Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2005, IEEE Communications Surveys & Tutorials
…
20 pages
1 file
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. The assumption of a trusted environment is not one that can be realistically expected; hence, several efforts have been made toward the design of a secure and robust routing protocol for ad hoc networks. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. Based on this discussion we then formulate the threat model for ad hoc routing and present several specific attacks that can target the operation of a protocol. In order to analyze the proposed secure ad hoc routing protocols in a structured way we have classified them into five categories: solutions based on asymmetric cryptography; solutions based on symmetric cryptography; hybrid solutions; reputation-based solutions; and a category of add-on mechanisms that satisfy specific security requirements. A comparison between these solutions can provide the basis for future research in this rapidly evolving area.
2016
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. This paper analyzes security challenges in ad hoc networks and summarizes key issues that should be solved for achieving the ad hoc security. It also gives an overview of the current state of solutions on such key issues in Mobile Ad Hoc Networks (MANETs). To develop suitable security solutions for such new environments, we must first understand how MANETs can be attacked. Then we discuss various proactive and reactive solutions proposed for MANETs. We outline secure routing solutions to avoid some attacks against the routing protocols based on cooperation between nodes. Keywords— Security; Routing Protocols; Ad Hoc Networks; Attacks; Secure Routing Protocols.
Journal of Parallel and Distributed Computing, 2003
Mobile ad hoc network (MANET) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. These characteristics require the networks to have much harder security requirements than the contemporary networks. While current routing protocols do seem to adjust well to dynamically changing conditions, they offer either no security mechanisms at all or have only partial solutions for ensuring the correct routing. It is hard to simultaneously achieve both security and robustness in the routing protocols. In this paper, we analyze various possible threats to the routing protocols and introduce strategies to address the same. On one hand, routing protocol can be disrupted due to attacks from intruder nodes that do not belong to the network. On the other hand, routing is severely affected by the presence of compromised nodes that inflict unpredictable and undetectable Byzantine failure. We have addressed the issue of attacks from intruders by means of authentication techniques that rely on mutual trust between nodes. We also study the behavioral patterns of the nodes and isolate compromised nodes using a distributed approach. The effectiveness of our schemes is illustrated by means of extensive simulations using ns-2 simulator. The routing protocol chosen for the study is AODV. We have observed the performance of the network with and without our secured routing scheme. r
Mobile Ad hoc wireless networks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. The nodes in MANET are subject to various attacks that range from naïve eavesdropping to vicious battery draining attacks. Routing Protocols, data, bandwidth and battery power are the common target of theses attacks. This paper gives an overview of seven such secure routing protocols by presenting their characteristics and functionality along with their respective merits and drawbacks. A Comparison of these protocols is also presented based upon certain security parameters.
Ad hoc networks are special networks that do not require an infrastructure. Nodes of such networks are usually mobile and wireless. Wireless nodes use a shared medium for communication, so they are able to communicate with many nodes directly provided they are within communication range of those nodes.
International journal of Computer Networks & Communications, 2014
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node has an ID which is evaluated from its public key and the messages that are sent are authenticated with a signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We present performance analysis to validate our claim.
2014
In this paper, we discuss security issues and their current solutions in the ad hoc Networks. Ad hoc networks are a key factor in the evolution of wireless communications. An ad hoc wireless network is a collection of wireless nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Security in ad hoc network is a grand challenge problem now a day. To enhance the security levels in the routing protocol to prevent the network against active and passive attacks without the presence of central authority. A peer review process has been introduced to check the integrity and non-repudiation of the routing packets and key exchange packets. Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. The general security objectives like authentication, confidentiality, integrity, availability and nonrepudiation, the ad hoc routing protocols should al...
Advances in Science, Technology and Engineering Systems Journal, 2022
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc networks (MANET). Techniques and schemes have been proposed to secure the basic routing protocols in order to guarantee the availability of information routing services between network nodes. The majority of the solutions presented in the literature belong to two categories, namely those that use cryptographic techniques and those that use trust schemes. Given the characteristics of MANET networks, we need approaches that guarantee a level of honesty of the nodes to prevent possible routing attacks from malicious nodes. This study presents the security extensions of the basic routing protocols AODV, DSR and DSDV.A first part is devoted to extensions based on cryptography and a second part introduces extensions using trusted systems. Then we discussed and analyzed them while drawing up a comparative table to measure the effectiveness of the mechanisms used as well as the limits and strengths of each proposed extensions. In this study, we conclude that a new trust model that combines an access strategy with lightweight techniques must be developed to ensure honest node behavior can be a key to securing the routing protocol in MANET.
… Journal of Computer Science and Security …, 2007
In this article we present a survey of secure ad hoc routing protocols for wireless networks. Ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Attacks on ad hoc network routing protocols disrupt network performance and reliability with there solution. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. The comparison between the proposed solutions and parameters of ad hoc network shows the performance according to secure protocols. We discuss in this paper routing protocol and challenges and also discuss authentication in ad hoc network.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance. Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role. A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack. In this paper, Cohen Kappa Reliability Coefficient based Mitigation (CKRCM) mechanism is proposed to deal with these attacks. The intermediate nodes are monitored by their neighbors for a timestamp. If the monitoring node does not receive an acknowledgment, then the nodes are perceived to be attacked. The trustworthiness of the nodes is built by computing the trusts and reliabilities of the nodes. It is seen that the proposed scheme outperforms the existing scheme in terms of Throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR).
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
A Secure Routing Protocols for Ad Hoc Network, 2018
Wireless Personal Communications, 2020
Security and Communication Networks, 2012
Journal of Engineering Science and Technology Review
International Journal of Computer Applications, 2012
Mobile Ad-Hoc Networks: Protocol Design, 2011
SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications, 2003
IAEME PUBLICATION, 2018
International Journal of Computer Applications, 2011
Proceedings of the 1st ACM workshop on …, 2002
Security and Communication Networks, 2009
Malaysian Journal of Computer Science, 2009
Computing Research Repository, 2010
International Journal of Advanced Trends in Computer Science and Engineering, 2020
International Journal of Computer Science and …, 2011
2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008), 2008