A Secure Source Routing Protocol for Mobile Ad Hoc Networks
##plugins.themes.academic_pro.article.main##
Abstract
Routing protocols for Mobile Ad Hoc Networks (MANETs) have been extensively studied. Some of the wellknown source routing protocols presented in the literature that claim to establish secure routes are susceptible to hidden channel attacks. In this paper, we address this issue and present a novel secure routing protocol, based on sanitizable signatures, that is not susceptible to hidden channel attacks.
##plugins.themes.academic_pro.article.details##
How to Cite
Baban A. Mahmood A. Mahmood, & D. Manivannan. (2020). A Secure Source Routing Protocol for Mobile Ad Hoc Networks. International Journal of Next-Generation Computing, 11(3), 212–234. https://doi.org/10.47164/ijngc.v11i3.180
References
- Abdelaziz, A. K., Nafaa, M., and Salim, G. 2013. Survey of routing
- attacks and countermeasures in mobile ad hoc networks. In Proceedings
- of 2013 IEEE International Conference on Computer Modelling and
- Simulation (UKSim).
- Ács, G., Buttyán, L., and Vajda, I. 2006. Provably secure on-demand
- source routing in mobile ad hoc networks. IEEE Transactions on Mobile
- Computing 5, 11, 1533–1546.
- Arulkumaran, G. and Gnanamurthy, R. K. 2019. Fuzzy trust approach for
- detecting black hole attack in mobile adhoc network. Mobile Networkshttps://orcid.org/0000-0002-3787-265X
- and Applications 24, 2, 386–393.
- Ateniese, G., Chou, D. H., Medeiros, B., and Tsudik,
- G. 2005. Sanitizable signatures. In Proceedings of 10th European
- Symposium on Research in Computer Security. Springer, Berlin
- Heidelberg, 159–177.
- Ateniese, G. and Medeiros, B. 2004. Security in Communication
- Networks: International Conference, SCN. Springer Berlin Heidelberg,
- Chapter On the Key Exposure Problem in Chameleon Hashes, 165–179.
- Basagni, S., Chlamtac, I., Syrotiuk, V. R., and Woodward,
- B. A. 1998. A distance routing effect algorithm for mobility
- (DREAM). In Proceedings of the 4th Annual ACM/IEEE International
- Conference on Mobile Computing and Networking (MobiCom).
- Burmester, M. and de Medeiros, B. 2009. On the security of route
- discovery in MANETs. IEEE Transactions on Mobile Computing 8, 9
- (Sept), 1180–1188.
- Buttyán, L. and Vajda, I. 2004. Towards provable security for ad hoc
- routing protocols. In Proceedings of the 2nd ACM Workshop on Security
- of Ad Hoc and Sensor Networks. ACM, New York, NY, USA.
- Giruka, V. C. and Singhal, M. 2007. A self-healing on-demand
- geographic path routing protocol for mobile ad-hoc networks. Ad Hoc Networks 5, 7 (Sept.), 1113–1128.
- Hsu, C. C. and Lei, C. L. 2009. A geographic scheme with location
- update for ad hoc routing. In Proceedings of Fourth International
- Conference on Systems and Networks Communications (ICSNC).
- Hu, Y., Perrig, A., and Johnson, D. B. 2003. Efficient security
- mechanisms for routing protocols. In Proceedings of NDSS.
- Hu, Y.-C., Perrig, A., and Johnson, D. B. 2005. Ariadne: A secure
- on-demand routing protocol for ad hoc networks. Wireless networks 11,
- -2, 21–38.
- Hurley-Smith, D., Wetherall, J., and Adekunle, A. 2017. SUPERMAN:
- security using pre-existing routing for mobile ad hoc networks. IEEE
- Transactions on Mobile Computing 16, 10, 2927–2940.
- Jain, S., Shastri, A., and Chaurasia, B. K. 2013. Analysis and
- feasibility of reactive routing protocols with malicious nodes in
- manets. In Proceedings of International Conference on Communication
- Systems and Network Technologies (CSNT).
