Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2005, IEEE Communications Surveys & Tutorials
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. The assumption of a trusted environment is not one that can be realistically expected; hence, several efforts have been made toward the design of a secure and robust routing protocol for ad hoc networks. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. Based on this discussion we then formulate the threat model for ad hoc routing and present several specific attacks that can target the operation of a protocol. In order to analyze the proposed secure ad hoc routing protocols in a structured way we have classified them into five categories: solutions based on asymmetric cryptography; solutions based on symmetric cryptography; hybrid solutions; reputation-based solutions; and a category of add-on mechanisms that satisfy specific security requirements. A comparison between these solutions can provide the basis for future research in this rapidly evolving area.
2016
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. This paper analyzes security challenges in ad hoc networks and summarizes key issues that should be solved for achieving the ad hoc security. It also gives an overview of the current state of solutions on such key issues in Mobile Ad Hoc Networks (MANETs). To develop suitable security solutions for such new environments, we must first understand how MANETs can be attacked. Then we discuss various proactive and reactive solutions proposed for MANETs. We outline secure routing solutions to avoid some attacks against the routing protocols based on cooperation between nodes. Keywords— Security; Routing Protocols; Ad Hoc Networks; Attacks; Secure Routing Protocols.
Journal of Parallel and Distributed Computing, 2003
Mobile ad hoc network (MANET) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. These characteristics require the networks to have much harder security requirements than the contemporary networks. While current routing protocols do seem to adjust well to dynamically changing conditions, they offer either no security mechanisms at all or have only partial solutions for ensuring the correct routing. It is hard to simultaneously achieve both security and robustness in the routing protocols. In this paper, we analyze various possible threats to the routing protocols and introduce strategies to address the same. On one hand, routing protocol can be disrupted due to attacks from intruder nodes that do not belong to the network. On the other hand, routing is severely affected by the presence of compromised nodes that inflict unpredictable and undetectable Byzantine failure. We have addressed the issue of attacks from intruders by means of authentication techniques that rely on mutual trust between nodes. We also study the behavioral patterns of the nodes and isolate compromised nodes using a distributed approach. The effectiveness of our schemes is illustrated by means of extensive simulations using ns-2 simulator. The routing protocol chosen for the study is AODV. We have observed the performance of the network with and without our secured routing scheme. r
Mobile Ad hoc wireless networks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. The nodes in MANET are subject to various attacks that range from naïve eavesdropping to vicious battery draining attacks. Routing Protocols, data, bandwidth and battery power are the common target of theses attacks. This paper gives an overview of seven such secure routing protocols by presenting their characteristics and functionality along with their respective merits and drawbacks. A Comparison of these protocols is also presented based upon certain security parameters.
Ad hoc networks are special networks that do not require an infrastructure. Nodes of such networks are usually mobile and wireless. Wireless nodes use a shared medium for communication, so they are able to communicate with many nodes directly provided they are within communication range of those nodes.
International journal of Computer Networks & Communications, 2014
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each pair of source-destination nodes of a MANET for securing the end-to-end transmitted data. Here each node has an ID which is evaluated from its public key and the messages that are sent are authenticated with a signature/ MAC. The proposed scheme does not allow a node to change its ID throughout the network lifetime. Thus it makes the network secure against attacks that target AODV and TCP in MANET. We present performance analysis to validate our claim.
Journal of Engineering Science and Technology Review
Security is a vital requirement for communication between mobile nodes in a hostile environment. Mobile nodes are prone to various attacks in a hostile environment. Routing is one of the crucial tasks where a malicious node can gain access to the network. This paper presents a mitigation mechanism to confront internal attacks launched by the misbehaving nodes. The nodes which launch security threats in the network after participating in the route discovery and data transmission are referred as misbehaving nodes. Such authenticated nodes misbehave either due to malicious software or get compromised. The compromised or misbehaving nodes attack on the confidentiality and authentication security services. The nodes generally gain access and become part of the network during the routing process. This works proposes a secured routing deterrent to internal attacks (SRDIA) that mitigates the internal threats launched by the compromised nodes. The proposed scheme in this paper is a defense mechanism against routing security threats for mobile ad hoc networks using ID based cryptography. In addition hash chain based security association is used for authentication and key management. This technique aims at defending from the security threats caused by compromised nodes like Byzantine attack, invisible node attack, Sleep Deprivation, location disclosure etc. In this research work an efficient authentication technique using hash chain and session key establishment is proposed. A lightweight hash algorithm "BLAKE" is used for the implementation of authentication for resource constraint devices and "PRESENT", a symmetric key encryption algorithm to secure the data exchange among nodes. The outcome of the simulation results demonstrates percentage increase of packet delivery ratio and throughput in presence of malicious nodes.
