An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks

Mobile Ad-Hoc Networks (MANETs) uses security routing scheme for establishing secure route and securely data transmission. The security issues in MANET are mostly concentrated in two parts. The main security threat in MANET is integrity, non-repudiation and privacy. To combat with these security threats, many secure routing protocols has been designed to reduce the security threats in MANET. In this paper we have proposed Privacy Aware Routing Protocol (ESARP) to enhance the security levels in the routing protocol to prevent the network attacks. The proposed work consists of three parts. In the first part each node perform a key exchange operation with its one and two hop distance neighbours, in the second step, secure route establishment and in the third step, secure data communication is performed. Key exchange operation is done in two steps; in the first step, source node (S) exchanges public key (e) with its one hop distance nodes and establish a secret key (SK), and in the second step, source node exchanges public key with its two hop distance nodes and establish a secret key. On establishing the key exchange process node can participate in routing process. In route establishment process, secure route will be established between the sender and receiver. In the third step, sender and receiver will exchange their public key securely and establish a secret key for communication and then data communication is performed.

[1]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Phung Huu Phu,et al.  Securing AODV Routing Protocol in Mobile Ad-Hoc Networks , 2009, IWAN.

[3]  Stefan Schlott,et al.  Secure Dynamic Source Routing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[4]  Mahalingam Ramkumar,et al.  An Efficient Secure Route Discovery Protocol for DSR , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[5]  M. Tadayon,et al.  Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks , 2011 .

[6]  R. Lee,et al.  Using Dominating Sets with 2-Hop Neighborhood Information to Improve the Ad-Hoc On-Demand Distance Vector Routing* , 2011 .

[7]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[8]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[9]  Chris J. Mitchell,et al.  Malicious attacks on ad hoc network routing protocols , 2007 .

[10]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[11]  Gruia Calinescu Computing 2-Hop Neighborhoods in Ad Hoc Wireless Networks , 2003, ADHOC-NOW.

[12]  P. Khatri,et al.  A Survey on Security issues in Mobile ADHOC networks , 2009 .

[13]  Ranvijay,et al.  A REVIEW PAPER ON AD HOC NETWORK SECURITY , 2007 .

[14]  Srdjan Capkun,et al.  BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.

[15]  Sanjeev Jain,et al.  A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.

[16]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[17]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[18]  Ranga S. Ramanujan,et al.  Techniques for intrusion-resistant ad hoc routing algorithms (TIARA) , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[19]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.