- Johnson, D. B. and Maltz, D. A. 1996. Mobile Computing. Springer US,
- Chapter Dynamic Source Routing in Ad Hoc Wireless Networks, 153–181.
- Karp, B. and Kung, H. T. 2000. GPSR: Greedy perimeter stateless
- routing for wireless networks. In Proceedings of the 6th Annual
- International Conference on Mobile Computing and Networking.
- Kavitha, K., Selvakumar, K., Nithya, T., and Sathyabama, S. 2013. Zone
- based multicast routing protocol for mobile ad hoc network. In
- Proceedings of International Conference on Emerging Trends in VLSI,
- Embedded System, Nano Electronics and Telecommunication System
- (ICEVENT).
- Kojima, H., Yanai, N., and Cruz, J. P. 2019. ISDSR+: improving the
- security and availability of secure routing protocol. IEEE Access 7,
- –74868.
- Krawczyk, H., Bellare, M., and Canetti, R. 1997. HMAC: Keyed-hashing
- for message authentication. RFC 2104, RFC Editor. February.
- Li, H. and Singhal, M. 2005. An anchor-based routing protocol with
- cell id management system for ad hoc networks. In Proceedings of
- International Conference on Computer Communications and Networks.
- Li, T., Ma, J., and Sun, C. 2019. SRDPV: Secure route discovery and
- privacy-preserving verification in manets. Wireless Networks 25,
- –1747.
- Papadimitratos, P. and Haas, Z. 2002. Secure routing for mobile ad hoc
- networks. Mobile Computing and Communications Review 1, 2, 27–31.
- Perkins, C. E. and Bhagwat, P. 1994. Highly dynamic
- destination-sequenced distance-vector routing (DSDV) for mobile
- computers. SIGCOMM Computing Commununications Review 24, 4 (Oct.),
- –244.
- Perkins, C. E. and Royer, E. M. 1999. Ad-hoc on-demand distance vector
- routing. In Proceedings of Second IEEE Workshop on Mobile Computing
- Systems and Applications (WMCSA).
- Perrig, A., Canetti, R., Tygar, J., and Song, D. 2000. Efficient
- authentication and signing of multicast streams over lossy
- channels. In Proceedings of IEEE Symposium on Security and Privacy.
- Rivest, R., Shamir, A., and Adleman, L. 1978. A method for obtaining
- digital signatures and public-key cryptosystems. Communications of the
- ACM 21, 120–126.
- Salehi, M. and Boukerche, A. 2019. Secure opportunistic routing
- protocols: methods, models, and classification. Wireless Networks 25,
- , 559–571.
- Shen, H. and Zhao, L. 2013. ALERT: An anonymous location-based
- efficient routing protocol in MANETs. IEEE Transactions on Mobile
- Computing 12, 6 (June), 1079–1093.
- Talooki, V. N., Marques, H., and Rodriguez, J. 2013. Energy efficient
- dynamic MANET on-demand (E2DYMO) routing protocol. In Proceedings of
- International Symposium and Workshops on a World of Wireless, Mobile
- and Multimedia Networks (WoWMoM).
- Xia, H., shun Zhang, S., Li, Y., kuan Pan, Z., Peng, X., and Cheng,
- X. 2019. An attack-resistant trust inference model for securing
- routing in vehicular ad hoc networks. IEEE Transactions on Vehicular
- Technology 68, 7, 7108–7120.
- Xu, Y., Liu, J., Shen, Y., Jiang, X., and Shiratorie,
- N. 2017. Physical layer security-aware routing and performance
- tradeoffs in ad hoc networks. Computer Networks 123, 4, 77–87.
- Yih-Chun, H. and Perrig, A. 2004. A survey of secure wireless ad hoc
- routing. IEEE Security Privacy 2, 3 (May), 28–39.