International Journal of Computer Applications, 2012
In this paper we study the routing security issues of MANETs, we propose an algorithm to detect malicious nodes based on intelligent water drops algorithm and examine "routing modification attack" problem that can easily be exploited against the MANETs. We also propose a solution for this problem and examine security issues related to proactive routing protocols for MANETs. This could be achieved by adding some extensions to secure routing. These extensions include integrity which means that the message will not change along the route and authentication which means that the sender is the one who introduces himself. This protection is provided by a hash chain and authentication by digital signature which both added to all control massages. We obtained acceptable results depending on the performance of metrics(end-to-end delay and network load). The difference in average of end-to-end delay when using secure protocol is very small and the average of network load is also very small.
Mobile Ad-Hoc Networks: Protocol Design, 2011
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes' operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications, 2003
Mobile ad hoc networks have inherently very different properties to conventional networks. These new characteristics present major security vulnerabilities; in particular, one side effect of the unique way in which routing protocols operate in ad hoc networks is that many new threats arise. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should, through a wish to conserve power. Malicious nodes may deliberately disrupt the network using a variety of attacks. This paper discusses reputation mechanisms which have been suggested as a means to mitigate the detrimental effect of selfish and malicious nodes. This paper reveals reasons why complex reputation systems may be too inefficient to use in a mobile ad hoc network, where resources are limited. However, suggestions are also made to show how a simple reputation system might be used to enhance the robustness of ad hoc networks.
2014
In this paper, we discuss security issues and their current solutions in the ad hoc Networks. Ad hoc networks are a key factor in the evolution of wireless communications. An ad hoc wireless network is a collection of wireless nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Security in ad hoc network is a grand challenge problem now a day. To enhance the security levels in the routing protocol to prevent the network against active and passive attacks without the presence of central authority. A peer review process has been introduced to check the integrity and non-repudiation of the routing packets and key exchange packets. Many of the ad hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. The general security objectives like authentication, confidentiality, integrity, availability and nonrepudiation, the ad hoc routing protocols should al...
Advances in Science, Technology and Engineering Systems Journal, 2022
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc networks (MANET). Techniques and schemes have been proposed to secure the basic routing protocols in order to guarantee the availability of information routing services between network nodes. The majority of the solutions presented in the literature belong to two categories, namely those that use cryptographic techniques and those that use trust schemes. Given the characteristics of MANET networks, we need approaches that guarantee a level of honesty of the nodes to prevent possible routing attacks from malicious nodes. This study presents the security extensions of the basic routing protocols AODV, DSR and DSDV.A first part is devoted to extensions based on cryptography and a second part introduces extensions using trusted systems. Then we discussed and analyzed them while drawing up a comparative table to measure the effectiveness of the mechanisms used as well as the limits and strengths of each proposed extensions. In this study, we conclude that a new trust model that combines an access strategy with lightweight techniques must be developed to ensure honest node behavior can be a key to securing the routing protocol in MANET.
… Journal of Computer Science and Security …, 2007
In this article we present a survey of secure ad hoc routing protocols for wireless networks. Ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Attacks on ad hoc network routing protocols disrupt network performance and reliability with there solution. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. The comparison between the proposed solutions and parameters of ad hoc network shows the performance according to secure protocols. We discuss in this paper routing protocol and challenges and also discuss authentication in ad hoc network.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
A Mobile Adhoc Network (MANET) is prone to attacks. Adversaries take hold of the network, thus degrading their performance. Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role. A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack. In this paper, Cohen Kappa Reliability Coefficient based Mitigation (CKRCM) mechanism is proposed to deal with these attacks. The intermediate nodes are monitored by their neighbors for a timestamp. If the monitoring node does not receive an acknowledgment, then the nodes are perceived to be attacked. The trustworthiness of the nodes is built by computing the trusts and reliabilities of the nodes. It is seen that the proposed scheme outperforms the existing scheme in terms of Throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR).
