Survey-Secure Routing Protocols of MANET

Mobile Ad hoc Network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node not only acts as end system, but also as a router to forward packets. The nodes are free to move and organize themselves and change topology dynamically, establishing an optimal and efficient route between the communicating parties is the primary concern of the routing protocols of MANET. But one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple the MANET operations. Attack prevention measures, such as authentication and encryption, can be used as the first line of defense for reducing the possibilities of attacks. Any attack in routing phase may disrupt the overall communication and the entire network can be paralyzed. Thus, security plays an important role the network (MANET). In this paper, we identify the existent security threats where an ad hoc network faces,and some of the issues and challenges of MANET, we have done literature survey and gathered information related to various types of attacks and solutions. However in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.

[1]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[2]  Fred L. Templin,et al.  Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) , 2004, RFC.

[3]  Sugata Sanyal,et al.  A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs) , 2011, ArXiv.

[4]  Tomasz Imielinski,et al.  GPS-based geographic addressing, routing, and resource discovery , 1999, CACM.

[5]  Ranga S. Ramanujan,et al.  Techniques for intrusion-resistant ad hoc routing algorithms (TIARA) , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[6]  S. Ramanathan,et al.  A survey of routing techniques for mobile communications networks , 1996, Mob. Networks Appl..

[7]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[8]  Öznur Özkasap,et al.  Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.

[9]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[10]  Ronald L. Rivest,et al.  All-or-Nothing Encryption and the Package Transform , 1997, FSE.

[11]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[12]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[13]  Zygmunt J. Haas,et al.  Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..

[14]  Srdjan Capkun,et al.  BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.

[15]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[16]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[17]  Jean-François Raymond,et al.  Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[18]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[19]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[20]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[21]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[22]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[23]  ZapataManel Guerrero Secure ad hoc on-demand distance vector routing , 2002 .

[24]  Jalel Ben-Othman,et al.  Enhancing data security in ad hoc networks based on multipath routing , 2010, J. Parallel Distributed Comput..

[25]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[26]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[27]  Sufatrio Lam Scalable Authentication Framework for Mobile-IP (SAFe-MIP) , 1999 .