A Secure Source Routing Protocol for Mobile Ad Hoc Networks

##plugins.themes.academic_pro.article.main##

Baban A. Mahmood A. Mahmood
D. Manivannan

Abstract

Routing protocols for Mobile Ad Hoc Networks (MANETs) have been extensively studied. Some of the wellknown source routing protocols presented in the literature that claim to establish secure routes are susceptible to hidden channel attacks. In this paper, we address this issue and present a novel secure routing protocol, based on sanitizable signatures, that is not susceptible to hidden channel attacks.

##plugins.themes.academic_pro.article.details##

How to Cite
Baban A. Mahmood A. Mahmood, & D. Manivannan. (2020). A Secure Source Routing Protocol for Mobile Ad Hoc Networks. International Journal of Next-Generation Computing, 11(3), 212–234. https://doi.org/10.47164/ijngc.v11i3.180

References

  1. Abdelaziz, A. K., Nafaa, M., and Salim, G. 2013. Survey of routing
  2. attacks and countermeasures in mobile ad hoc networks. In Proceedings
  3. of 2013 IEEE International Conference on Computer Modelling and
  4. Simulation (UKSim).
  5. Ács, G., Buttyán, L., and Vajda, I. 2006. Provably secure on-demand
  6. source routing in mobile ad hoc networks. IEEE Transactions on Mobile
  7. Computing 5, 11, 1533–1546.
  8. Arulkumaran, G. and Gnanamurthy, R. K. 2019. Fuzzy trust approach for
  9. detecting black hole attack in mobile adhoc network. Mobile Networkshttps://orcid.org/0000-0002-3787-265X
  10. and Applications 24, 2, 386–393.
  11. Ateniese, G., Chou, D. H., Medeiros, B., and Tsudik,
  12. G. 2005. Sanitizable signatures. In Proceedings of 10th European
  13. Symposium on Research in Computer Security. Springer, Berlin
  14. Heidelberg, 159–177.
  15. Ateniese, G. and Medeiros, B. 2004. Security in Communication
  16. Networks: International Conference, SCN. Springer Berlin Heidelberg,
  17. Chapter On the Key Exposure Problem in Chameleon Hashes, 165–179.
  18. Basagni, S., Chlamtac, I., Syrotiuk, V. R., and Woodward,
  19. B. A. 1998. A distance routing effect algorithm for mobility
  20. (DREAM). In Proceedings of the 4th Annual ACM/IEEE International
  21. Conference on Mobile Computing and Networking (MobiCom).
  22. Burmester, M. and de Medeiros, B. 2009. On the security of route
  23. discovery in MANETs. IEEE Transactions on Mobile Computing 8, 9
  24. (Sept), 1180–1188.
  25. Buttyán, L. and Vajda, I. 2004. Towards provable security for ad hoc
  26. routing protocols. In Proceedings of the 2nd ACM Workshop on Security
  27. of Ad Hoc and Sensor Networks. ACM, New York, NY, USA.
  28. Giruka, V. C. and Singhal, M. 2007. A self-healing on-demand
  29. geographic path routing protocol for mobile ad-hoc networks. Ad Hoc Networks 5, 7 (Sept.), 1113–1128.
  30. Hsu, C. C. and Lei, C. L. 2009. A geographic scheme with location
  31. update for ad hoc routing. In Proceedings of Fourth International
  32. Conference on Systems and Networks Communications (ICSNC).
  33. Hu, Y., Perrig, A., and Johnson, D. B. 2003. Efficient security
  34. mechanisms for routing protocols. In Proceedings of NDSS.
  35. Hu, Y.-C., Perrig, A., and Johnson, D. B. 2005. Ariadne: A secure
  36. on-demand routing protocol for ad hoc networks. Wireless networks 11,
  37. -2, 21–38.
  38. Hurley-Smith, D., Wetherall, J., and Adekunle, A. 2017. SUPERMAN:
  39. security using pre-existing routing for mobile ad hoc networks. IEEE
  40. Transactions on Mobile Computing 16, 10, 2927–2940.
  41. Jain, S., Shastri, A., and Chaurasia, B. K. 2013. Analysis and
  42. feasibility of reactive routing protocols with malicious nodes in
