Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)

Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the original message. Hash functions are used in message authentication. They are also used in routine software upgrades to make sure that the new software has not been tampered with. SHA-3 is a family of functions based on Keccak, some of them can be implemented with minimal additional circuitry on a chip and are very useful alternatives for providing security in small devices. SHA-3 is not a replacement for SHA-2 but it is offered as a backup. So far, there is no procedure that exists to crack the SHA-2 and still remains secure and viable. In this paper, HMAC-SHA-3 standard algorithms were used to address Data Integrity of the message being sent using AODV routing algorithm for MANETs. Message authentication, confidentiality, Integrity were addressed using secure routing. All possible attacks were addressed in AODV using SHA-3 algorithm and the tool used for simulation was Qualnet 7.4.

[1]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[2]  Kwok-Yan Lam,et al.  SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.

[3]  Arash Reyhani-Masoleh,et al.  Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[4]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[5]  Jegan Govindasamy,et al.  A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack , 2018, Journal of Electrical Systems and Information Technology.

[6]  Dilli Ravilla,et al.  Routing Using Trust Based System with SHA-2 Authentication , 2015 .

[7]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[8]  Dilli Ravilla,et al.  Enhancing the Security of MANETs using Hash Algorithms , 2015 .

[9]  Azzedine Boukerche,et al.  Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks , 2016, Ad Hoc Networks.

[10]  M. Farooq,et al.  A hybrid artificial immune system (AIS) model for power aware secure Mobile Ad Hoc Networks (MANETs) routing protocols , 2011, Appl. Soft Comput..

[11]  G. Narsimha,et al.  Trust Based Certificate Revocation for Secure Routing in MANET , 2016 .

[12]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[13]  Mehdi Medadian,et al.  Combat with Black hole attack in AODV routing protocol in MANET , 2009, 2009 First Asian Himalayas International Conference on Internet.

[14]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[15]  Gyanappa A. Walikar,et al.  A survey on hybrid routing mechanisms in mobile ad hoc networks , 2017, J. Netw. Comput. Appl..

[16]  Gene Tsudik,et al.  SRDP: Secure route discovery for dynamic source routing in MANETs , 2009, Ad Hoc Networks.

[17]  Raja Datta,et al.  A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks , 2016, Ad Hoc Networks.