BHQRSM: Binary Hex Quadratic Residue Security Model to Enhance the Trust in MANETs

Mobile adhoc network (MANET) possesses various security challenges mainly due to its varying network topology. As central coordination is not possible in MANETs, sharing of keys between nodes is a difficult task. In this paper, we present a Binary Hex Quadratic Residue Security Model that does not require any kind of key distribution between the nodes in MANETs. We use a stream of equal weighted hex codes of decimal numbers and Ex-OR operations to generate a security vector which facilitates matching of code words and also determine the active and malicious nodes in the network. Our approach also saves energy as it requires less computational analysis when compared to existing approaches. We validate our approach through simulations results.

[1]  Nai-Wei Lo,et al.  A Secure Routing Protocol to Prevent Cooperative Black Hole Attack in MANET , 2013 .

[2]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Palaniandavar Venkateswaran,et al.  Simulation and Performance Analysis of OLSR under Identity Spoofing Attack for Mobile Ad-Hoc Networks , 2011 .

[4]  Seyed Reza Kamel,et al.  AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS , 2014 .

[5]  Z. A. Khan,et al.  Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.

[6]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[7]  Syed Jalal Ahmad,et al.  Location aware and energy efficient routing protocol for long distance MANETs , 2013, Int. J. Netw. Virtual Organisations.

[8]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[9]  Sanjay Keer,et al.  To prevent wormhole attacks using wireless protocol in MANET , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[10]  Jalel Ben-Othman,et al.  Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.

[11]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[12]  Pallavi Kaliyar,et al.  A secure routing protocol for MANETs against byzantine attacks , 2013 .

[13]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[14]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[15]  S. S. Tyagi Study of MANET: Characteristics, Challenges, Application and Security Attacks , 2013 .

[16]  Yang Lu,et al.  Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic , 2007 .

[17]  Yanbin Liu,et al.  Reputation propagation and agreement in mobile ad-hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[18]  Aldar C.-F. Chan,et al.  Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[19]  Bin Yu,et al.  The three-layered group key management architecture for MANET , 2009, 2009 11th International Conference on Advanced Communication Technology.

[20]  S. C. Sharma,et al.  A Highly Secured Approach against Attacks in MANETS , 2010 .

[21]  Y. Jay Guo,et al.  Statistical NLOS Identification Based on AOA, TOA, and Signal Strength , 2009, IEEE Transactions on Vehicular Technology.

[22]  Kamalrulnizam Abu Bakar,et al.  A trust aware routing protocol for energy constrained wireless sensor network , 2016, Telecommun. Syst..

[23]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[24]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[25]  Wu Yue,et al.  Distributed intrusion detection for mobile ad hoc networks , 2008 .

[26]  S. Radha,et al.  A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[27]  Deepika Kukreja,et al.  Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack , 2018, J. Ambient Intell. Humaniz. Comput..

[28]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[29]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[30]  V. Balakrishnan,et al.  Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks , 2007, 2007 4th International Symposium on Wireless Communication Systems.

[31]  Manju Khari,et al.  Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey , 2012 .

[32]  Panayiotis Kotzanikolaou,et al.  Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[33]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[34]  M.A. Gorlatova,et al.  Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[35]  Rana Sanjeev,et al.  Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication , 2011 .

[36]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.