SlideShare a Scribd company logo
AASR: Authenticated Anonymous Secure Routing for 
MANETs in Adversarial Environments 
ABSTRACT: 
Anonymous communications are important for many applications of the mobile ad 
hoc networks (MANETs) deployed in adversary environments. A major 
requirement on the network is to provide unidentifiability and unlinkability for 
mobile nodes and their traffics. Although a number of anonymous secure routing 
protocols have been proposed, the requirement is not fully satisfied. The existing 
protocols are vulnerable to the attacks of fake routing packets or denial-of-service 
(DoS) broad-casting, even the node identities are protected by pseudonyms. In this 
paper, we propose a new routing protocol, i.e., authenticated anonymous secure 
routing (AASR), to satisfy the requirement and defend the attacks. More 
specifically, the route request packets are authenticated by a group signature, to 
defend thepotential active attacks without unveiling the node identities. The key-encrypted 
onion routing with a route secret verification message, is designed to 
prevent intermediate nodes from inferring a real destination. Simulation results 
have demonstrated the effectiveness of the proposed AASR protocol with 
improved performance as compared to the existing protocols.
EXISTING SYSTEM: 
In this System to implementing the anonymous communications is to develop 
appropriate anonymous secure routing protocols. Topology-based on-demand 
anonymous routing protocols, which are general for MANETs in adversarial 
environments. To develop the anonymous protocols, a direct method is to 
anonymize the commonly used on-demand ad hoc routing protocols, such as 
AODV and DSR . For this purpose, the anonymous security associations have to 
be established among the source, destination, and every intermediate node along a 
route.So group signature is introduced to anonymous routing. In A3RP , the 
routing and data packets are protected by a group signature. However, the 
anonymous route is calculated by a secure hash function, which is not as scalable 
as the encrypted onion mechanism. 
DISADVANTAGES OF EXISTING SYSTEM: 
 The existing protocols are also vulnerable to the denial-of-service 
(DoS) attacks, such as RREQ based broadcasting.
 The objectives of unindentifiability and unlinkability are not fully 
satisfied. 
 Lack of packet authentication. 
 Difficult for the protocols to check whether a packet has been 
modified by a malicious node. 
PROPOSED SYSTEM: 
We propose a new routing protocol, i.e., authenticated anonymous secure routing 
(AASR) to overcome the pre-mentioned problems. We adopt a key-encrypted 
onion to record a discovered route and design an encrypted secret message to 
verify the RREQ-RREP linkage. Group signature is used to authenticate the RREQ 
packet per hop, to prevent intermediate nodes from modifying the routing packet. 
Extensive simulations are used to compare the performance of AASR to that of 
ANODR, a representative on-demand anonymous routing protocol and our 
proposed system provides more throughput than ANODR under the packet-dropping 
attacks, although AASR experiences more cryptographic operation delay.
ADVANTAGES OF PROPOSED SYSTEM: 
 Group signature is used to authenticate the RREQ packet per hop, to prevent 
intermediate nodes from modifying the routing packet. 
 Improved performance as compared to the existing protocols 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7/LINUX. 
 Implementation : NS2 
 NS2 Version : NS2.2.28 
 Front End : OTCL (Object Oriented Tool Command 
Language) 
 Tool : Cygwin (To simulate in Windows OS) 
REFERENCE: 
Wei Liu and Ming Yu, “AASR: Authenticated Anonymous Secure Routing for 
MANETs in Adversarial Environments”, IEEE TRANSACTIONS, VOL. X, 
NO. Y, MARCH 2014.

More Related Content

DOCX
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
PDF
Security in Manet Using Fl-Saodv
PDF
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
DOCX
Product_Engineer_Zscaler
PDF
C0331215
PDF
PLNOG 13: Nicolai van der Smagt: SDN
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Security in Manet Using Fl-Saodv
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
Malicious attack detection and prevention in ad hoc network based on real tim...
Product_Engineer_Zscaler
C0331215
PLNOG 13: Nicolai van der Smagt: SDN

What's hot (20)

