Asymmetric and dynamic encryption for routing security in MANETs

In mobile ad-hoc networks (MANETs), data transmission is usually performed between mobile entities in an environment without infrastructure. So, data security is a key issue in MANETs. In this paper, we propose a security solution for the routing protocol OLSR. Our system is based on a new approach of asymmetric and dynamic encryption. Our goal is to properly secure the traffic against potential attacks without decreasing network performances.

[1]  Tae-Hyung Kim,et al.  LT-OLSR: Attack-tolerant OLSR against link spoofing , 2012, 37th Annual IEEE Conference on Local Computer Networks.

[2]  Burton S. Kaliski IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract) , 1996, Security Protocols Workshop.

[3]  King Sun Chan,et al.  TCBWD: Topological comparison-based Byzantine wormhole detection for MANET , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[4]  Jalel Ben-Othman,et al.  A new method to secure RA-OLSR using IBE , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[5]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[6]  L. Javier García-Villalba,et al.  Secure extension to the optimised link state routing protocol , 2011, IET Inf. Secur..

[7]  Bart Preneel,et al.  Cryptanalysis of Dynamic SHA(2) , 2009, Selected Areas in Cryptography.

[8]  Ahmed Habbani,et al.  Efficient Heuristic Based on Clustering Approach for OLSR , 2013, J. Comput. Networks Commun..

[9]  Mayank Singhal,et al.  Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET) , 2013 .

[10]  T. Rama Rao,et al.  Regression-based trust model for mobile ad hoc networks , 2012, IET Inf. Secur..

[11]  Ilango Krishnamurthi,et al.  Enhanced OLSR for defense against DOS attack in ad hoc networks , 2013, Journal of Communications and Networks.

[12]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[13]  R. Leela Velusamy,et al.  Black hole attack and their counter measure based on trust management in manet: A survey , 2011, ARTCom 2011.

[14]  S. Bose,et al.  Impact of Gray hole attack on adhoc networks , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[15]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[16]  Nei Kato,et al.  Analysis of the node isolation attack against OLSR-based mobile ad hoc networks , 2006, 2006 International Symposium on Computer Networks.

[17]  Saadiah Yahya,et al.  Analysis of Wormhole attack on MANETs using different MANET routing protocols , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).

[18]  Sanjeev Jain,et al.  A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.

[19]  Dr Pradip M. Jawandhiya A Survey of Mobile Ad Hoc Network Attacks , 2019 .