SLGP Header

Secure Onion Protocol Implementation for Reliable Routing in Wireless Sensor Networks

IJEECC Front Page

Abstract:
In this paper, we propose secure onion protocol implementation for reliable routing in wireless sensor networks. Deploy onion protocol is implemented using AES algorithm and with corresponding primary key of all the hops. Every node while registering, server will provided with Id, primary key, secondary key and decryption key. Source will find out the optimum path and it will collect primary key of all intermediate node. Data’s first encrypted using AES algorithm and then with corresponding primary key of all the hops. This wholesome is transmitted to first hop, where initial decryption is achieved using decryption key of that node. Then collecting its id and secondary key which is transmitted to both source and destination node. Same way all the id’s and secondary key are collected and concatenated, so as to verify both source and destination. TPA implementation is also achieved for successful validation of concatenated keys their by reward is provided to the intermediate hops.
Keywords:AES, TPA, Onion Protocol

References:

  1. Ismail, D, Jaafar, M, (2007), “Mobile ad hoc network overview”, Applied Electromagnetics, Asia-Pacific Conference, IEEE , Page 1 - 8 DOI 10.1109/APACE.2007.4603864
  2. Volker Fusenig, Dagmara Spiewak; Engel, T. (2007), “Acimn protocol: A protocol for Anonymous Communication In Multi hop wireless Networks” Wireless Telecommunications Symposium, Pomona, CA, IEEE , DOI: 10.1109/WTS.2007.4563320.
  3. G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, (2009), “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical Journal, vol. 13, no. 4, pp. 175-193.
  4. Ritu Aggarwal, (2013) “Security on Dynamic Source Routing Protocol Using Onion Routing Encryption”, International Journal of Engineering and Advanced Technology, ISSN: 2249 – 8958, Volume-2, Issue-6
  5. G. Indirania and K. Selvakumara, (2014), “A Swarm-Based Efficient Distributed Intrusion Detection System for Mobile Ad Hoc Networks (MANET),” Int’l J. Parallel, Emergent and Distributed Systems, vol. 29, pp. 90-103.
  6. H. Li and M. Singhal, (2007), “Trust Management in Distributed Systems,” Computer, vol. 40, no. 2, pp. 45-53.
  7. C. Chou, D. Wei, C. Kuo, and K. Naik, (2007), “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE Journal on Selected Areas in Communications, VOL. 25, NO 1.
  8. Volker Fusenig, Dagmara Spiewak; Engel, T. (2007), “Acimn protocol: A protocol for Anonymous Communication in Multi hop
  9. Wireless Networks” Wireless Telecommunications Symposium, Pomona, CA, IEEE , DOI: 10.1109/WTS.2007.4563320.
  10. Vasantha, V., Manimegalai, D., (2007), “Mitigating Routing Misbehaviors Using Subjective Trust Model in Mobile Ad Hoc Networks” Conference on Computational Intelligence and Multimedia Applications International Conference IEEE (Volume:4 ) Pp.417 - 422
  11. K. Liu, J. Deng, and K. Balakrishnan, “An Acknowledgement- Based Approach for the Detection of Routing Misbehavior in MANETs,” IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 536-550, May 2007.
  12. S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, vol. 3, pp. 1987-1997, Mar./Apr. 2003.
  13. S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, pp. 255-265, Aug. 2000.
  14. X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak, “Autoregressive Trust Management in Wireless Ad Hoc Networks,” Ad Hoc & Sensor Wireless Networks, vol. 16, no. 1-3, pp. 229-242, 2012.