Securing On-Demand Source Routing in MANETs

Mobile Ad hoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics such as dynamic topology, open medium, absence of infrastructure, multi hop scenario and resource constraint. An ad hoc node in mobile ad hoc networks operates as not only end terminal but also as an intermediate router. In this way, multi-hop scenario occurs in MANETs. This multi hop scenario demands security against malicious behavior, because there may be one or more attackers in the route from source to destination. A routing protocol in MANETs is said to be securing that detects the detrimental effects of malicious node. Many security solutions for ad hoc routing have been proposed. But still many attacks are not addressable by these protocols. In this paper, we have proposed a protocol to secure the source routing in MANETs that allows both communicating parties as well as intermediate nodes to authenticate other nodes.

[1]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[2]  Levente Buttyán,et al.  Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.

[3]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[4]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[5]  Yang Lu,et al.  Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic , 2007 .

[6]  Levente Buttyán,et al.  Towards provable security for ad hoc routing protocols , 2004, SASN '04.

[7]  R.A. Raja Mahmood,et al.  A survey on detecting black hole attack in AODV-based mobile ad hoc networks , 2007, 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies.

[8]  N. Tyagi,et al.  A new route maintenance in dynamic source routing protocol , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[9]  Pascal Lorenz,et al.  An efficient heterogeneous key management approach for secure multicast communications in ad hoc networks , 2008, Telecommun. Syst..

[10]  Qiuna Niu Secure On-Demand Source Routing for Ad Hoc Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Wenchao Huang,et al.  DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation , 2009, 2009 International Conference on Computational Science and Engineering.

[12]  Davide Cerri,et al.  Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.