Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs)

Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency on a fixed infrastructure. There have been many studies done in this area to improve the quality and efficiency of the routing protocols in MANETs. However unique characteristics of MANETs topology such as open peer-to-peer architecture, dynamic network topology, shared wireless medium and limited resource (battery, memory and computation power) pose a number of non-trivial challenges to security design. These challenges and characteristics require MANETs to provide broad protection and desirable network performance. In this paper, we examine the available secure routing protocols in MANETs such as Secure OnDemand Routing Protocol – Ariadne, Secure Ad hoc Ondemand Distance Vector routing protocol – SAODV, Security Aware Routing Protocol – SAR, Secure Efficient Distance Vector Routing – SEAD, Securing the Destination Sequenced Distance Vector Routing Protocol – SDSDV, Secure Link State Routing protocol – SLSP, On-Demand Secure Routing Protocol Resilient to Byzantine Failures, Authenticated Routing for Ad-hoc Networks – ARAN, Secure Position Aided Ad hoc Routing – SPAAR. We identify the advantages and disadvantages of each protocol, we compare them based on some security parameters, and also we discuss some open challenges present in ad hoc secure routing.

[1]  Pietro Michiardi,et al.  Security in ad hoc networks , 2003 .

[2]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[3]  Zygmunt J. Haas,et al.  The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .

[4]  Ivan Stojmenovic,et al.  Routing Approaches in Mobile AD HOC Networks , 2004 .

[5]  Christos Douligeris,et al.  Security for Ad Hoc Networks , 2010, Handbook of Information and Communication Security.

[6]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[7]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[8]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[9]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[10]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[11]  Zygmunt J. Haas,et al.  Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..

[12]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[13]  Kai Inkinen New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes , 2004 .

[14]  Haiyun Luo,et al.  Ad Hoc Network Security , 2004, Mobile Computing Handbook.

[15]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[16]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[17]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[18]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[19]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[20]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[21]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[22]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[23]  Evangelos Kranakis,et al.  Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) , 2004, ICICS.

[24]  S. Carter Secure Position Aided Ad Hoc Routing , 2003 .

[25]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[26]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .