

A Secure Source Routing Protocol for Mobile Ad Hoc Networks
Abstract
extensively studied. Some of the well-known
source routing protocols presented in the literature that claim to
establish secure routes are susceptible to hidden channel attacks. In this
paper, we address this issue and present a novel secure routing
protocol, based on sanitizable signatures, that is not susceptible to
hidden channel attacks.
References
Abdelaziz, A. K., Nafaa, M., and Salim, G. 2013. Survey of routing
attacks and countermeasures in mobile ad hoc networks. In Proceedings
of 2013 IEEE International Conference on Computer Modelling and
Simulation (UKSim).
cs, G., Buttyn, L., and Vajda, I. 2006. Provably secure on-demand
source routing in mobile ad hoc networks. IEEE Transactions on Mobile
Computing 5, 11, 15331546.
Arulkumaran, G. and Gnanamurthy, R. K. 2019. Fuzzy trust approach for
detecting black hole attack in mobile adhoc network. Mobile Networkshttps://orcid.org/0000-0002-3787-265X
and Applications 24, 2, 386393.
Ateniese, G., Chou, D. H., Medeiros, B., and Tsudik,
G. 2005. Sanitizable signatures. In Proceedings of 10th European
Symposium on Research in Computer Security. Springer, Berlin
Heidelberg, 159177.
Ateniese, G. and Medeiros, B. 2004. Security in Communication
Networks: International Conference, SCN. Springer Berlin Heidelberg,
Chapter On the Key Exposure Problem in Chameleon Hashes, 165179.
Basagni, S., Chlamtac, I., Syrotiuk, V. R., and Woodward,
B. A. 1998. A distance routing effect algorithm for mobility
(DREAM). In Proceedings of the 4th Annual ACM/IEEE International
Conference on Mobile Computing and Networking (MobiCom).
Burmester, M. and de Medeiros, B. 2009. On the security of route
discovery in MANETs. IEEE Transactions on Mobile Computing 8, 9
(Sept), 11801188.
Buttyn, L. and Vajda, I. 2004. Towards provable security for ad hoc
routing protocols. In Proceedings of the 2nd ACM Workshop on Security
of Ad Hoc and Sensor Networks. ACM, New York, NY, USA.
Giruka, V. C. and Singhal, M. 2007. A self-healing on-demand
geographic path routing protocol for mobile ad-hoc networks. Ad Hoc Networks 5, 7 (Sept.), 11131128.
Hsu, C. C. and Lei, C. L. 2009. A geographic scheme with location
update for ad hoc routing. In Proceedings of Fourth International
Conference on Systems and Networks Communications (ICSNC).
Hu, Y., Perrig, A., and Johnson, D. B. 2003. Efficient security
mechanisms for routing protocols. In Proceedings of NDSS.
Hu, Y.-C., Perrig, A., and Johnson, D. B. 2005. Ariadne: A secure
on-demand routing protocol for ad hoc networks. Wireless networks 11,
-2, 2138.
Hurley-Smith, D., Wetherall, J., and Adekunle, A. 2017. SUPERMAN:
security using pre-existing routing for mobile ad hoc networks. IEEE
Transactions on Mobile Computing 16, 10, 29272940.
Jain, S., Shastri, A., and Chaurasia, B. K. 2013. Analysis and
feasibility of reactive routing protocols with malicious nodes in
manets. In Proceedings of International Conference on Communication
Systems and Network Technologies (CSNT).
Johnson, D. B. and Maltz, D. A. 1996. Mobile Computing. Springer US,
Chapter Dynamic Source Routing in Ad Hoc Wireless Networks, 153181.
Karp, B. and Kung, H. T. 2000. GPSR: Greedy perimeter stateless
routing for wireless networks. In Proceedings of the 6th Annual
International Conference on Mobile Computing and Networking.
Kavitha, K., Selvakumar, K., Nithya, T., and Sathyabama, S. 2013. Zone
based multicast routing protocol for mobile ad hoc network. In
Proceedings of International Conference on Emerging Trends in VLSI,
Embedded System, Nano Electronics and Telecommunication System
(ICEVENT).
Kojima, H., Yanai, N., and Cruz, J. P. 2019. ISDSR+: improving the
security and availability of secure routing protocol. IEEE Access 7,
74868.
Krawczyk, H., Bellare, M., and Canetti, R. 1997. HMAC: Keyed-hashing
for message authentication. RFC 2104, RFC Editor. February.
Li, H. and Singhal, M. 2005. An anchor-based routing protocol with
cell id management system for ad hoc networks. In Proceedings of
International Conference on Computer Communications and Networks.
Li, T., Ma, J., and Sun, C. 2019. SRDPV: Secure route discovery and
privacy-preserving verification in manets. Wireless Networks 25,
1747.
Papadimitratos, P. and Haas, Z. 2002. Secure routing for mobile ad hoc
networks. Mobile Computing and Communications Review 1, 2, 2731.
Perkins, C. E. and Bhagwat, P. 1994. Highly dynamic
destination-sequenced distance-vector routing (DSDV) for mobile
computers. SIGCOMM Computing Commununications Review 24, 4 (Oct.),
244.
Perkins, C. E. and Royer, E. M. 1999. Ad-hoc on-demand distance vector
routing. In Proceedings of Second IEEE Workshop on Mobile Computing
Systems and Applications (WMCSA).
Perrig, A., Canetti, R., Tygar, J., and Song, D. 2000. Efficient
authentication and signing of multicast streams over lossy
channels. In Proceedings of IEEE Symposium on Security and Privacy.
Rivest, R., Shamir, A., and Adleman, L. 1978. A method for obtaining
digital signatures and public-key cryptosystems. Communications of the
ACM 21, 120126.
Salehi, M. and Boukerche, A. 2019. Secure opportunistic routing
protocols: methods, models, and classification. Wireless Networks 25,
, 559571.
Shen, H. and Zhao, L. 2013. ALERT: An anonymous location-based
efficient routing protocol in MANETs. IEEE Transactions on Mobile
Computing 12, 6 (June), 10791093.
Talooki, V. N., Marques, H., and Rodriguez, J. 2013. Energy efficient
dynamic MANET on-demand (E2DYMO) routing protocol. In Proceedings of
International Symposium and Workshops on a World of Wireless, Mobile
and Multimedia Networks (WoWMoM).
Xia, H., shun Zhang, S., Li, Y., kuan Pan, Z., Peng, X., and Cheng,
X. 2019. An attack-resistant trust inference model for securing
routing in vehicular ad hoc networks. IEEE Transactions on Vehicular
Technology 68, 7, 71087120.
Xu, Y., Liu, J., Shen, Y., Jiang, X., and Shiratorie,
N. 2017. Physical layer security-aware routing and performance
tradeoffs in ad hoc networks. Computer Networks 123, 4, 7787.
Yih-Chun, H. and Perrig, A. 2004. A survey of secure wireless ad hoc
routing. IEEE Security Privacy 2, 3 (May), 2839.
DOI: http://dx.doi.org/10.47164/ijngc.v11i3.647