Open Access Open Access  Restricted Access Subscription Access

A Secure Source Routing Protocol for Mobile Ad Hoc Networks

Baban A. Mahmood A. Mahmood, D. Manivannan

Abstract


Routing protocols for Mobile Ad Hoc Networks (MANETs) have been
extensively studied. Some of the well-known
source routing protocols presented in the literature that claim to
establish secure routes are susceptible to hidden channel attacks. In this
paper, we address this issue and present a novel secure routing
protocol, based on sanitizable signatures, that is not susceptible to
hidden channel attacks.

Full Text:

PDF

References


Abdelaziz, A. K., Nafaa, M., and Salim, G. 2013. Survey of routing

attacks and countermeasures in mobile ad hoc networks. In Proceedings

of 2013 IEEE International Conference on Computer Modelling and

Simulation (UKSim).

cs, G., Buttyn, L., and Vajda, I. 2006. Provably secure on-demand

source routing in mobile ad hoc networks. IEEE Transactions on Mobile

Computing 5, 11, 15331546.

Arulkumaran, G. and Gnanamurthy, R. K. 2019. Fuzzy trust approach for

detecting black hole attack in mobile adhoc network. Mobile Networkshttps://orcid.org/0000-0002-3787-265X

and Applications 24, 2, 386393.

Ateniese, G., Chou, D. H., Medeiros, B., and Tsudik,

G. 2005. Sanitizable signatures. In Proceedings of 10th European

Symposium on Research in Computer Security. Springer, Berlin

Heidelberg, 159177.

Ateniese, G. and Medeiros, B. 2004. Security in Communication

Networks: International Conference, SCN. Springer Berlin Heidelberg,

Chapter On the Key Exposure Problem in Chameleon Hashes, 165179.

Basagni, S., Chlamtac, I., Syrotiuk, V. R., and Woodward,

B. A. 1998. A distance routing effect algorithm for mobility

(DREAM). In Proceedings of the 4th Annual ACM/IEEE International

Conference on Mobile Computing and Networking (MobiCom).

Burmester, M. and de Medeiros, B. 2009. On the security of route

discovery in MANETs. IEEE Transactions on Mobile Computing 8, 9

(Sept), 11801188.

Buttyn, L. and Vajda, I. 2004. Towards provable security for ad hoc

routing protocols. In Proceedings of the 2nd ACM Workshop on Security

of Ad Hoc and Sensor Networks. ACM, New York, NY, USA.

Giruka, V. C. and Singhal, M. 2007. A self-healing on-demand

geographic path routing protocol for mobile ad-hoc networks. Ad Hoc Networks 5, 7 (Sept.), 11131128.

Hsu, C. C. and Lei, C. L. 2009. A geographic scheme with location

update for ad hoc routing. In Proceedings of Fourth International

Conference on Systems and Networks Communications (ICSNC).

Hu, Y., Perrig, A., and Johnson, D. B. 2003. Efficient security

mechanisms for routing protocols. In Proceedings of NDSS.

Hu, Y.-C., Perrig, A., and Johnson, D. B. 2005. Ariadne: A secure

on-demand routing protocol for ad hoc networks. Wireless networks 11,

-2, 2138.

Hurley-Smith, D., Wetherall, J., and Adekunle, A. 2017. SUPERMAN:

security using pre-existing routing for mobile ad hoc networks. IEEE

Transactions on Mobile Computing 16, 10, 29272940.

Jain, S., Shastri, A., and Chaurasia, B. K. 2013. Analysis and

feasibility of reactive routing protocols with malicious nodes in

manets. In Proceedings of International Conference on Communication

Systems and Network Technologies (CSNT).

Johnson, D. B. and Maltz, D. A. 1996. Mobile Computing. Springer US,

Chapter Dynamic Source Routing in Ad Hoc Wireless Networks, 153181.

Karp, B. and Kung, H. T. 2000. GPSR: Greedy perimeter stateless

routing for wireless networks. In Proceedings of the 6th Annual

International Conference on Mobile Computing and Networking.

Kavitha, K., Selvakumar, K., Nithya, T., and Sathyabama, S. 2013. Zone

based multicast routing protocol for mobile ad hoc network. In

Proceedings of International Conference on Emerging Trends in VLSI,

Embedded System, Nano Electronics and Telecommunication System

(ICEVENT).

Kojima, H., Yanai, N., and Cruz, J. P. 2019. ISDSR+: improving the

security and availability of secure routing protocol. IEEE Access 7,

74868.

Krawczyk, H., Bellare, M., and Canetti, R. 1997. HMAC: Keyed-hashing

for message authentication. RFC 2104, RFC Editor. February.

Li, H. and Singhal, M. 2005. An anchor-based routing protocol with

cell id management system for ad hoc networks. In Proceedings of

International Conference on Computer Communications and Networks.

Li, T., Ma, J., and Sun, C. 2019. SRDPV: Secure route discovery and

privacy-preserving verification in manets. Wireless Networks 25,

1747.

Papadimitratos, P. and Haas, Z. 2002. Secure routing for mobile ad hoc

networks. Mobile Computing and Communications Review 1, 2, 2731.

Perkins, C. E. and Bhagwat, P. 1994. Highly dynamic

destination-sequenced distance-vector routing (DSDV) for mobile

computers. SIGCOMM Computing Commununications Review 24, 4 (Oct.),

244.

Perkins, C. E. and Royer, E. M. 1999. Ad-hoc on-demand distance vector

routing. In Proceedings of Second IEEE Workshop on Mobile Computing

Systems and Applications (WMCSA).

Perrig, A., Canetti, R., Tygar, J., and Song, D. 2000. Efficient

authentication and signing of multicast streams over lossy

channels. In Proceedings of IEEE Symposium on Security and Privacy.

Rivest, R., Shamir, A., and Adleman, L. 1978. A method for obtaining

digital signatures and public-key cryptosystems. Communications of the

ACM 21, 120126.

Salehi, M. and Boukerche, A. 2019. Secure opportunistic routing

protocols: methods, models, and classification. Wireless Networks 25,

, 559571.

Shen, H. and Zhao, L. 2013. ALERT: An anonymous location-based

efficient routing protocol in MANETs. IEEE Transactions on Mobile

Computing 12, 6 (June), 10791093.

Talooki, V. N., Marques, H., and Rodriguez, J. 2013. Energy efficient

dynamic MANET on-demand (E2DYMO) routing protocol. In Proceedings of

International Symposium and Workshops on a World of Wireless, Mobile

and Multimedia Networks (WoWMoM).

Xia, H., shun Zhang, S., Li, Y., kuan Pan, Z., Peng, X., and Cheng,

X. 2019. An attack-resistant trust inference model for securing

routing in vehicular ad hoc networks. IEEE Transactions on Vehicular

Technology 68, 7, 71087120.

Xu, Y., Liu, J., Shen, Y., Jiang, X., and Shiratorie,

N. 2017. Physical layer security-aware routing and performance

tradeoffs in ad hoc networks. Computer Networks 123, 4, 7787.

Yih-Chun, H. and Perrig, A. 2004. A survey of secure wireless ad hoc

routing. IEEE Security Privacy 2, 3 (May), 2839.




DOI: http://dx.doi.org/10.47164/ijngc.v11i3.647