Enhanced Onion Routing Framework for MANETs
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

Enhanced Onion Routing Framework for MANETs

Karumuri Ashok Kumar, B. Neelima

The mobile ad hoc networks (MANETs) is wireless and dynamic topology network medium, which may suffer from many open security criticism. The major issue of mobile ad hoc networks (MANETs) is to send the data in secure manner from source to destination node in adversarial (opponent) environment such wireless node communication issues are node traffic, node attack and data accessing of intermediate nodes. Many of us has to develop the routing protocol for security enhancement in adversarial environment, but this protocols are not that much secure routing in MANETs. The existing protocol works on the basis of authentication group signature, and onion routing protocol. In this paper proposal routing protocol method is Authenticated Anonymous Secure Routing with Trust based model. AASR protocol concept is to defend the neighbour nodes attack by the way of key encryption and decryption in route-request and route-reply. The calculating trust value of the intermediate node in MANET routing can helps to avoid the end to end packet transfer delay between nodes.

Keywords: Trust Model, Authenticated Routing, Group Signature, Onion Routing, Mobile Ad hoc Networks

Edition: Volume 4 Issue 12, December 2015

Pages: 967 - 970

Share this Article

How to Cite this Article?

Karumuri Ashok Kumar, B. Neelima, "Enhanced Onion Routing Framework for MANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151807, Volume 4 Issue 12, December 2015, 967 - 970

89 PDF Views | 72 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Trust Model'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2095 - 2097

Trust Evaluation by Mining of E-commerce Feedback Comments

Priyanka Kumbhar, Manjushri Mahajan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1970 - 1974

An Efficient Trust Model for Online Application using 2-Factor Authentication and Token Based Authentication

Varsha Jotwani, Dr. Amit Dutta

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1727 - 1731

Design of Secure, Reliable and Lightweight Communication in Trusted Wireless Sensor Network

Pradnya S. Kulkarni, Dr. Aarti Dixit

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1827 - 1832

A Device to Device Communication with Trusted Node Mapping in Cellular Network

Vivek Kumar Sinha, Kedarnath Singh

Share this Article

Similar Articles with Keyword 'Authenticated Routing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 967 - 970

Enhanced Onion Routing Framework for MANETs

Karumuri Ashok Kumar, B. Neelima

Share this Article

Similar Articles with Keyword 'Group Signature'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1880 - 1884

A Dynamic Secure Group Sharing in Cloud Computing

Shobha D. Patil, Dr. Sulochana B. Sonkamble

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 967 - 970

Enhanced Onion Routing Framework for MANETs

Karumuri Ashok Kumar, B. Neelima

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1358 - 1361

A Survey on Privacy Preservation and sharing Data Securely in Cloud Storage

Manoj. S. Tore, S. K. Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 163 - 166

Security and Privacy Sustained Cloud Data Authentication using IDM

Tanniru Hemalatha, Punugoti Pavan Kumar

Share this Article

Similar Articles with Keyword 'Onion Routing'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 515 - 517

Allowing Genuine Users and Blocking Bad Users in Anonymizing Network: The Nymble

Anand A. Maha, P. B. Kumbarkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 967 - 970

Enhanced Onion Routing Framework for MANETs

Karumuri Ashok Kumar, B. Neelima

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 236 - 238

Nymber Server in Anonymizing Network: A Review

Anand A. Maha, Jayprakash D. Sonone

Share this Article

Similar Articles with Keyword 'Mobile Ad hoc Networks'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2407 - 2410

Survey of Clustering Schemes in Mobile Ad hoc Networks

Amit Savyanavar, Mohini Borate

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2391 - 2394

Securing Mobile Ad-Hoc Network by Discovering and Verifying Neighborhood

Pranita D. Pandit, Prof. Pranjali Deshmukh

Share this Article
Top