecture for Mobile Ad hoc Networks

Suresha k1, S.B.Mallikarjuna2

1.Lecturer,Dept.of CS&E DRR Govt Polytechnic Davangere, Karnataka, India.
2.Associate Professor, Dept.of CS&E Bapuji Institute of Engg. & Technology Davangere, Karnataka, India.

Citation : Suresha k, S.B.Mallikarjuna, Multi-Path Encrypted Data Security Architecture for Mobile Ad hoc Networks International Journal of Research Studies in Computer Science and Engineering 2014, 1(1) : 52-56

Abstract

Mobile ad hoc networks have self-organizing network architecture where a collection of mobile nodes with wireless network interfaces may form a temporary network without any established infrastructure or centralized administration. According to the IETF (Internet Engineering Task Force) definition a mobile ad hoc network is an autonomous system of mobile routers connected by wireless links. The mobile nodes can communicate without an infrastructure. Wireless networking is an emerging technology that will allow users to access information and services regardless of their geographic position. In contrast to infrastructure based networks, all nodes are mobile and can be connected dynamically in an arbitrary manner. Ad hoc networks proved their efficiency being used in different fields but they are highly vulnerable to security attacks and dealing with this is one of the main challenges of these networks today. Implementing security in such dynamically changing networks is a hard task. Sending confidential data on one path helps attackers to get the complete data easily. Whereas sending confidential data on multiple paths increases the security and confidentiality, because it is almost impossible to obtain all the divided message parts of an original message.

In this study, we focus on improving the flow transmission confidentiality in ad hoc networks based on multipath routing. Indeed, we take advantage of the existence of multiple paths between nodes in an ad hoc network to increase the confidentiality & robustness of transmitted data. In our approach the original message is split into different parts that are encrypted and transmitted along different disjointed multiple paths between sender and receiver. In our solution, Even if an attacker succeeds to obtain one or more transmitted message parts, the probability that the original message reconstruction is very difficult or almost impossible. Proposed technique is better compared to previous techniques.


Download Full paper: Click Here