A Secure Routing Protocols for Ad Hoc Network, 2018
Mobile Ad-Hoc network is a kind of wireless network and self-configuring network of moving routers associated with wireless network. The routers are free to move randomly and organize themselves arbitrarily. wireless topology may change rapidly and unpredictably Due to the resource constrain mobile ad hoc network faces lot of various challenges as compared to the wired network such as error prone broadcast channels, limited bandwidth, hidden and exposed terminal problems, frequent topology changes, power constraints and security issues [1]. A Mobile ad hoc network is a group of wireless mobile computers (or nodes). In which nodes collaborate by forwarding packets for each other to allow them to communicate outside range of direct wireless transmission. Ad hoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, and can be quickly and inexpensively set up as needed. A MANET is an autonomous group of mobile users that communicate over reasonably slow wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes are mobile. The network is decentralized, where all network activity, including discovering the topology and delivering messages must be executed by the nodes themselves. Hence routing functionality will have to be incorporated into the mobile nodes. Mobile ad hoc network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes can directly communicate to those nodes that are in radio range of each other, whereas others nodes need the help of intermediate nodes to route their packets. These networks are fully distributed, and can work at any place without the aid of any infrastructure. Mobile ad-hoc network is presently applicable everywhere in real life like in business meetings outside the offices, in Bluetooth, Wi-Fi Protocols etc. Routing is the process of selecting paths in a network along which to send data or physical traffic. Routing directs the passing of logically addressed packets from their source toward their ultimate destination through intermediary nodes. So, routing protocol is the routing of packets based on the defined rules and regulations. Every routing protocol has its own algorithm on the basis of which it discovers and maintains the route. In every routing protocol, there is a data structure which stores the information of route and modifies the table as route maintenance is requires. A routing metric is a value used by a routing algorithm to determine whether one route should perform better than another. Metrics can cover such information as bandwidth, delay, hop count, path cost, load, reliability and communication cost. The routing table stores only the best possible routes while link-state or topological databases may store all other information as well.
2004
Mobile ad hoc networks are a class of networks based on wireless technologies. An ad hoc network is a permanent or temporary collection of nodes that can communicate with each other. The distinguishing properties are that there is no pre-existing infrastructure, that there is no central entity to provide network administration services, and that endto-end communication may require routing information via several intermediate nodes. This is why ad hoc networks are sometimes referred to as multi-hop networks, where a hop is a direct link between two nodes. If wireless communication is being used, then two nodes are within one hop of each other if they lie in each other’s transmission range. Mobility introduces a major design constraint not present in wired networks, namely the need for energy efficiency. The consequence of this is that network services must be efficient, and must also take account of nodes which do not have enough energy to participate. An example of where this can gi...
2002
We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We develop a two-tier classification of routing protocol security metrics, and propose a framework to measure and enforce security attributes on ad hoc routing paths. Our framework enables applications to adapt their behavior according to the level of protection available on communicating nodes in an ad hoc network.
Wireless Personal Communications, 2020
The rapidly emerging wireless service requirements and deployment demands over last few decades necessitates the application of Mobile Ad hoc Networks in many areas. These application areas vary from social networks to safety-critical domains such as environmental monitoring, disaster rescue operations, military communications, etc. The potency of the ad hoc network deployment in a specific context is significantly affected by the underlying routing protocol. Hence, developing an efficient and secure routing protocol for MANETs is an important task in order to achieve the service level requirements and to satisfy the deployment demands effectively. However, development of such routing protocol is a challenging problem due to the inherent characteristics of ad hoc networks: frequent topology changes, open wireless medium, and limited resource constraints, etc. In addition, the stringent requirements: mobility, performance, security, trust and timing constraints, etc. add complexity to this problem. In this paper, we present an adaptive routing protocol for MANETs, which dynamically configures the routing function with respect to the metrics: (1) the varying requirement parameters and (2) the contextual features as per the desired application context. The requirement models include various performance, security, and functional parameters. On the other hand, the contextual features include mobility of nodes/groups of nodes, nodes' trust values, resource constraints of nodes, geographical context, roles of individual nodes etc. Our routing protocol is evaluated with extensive simulation test cases and the efficacy of the protocol is reported.
Security and Communication Networks, 2012
An essential problem in mobile ad hoc networks is finding an efficient and secure route from a source to an intended destination. In this paper, we have proposed a new model of routing protocol named ARANz, which is an extension of the original Authenticated Routing for Ad Hoc Networks (ARAN). ARANz adopts the authentication methods used with ARAN and aims to increase security, achieve robustness and solve the single point of failure and attack problems by introducing multiple local certificate authority servers. Additionally, via dealing with the network as zones and using restricted directional flooding, our new model exhibits better scalability and performance. Through simulation, we evaluated ARANz and compared it with the original ARAN as well as Ad Hoc On-demand Distance Vector. Simulation results show that ARANz is able to effectively discover secure routes within relatively large networks with large number of mobile nodes, while maintaining the minimum packet routing load. C...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.