  43. manets. In Proceedings of International Conference on Communication
  44. Systems and Network Technologies (CSNT).
  45. Johnson, D. B. and Maltz, D. A. 1996. Mobile Computing. Springer US,
  46. Chapter Dynamic Source Routing in Ad Hoc Wireless Networks, 153–181.
  47. Karp, B. and Kung, H. T. 2000. GPSR: Greedy perimeter stateless
  48. routing for wireless networks. In Proceedings of the 6th Annual
  49. International Conference on Mobile Computing and Networking.
  50. Kavitha, K., Selvakumar, K., Nithya, T., and Sathyabama, S. 2013. Zone
  51. based multicast routing protocol for mobile ad hoc network. In
  52. Proceedings of International Conference on Emerging Trends in VLSI,
  53. Embedded System, Nano Electronics and Telecommunication System
  54. (ICEVENT).
  55. Kojima, H., Yanai, N., and Cruz, J. P. 2019. ISDSR+: improving the
  56. security and availability of secure routing protocol. IEEE Access 7,
  57. –74868.
  58. Krawczyk, H., Bellare, M., and Canetti, R. 1997. HMAC: Keyed-hashing
  59. for message authentication. RFC 2104, RFC Editor. February.
  60. Li, H. and Singhal, M. 2005. An anchor-based routing protocol with
  61. cell id management system for ad hoc networks. In Proceedings of
  62. International Conference on Computer Communications and Networks.
  63. Li, T., Ma, J., and Sun, C. 2019. SRDPV: Secure route discovery and
  64. privacy-preserving verification in manets. Wireless Networks 25,
  65. –1747.
  66. Papadimitratos, P. and Haas, Z. 2002. Secure routing for mobile ad hoc
  67. networks. Mobile Computing and Communications Review 1, 2, 27–31.
  68. Perkins, C. E. and Bhagwat, P. 1994. Highly dynamic
  69. destination-sequenced distance-vector routing (DSDV) for mobile
  70. computers. SIGCOMM Computing Commununications Review 24, 4 (Oct.),
  71. –244.
  72. Perkins, C. E. and Royer, E. M. 1999. Ad-hoc on-demand distance vector
  73. routing. In Proceedings of Second IEEE Workshop on Mobile Computing
  74. Systems and Applications (WMCSA).
  75. Perrig, A., Canetti, R., Tygar, J., and Song, D. 2000. Efficient
  76. authentication and signing of multicast streams over lossy
  77. channels. In Proceedings of IEEE Symposium on Security and Privacy.
  78. Rivest, R., Shamir, A., and Adleman, L. 1978. A method for obtaining
  79. digital signatures and public-key cryptosystems. Communications of the
  80. ACM 21, 120–126.
  81. Salehi, M. and Boukerche, A. 2019. Secure opportunistic routing
  82. protocols: methods, models, and classification. Wireless Networks 25,
  83. , 559–571.
  84. Shen, H. and Zhao, L. 2013. ALERT: An anonymous location-based
  85. efficient routing protocol in MANETs. IEEE Transactions on Mobile
  86. Computing 12, 6 (June), 1079–1093.
  87. Talooki, V. N., Marques, H., and Rodriguez, J. 2013. Energy efficient
  88. dynamic MANET on-demand (E2DYMO) routing protocol. In Proceedings of
  89. International Symposium and Workshops on a World of Wireless, Mobile
  90. and Multimedia Networks (WoWMoM).
  91. Xia, H., shun Zhang, S., Li, Y., kuan Pan, Z., Peng, X., and Cheng,
  92. X. 2019. An attack-resistant trust inference model for securing
  93. routing in vehicular ad hoc networks. IEEE Transactions on Vehicular
  94. Technology 68, 7, 7108–7120.
  95. Xu, Y., Liu, J., Shen, Y., Jiang, X., and Shiratorie,
  96. N. 2017. Physical layer security-aware routing and performance
  97. tradeoffs in ad hoc networks. Computer Networks 123, 4, 77–87.
  98. Yih-Chun, H. and Perrig, A. 2004. A survey of secure wireless ad hoc
  99. routing. IEEE Security Privacy 2, 3 (May), 28–39.