Visible to the public RAD: Reinforcement Authentication DYMO Protocol for MANET

TitleRAD: Reinforcement Authentication DYMO Protocol for MANET
Publication TypeConference Paper
Year of Publication2019
AuthorsHamamreh, Rushdi A., Ayyad, Mohammad, Jamoos, Mohammad
Conference Name2019 International Conference on Promising Electronic Technologies (ICPET)
Date Publishedoct
Keywordsauthentication, authentication technique, average throughput, compositionality, cryptographic operations, cryptographic protocols, delays, demand protocol, DYMO, dynamic MANET, Encryption, Encryption technique, end to end delay, infrastructure centralized server, learning (artificial intelligence), malicious node, MANET, MANET security, MD5, message authentication, Message Digest 5, Metrics, mobile ad hoc network, mobile ad hoc networks, mobility management (mobile radio), packet delivery ratio, pubcrawl, RAD, reinforcement authentication DYMO protocol, reinforcement learning, Reinforcement., Resiliency, Routing, Routing protocols, Secret key, telecommunication computing, telecommunication security, Throughput
AbstractMobile ad hoc network (MANET) does not have fixed infrastructure centralized server which manage the connections between the nodes. Rather, the nodes in MANET move randomly. Thus, it is risky to exchange data between nodes because there is a high possibility of having malicious node in the path. In this paper, we will describe a new authentication technique using message digest 5 (MD5), hashing for dynamic MANET on demand protocol (DYMO) based on reinforcement learning. In addition, we will describe an encryption technique that can be used without the need for a third party to distribute a secret key. After implementing the suggested model, results showed a remarkable enhancement in securing the path by increasing the packet delivery ratio and average throughput. On the other hand, there was an increase in end to end delay due to time spent in cryptographic operations.
Citation Keyhamamreh_rad_2019