PDF
Kafka Summit SF 2017 - Body Armor for Distributed Systems michael egorov ny c...
PDF
AODV protocol and Black Hole attack
PDF
Ijmer 46069196
PDF
Node clone detection using a stable overlay network
PPTX
Packet sniffing in switched LANs
PPTX
Packet sniffers
PPTX
Wireless Attacks
PPTX
Grayhole
PPT
Virtual private networks by darshana viduranga
PPTX
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
PDF
Sniffing via dsniff
PPT
Module 5 Sniffers
PDF
Java Abs Packet Sniffer Tool
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
PDF
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh Networks
PDF
Packet sniffing & ARP Poisoning
PPT
Hacking Cisco
PPTX
Ethical Hacking - sniffing
DOCX
Packet sniffer repot
DOC
Kafka Summit SF 2017 - Body Armor for Distributed Systems michael egorov ny c...
AODV protocol and Black Hole attack
Ijmer 46069196
Node clone detection using a stable overlay network
Packet sniffing in switched LANs
Packet sniffers
Wireless Attacks
Grayhole
Virtual private networks by darshana viduranga
APNIC Hackathon IPv4 & IPv6 security & threat comparisons
Sniffing via dsniff
Module 5 Sniffers
Java Abs Packet Sniffer Tool
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
Performance Analysis of Trust-Aware Routing Framework for Wireless Mesh Networks
Packet sniffing & ARP Poisoning
Hacking Cisco
Ethical Hacking - sniffing
Packet sniffer repot
Ad

Viewers also liked (20)

PDF
Jun Heider - Flex Application Profiling By Example
PPT
PDF
Green Computing, Cloud Computing!!
PDF
Kopschraberijen 1 - een Grunneger leeft tot aan de dood en zöcht aaltied de b...
PPT
Kopie Von Erkantuerk10
PPT
Quiksilver (Powered By Motion)
PDF
Proyecto Expora
PPTX
Ax2009 Lean E Becs
DOC
Curso De Dhtml
PPT
Curs porta 22
PPTX
IX. Televisión y educación
PPS
Domingo 4 t.o.c 201 salmo y lecturas
PPS
Woman Soldiers
PPTX
2015 Tech M&A Monthly - M&A Contract Overview
PPT
Evolusiprimatadanmanusia 140321110811-phpapp02
PDF
Rio 20 com chegamos ate aqui.
DOCX
JPM1412 Mining Weakly Labeled Web Facial Images for Search-Based Face Annota...
DOC
Rishadtr cv
PPTX
RIS ES Specialists' Presentation 2014 2015
DOCX
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
Jun Heider - Flex Application Profiling By Example
Green Computing, Cloud Computing!!
Kopschraberijen 1 - een Grunneger leeft tot aan de dood en zöcht aaltied de b...
Kopie Von Erkantuerk10
Quiksilver (Powered By Motion)
Proyecto Expora
Ax2009 Lean E Becs
Curso De Dhtml
Curs porta 22
IX. Televisión y educación
Domingo 4 t.o.c 201 salmo y lecturas
Woman Soldiers
2015 Tech M&A Monthly - M&A Contract Overview
Evolusiprimatadanmanusia 140321110811-phpapp02
Rio 20 com chegamos ate aqui.
JPM1412 Mining Weakly Labeled Web Facial Images for Search-Based Face Annota...
Rishadtr cv
RIS ES Specialists' Presentation 2014 2015
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
Ad

Similar to JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment (20)

PDF
Secure Routing for MANET in Adversarial Environment
PDF
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
PDF
Survey on Efficient and Secure Anonymous Communication in Manets
PPTX
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
PDF
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
PDF
Securing Data Communication for Node Anonymization Using Location Information
DOCX
Alert an anonymous location based efficient routing protocol in mane ts
PDF
Design and development of anonymous location based routing for mobile ad-hoc...
PDF
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
PDF
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
PDF
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
PDF
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
PDF
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
PDF
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
PDF
Ijarcet vol-2-issue-4-1322-1329
PDF
A comparitive study of efficient anonymous routing protocols in manet
PDF
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
PDF
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
DOC
Novel secure communication protocol basepaper
PDF
Secure routing and data transmission in mobile
Secure Routing for MANET in Adversarial Environment
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
Survey on Efficient and Secure Anonymous Communication in Manets
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
Securing Data Communication for Node Anonymization Using Location Information
Alert an anonymous location based efficient routing protocol in mane ts
Design and development of anonymous location based routing for mobile ad-hoc...
An Effective Data Privacy Mechanism through Secure Session Key Exchange Model...
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
Comprehensive Study of Counter-acting Security Threats in Mobile Ad Hoc Networks
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
SHARED INFORMATION BASED SECURITY SOLUTION FOR MOBILE AD HOC NETWORKS
Ijarcet vol-2-issue-4-1322-1329
A comparitive study of efficient anonymous routing protocols in manet
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
Novel secure communication protocol basepaper
Secure routing and data transmission in mobile

