Sohini Roy et al. / Journal of Computing Technologies Vol 2, Issue 4 ISSN 2278 – 3814 © 2013 JCT JOURNALS. ALL RIGHTS RESERVED 5 CRBSR: A CRT-RSA-BELLMENFORD BASED SECURE ROUTING Sohini Roy #1 , Ditipriya Sinha #2 # Department of Information Technology,Calcutta Institute of Engineering and Management India 1 roysohini266@gmail.com 2 ditipriyasinha87@gmail.com AbstractMobile Ad-hoc networks are a collection of autonomous nodes with dynamic network structure without any centralized control. Security in such a network is one of the main challenges to the researchers. To address security in MANET we have adopted a method based on RSA, CRT and BELLMEN- FORD ALGORITHM. Together with encryption and decryption method we have focused on finding of secure routes from a set of available routes and selection of the most stable and energy efficient route from a source to a destination. From the performance analysis of our protocol it is proved that it gives better performance than many of the existing protocols. Combination of RSA, CRT and BELLMANFORD makes our proposed routing protocol secured and robust. KeywordsCRT, LATCH, MONITOR, WEIGHT_REQ, Trust value I. INTRODUCTION The networks that offer unrestricted mobility of the nodes without any underlying infrastructure are known as Mobile Ad hoc Networks. The mobile nodes are interconnected by multi- hop communication paths or radio links and all the nodes themselves act as routers, servers, clients etc. The main features of MANETs include dynamic network topology, bandwidth constrained variable capacity links and energy constrained operations. The radio links as well as the mobile nodes are vulnerable to different attacks. Confidentiality is also an important aspect of the security goal of MANETs which ensures that certain information is never disclosed to unauthorized entities. Integration of information which guarantees that the transferred information is unaltered and authentication that enables two communicators to identify each other should be also taken under consideration. Thus, providing security to such a network is one of the main challenges. The traditional authentication, key distribution and intrusion detection methods are too inefficient to be used in energy constrained devices in MANETs. In our protocol we propose a security mechanism that avoids the network communication. We have adopted an RSA based encryption and CRT based decryption technique for secure communication through the network. To distribute the keys in the network or broadcasting RREQ messages we have taken the help of BELLMEN- FORD algorithm. As a new node enters the existing network, it is not considered as a trusted node and thus it is monitored by a trusted node of the network to guarantee its permission of entering the network. To avoid the intrusion of malicious nodes, we have provided a secure route selection method from a set of all probable routes between a source and a destination by means of a key known as LATCH which is generated with the help of CRT. Our algorithm thus uses a combined concept of CRT, RSA and BELLMEN-FORD algorithm to offer a secure communication scheme in MANETs. II. RELATED WORK This section reviews several security solutions in mobile ad- hoc network. Specially this section investigates different key generation model, trust based model and secure routing model, since these models demonstrate the gradual progress in the literature. A. MANET Security Breaches: Threat to a Secure Communication Platform [1] provides a view of overall security breaches present in the Ad-hoc Networks together with several proposed routing protocols. The paper mentions that communication between two nodes in a network is completely based on mutual trust and thus to provide security to a network there should be a routing protocol which encapsulates all the necessary security mechanisms. The paper categorizes two kinds of attacks in MANETs. One of them is Active attack and the other kind of attack is the Passive attack, which do not interfere with the running operations in the network rather it performs eavesdropping of data exchanged via the concerned nodes.. The designing issues for secure routing in MANETs are also mentioned by the paper. B. A Highly Secured Approach against Attacks in MANETS [2] identifies the major reason to address security in MANETs as the use of wireless links that are prone to attacks. The paper proposes a highly secure approach to identify different types of attacks in MANETs using a semantic security mechanism which is highly impossible to break. The approach of this paper deals mainly with the attacks in the network layer by considering the misbehaviour of nodes which drop and delay packets despite agreeing to forward them during route discovery.