An Improved Routing Mechanism for Secure Ad-hoc Network
Yogendra kumar Jain1, Geetika S. Pandey2, Deshraj Ahirwar3
1Yogendra Kumar Jain, Computer Science & Engineering, Samrat Ashok Technological Institute, Vidisha (MP), India.
2Geetika S. Pandey, Computer Science & Engineering, Samrat Ashok Technological Institute, Vidisha (MP), India.
3Deshraj Ahirwar, Computer Science & Engineering, Samrat Ashok Technological Institute, Vidisha (MP), India.
Manuscript received on March 02, 2012. | Revised Manuscript received on March 24, 2012. | Manuscript published on April 30, 2012. | PP: 37-44  | Volume-1 Issue-4, April 2012 | Retrieval Number: D0245031412/2012©BEIESP

Open Access | Ethics and  Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). The security of ad hoc networks is becoming an increasingly complex issue. Security requirements such as authentication, non-repudiation, data integrity and confidentiality, which would otherwise be provided by a central server, must be enabled and provided by all nodes. In this paper we proposed enhance based direction routing protocol. The zone direction is reduced until the node can select the strongest and most stable link and so increase availability in the network. Each node in the network has a counter for the stability of link (SL) to its neighboring nodes, which indicates which nodes are active in the network, improving the performance of the network and increasing the likelihood of selecting the optimal path. We also propose a novel secure routing protocol to improve the security level in ad hoc networks, based on key management and a secure node-to-node path, which protects data to satisfy our security requirements. 
Keywords: Ad-hoc Network, Routing Protocol, Security Mechanism.