Show simple item record

dc.contributor.advisorDas, Manik Lal
dc.contributor.authorMaheshwari, Mayur
dc.date.accessioned2017-06-10T14:38:46Z
dc.date.available2017-06-10T14:38:46Z
dc.date.issued2011
dc.identifier.citationMaheshwari, Mayur (2011). Secure data delivery in mobile ad hoc network using multiple paths. Dhirubhai Ambani Institute of Information and Communication Technology, xi, 56 p. (Acc.No: T00287)
dc.identifier.urihttp://drsr.daiict.ac.in/handle/123456789/324
dc.description.abstractA mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the network without revealing its presence as well as any node can behave in either a passive way (eavesdropping the message) or in an active way (manipulating the message, signal interference or jamming the network). When a node has some confidential information needed to transmit to other node, it needs some secure data delivery protocols such that, information can reach to intended node confidentially without tempered. We have studied two secure data delivery protocols namely SPREAD and Xia et al‟s scheme. These protocols focus on how to deliver a secret message over insecure MANET using multiple paths. These protocols provide confidentiality and robustness but don‟t focus on authentication and integrity. Due to the lack of authentication, any node can impersonate the good node or the intermediate node can manipulate message and no one can detect this misbehaviour. We have proposed a scheme that aims to provide confidentiality, authentication, and robustness for a message when they are delivered across the insecure MANET. We have used the concept of SPREAD, where message transforms into multiple shares and then delivers the shares via multiple independent paths to the destination, so that if a small number of nodes that are used to relay the message shares are compromised, the whole message is not compromised. We are using basic idea of TESLA to provide authentication. Finally, when we analyzed our proposed protocol and compared it with SPREAD. Our analysis showed that the proposed scheme provides all basic security objectives as well as it protects against data tempering, impersonation, replay and known session key attacks.
dc.publisherDhirubhai Ambani Institute of Information and Communication Technology
dc.subjectAd-hoc networks
dc.subjectAccess control
dc.subjectWireless communication systems
dc.subjectSecurity measures
dc.subjectSensor networks
dc.subjectSecurity measures
dc.subjectSecurity measures
dc.subjectMobile communication systems
dc.subjectMANET
dc.classification.ddc005.8 MAH
dc.titleSecure data delivery in mobile ad hoc network using multiple paths
dc.typeDissertation
dc.degreeM. Tech
dc.student.id200911011
dc.accession.numberT00287


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record