SO-AODV

2021 ◽  
Vol 14 (3) ◽  
pp. 87-103
Author(s):  
Karan Singh ◽  
Rajeev Gupta

MANET has emerged as an eager field for supporting disaster response and prevention applications like climate and weather observation, tracking, tsunamis, wildfire and emergency rescue operations, underwater level navigation, etc. In this paper, a new ad-hoc routing protocol named SO-AODV (Secured and Optimized Ad-Hoc On-Demand Distance Vector) is proposed for secured and optimized communication in any disaster like situations. For shortest route selection a technique called pigeons swarm optimization (PiSO) is used that also leads to minimize the hop count in selected optimal route. Lightweight digital watermarking (LDW) is used that ensures the authenticity of “hello” packets. For security of event messages, cyphertext stealing technique (CST) is used with encryption qu-Vanstone elliptic curve cryptography (qV-ECC) based public key cryptography. The qV-ECC generates public key. Experiments are conducted using NS2 and performance is evaluated and compared over AODV for several metrics (i.e., packet delivery ration, throughput, end-to-end delay, security, and hop count).

2012 ◽  
Vol 6 (2) ◽  
pp. 53-63 ◽  
Author(s):  
U. S. Rawat ◽  
Shishir Kumar

Proposed is a secure and efficient approach for designing and implementing an enterprise-class cryptographic file system for Linux (ECFS) in kernel-space. It uses stackable file system interface to introduce a layer for encrypting files using symmetric keys, and public-key cryptography for user authentication and file sharing, like other existing enterprise-class cryptographic file systems. It differs itself from existing systems by including all public-key cryptographic operations and public-key infrastructure (PKI) support in kernel-space that protects it from attacks that may take place with a user-space PKI support. It has a narrower domain of trust than existing systems. It uses XTS mode of AES algorithm for file encryption for providing better protection and performance. It also uses kernel-keyring service for improving performance. It stores the cryptographic metadata in file’s access control list (ACL) as extended attributes to ease the task of file sharing. A secure protocol has also been designed and implemented to guard against various possible attacks, when its files are accessed remotely over an untrusted network.


2009 ◽  
Vol 7 (5) ◽  
pp. 594-602 ◽  
Author(s):  
Rafael Timoteo de Sousa ◽  
Asmaa Adnane ◽  
Christophe Bidan ◽  
Ludovic Me

Sign in / Sign up

Export Citation Format

Share Document