More from chennaijp (20)

DOCX
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
DOCX
JPN1423 Stars a Statistical Traffic Pattern
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
DOCX
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
DOCX
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
DOCX
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
DOCX
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
DOCX
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
DOCX
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
DOCX
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
DOCX
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
DOCX
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
DOCX
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
DOCX
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
DOCX
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
DOCX
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
DOCX
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
DOCX
JPM1417 Characterness: An Indicator of Text in the Wild
DOCX
JPM1416 A Unified Data Embedding and Scrambling Method
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPN1423 Stars a Statistical Traffic Pattern
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1417 Characterness: An Indicator of Text in the Wild
JPM1416 A Unified Data Embedding and Scrambling Method

Recently uploaded (20)

PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Project quality management in manufacturing
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
composite construction of structures.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Construction Project Organization Group 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Foundation to blockchain - A guide to Blockchain Tech
Automation-in-Manufacturing-Chapter-Introduction.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Project quality management in manufacturing
UNIT-1 - COAL BASED THERMAL POWER PLANTS
bas. eng. economics group 4 presentation 1.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
R24 SURVEYING LAB MANUAL for civil enggi
composite construction of structures.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Construction Project Organization Group 2.pptx
Internet of Things (IOT) - A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
OOP with Java - Java Introduction (Basics)
Foundation to blockchain - A guide to Blockchain Tech

JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment

  • 1. AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments ABSTRACT: Anonymous communications are important for many applications of the mobile ad hoc networks (MANETs) deployed in adversary environments. A major requirement on the network is to provide unidentifiability and unlinkability for mobile nodes and their traffics. Although a number of anonymous secure routing protocols have been proposed, the requirement is not fully satisfied. The existing protocols are vulnerable to the attacks of fake routing packets or denial-of-service (DoS) broad-casting, even the node identities are protected by pseudonyms. In this paper, we propose a new routing protocol, i.e., authenticated anonymous secure routing (AASR), to satisfy the requirement and defend the attacks. More specifically, the route request packets are authenticated by a group signature, to defend thepotential active attacks without unveiling the node identities. The key-encrypted onion routing with a route secret verification message, is designed to prevent intermediate nodes from inferring a real destination. Simulation results have demonstrated the effectiveness of the proposed AASR protocol with improved performance as compared to the existing protocols.
  • 2. EXISTING SYSTEM: In this System to implementing the anonymous communications is to develop appropriate anonymous secure routing protocols. Topology-based on-demand anonymous routing protocols, which are general for MANETs in adversarial environments. To develop the anonymous protocols, a direct method is to anonymize the commonly used on-demand ad hoc routing protocols, such as AODV and DSR . For this purpose, the anonymous security associations have to be established among the source, destination, and every intermediate node along a route.So group signature is introduced to anonymous routing. In A3RP , the routing and data packets are protected by a group signature. However, the anonymous route is calculated by a secure hash function, which is not as scalable as the encrypted onion mechanism. DISADVANTAGES OF EXISTING SYSTEM:  The existing protocols are also vulnerable to the denial-of-service (DoS) attacks, such as RREQ based broadcasting.
  • 3.  The objectives of unindentifiability and unlinkability are not fully satisfied.  Lack of packet authentication.  Difficult for the protocols to check whether a packet has been modified by a malicious node. PROPOSED SYSTEM: We propose a new routing protocol, i.e., authenticated anonymous secure routing (AASR) to overcome the pre-mentioned problems. We adopt a key-encrypted onion to record a discovered route and design an encrypted secret message to verify the RREQ-RREP linkage. Group signature is used to authenticate the RREQ packet per hop, to prevent intermediate nodes from modifying the routing packet. Extensive simulations are used to compare the performance of AASR to that of ANODR, a representative on-demand anonymous routing protocol and our proposed system provides more throughput than ANODR under the packet-dropping attacks, although AASR experiences more cryptographic operation delay.
  • 4. ADVANTAGES OF PROPOSED SYSTEM:  Group signature is used to authenticate the RREQ packet per hop, to prevent intermediate nodes from modifying the routing packet.  Improved performance as compared to the existing protocols SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.
  • 5.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS) REFERENCE: Wei Liu and Ming Yu, “AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments”, IEEE TRANSACTIONS, VOL. X, NO. Y, MARCH 2014.