A Secure Addressing Scheme for Large-Scale Managed MANETs

In this paper, we propose a low-overhead identity-based distributed dynamic address configuration scheme for secure allocation of IP addresses to authorized nodes of a managed mobile ad hoc network. A new node will receive an IP address from an existing neighbor node. Thereafter, each node in a network is able to generate a set of unique IP addresses from its own IP address, which it can further assign to more new nodes. Due to lack of infrastructure, apart from security issues, such type of networks poses several design challenges such as high packet error rate, network partitioning, and network merging. Our proposed protocol takes care of these issues incurring less overhead as it does not require any message flooding mechanism over the entire MANET. Performance analysis and simulation results show that even with added security mechanisms, our proposed protocol outperforms similar existing protocols.

[1]  Yi Mu,et al.  A secure IPv6 address configuration scheme for a MANET , 2013, Secur. Commun. Networks.

[2]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[3]  Indranil Sengupta,et al.  A Distributed Trust Model for Securing Mobile Ad Hoc Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[4]  M. Fazio,et al.  New Approach for Address Auto-Configuration in MANET Based on Virtual Address Space Mapping (VASM) , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.

[5]  Kilian Weniger,et al.  Passive duplicate address detection in mobile ad hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[6]  Ana R. Cavalli,et al.  Secure hosts auto-configuration in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[7]  Antonio Puliafito,et al.  AIPAC: Automatic IP address configuration in mobile ad hoc networks , 2006, Comput. Commun..

[8]  Raja Datta,et al.  A secure dynamic IP configuration scheme for mobile ad hoc networks , 2011, Ad Hoc Networks.

[9]  Peng Ning,et al.  Secure address auto-configuration for mobile ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[10]  W. Marsden I and J , 2012 .

[11]  Raja Datta,et al.  A novel signature scheme to secure distributed dynamic address configuration protocol in mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[12]  Chien-Chao Tseng,et al.  Prime DHCP: a prime numbering address allocation mechanism for MANETs , 2005, IEEE Commun. Lett..

[13]  Raja Datta,et al.  P-TCP: A Prediction-based Secure Transmission Control Protocol for Wireless Ad Hoc Networks , 2013 .

[14]  Elizabeth M. Belding-Royer,et al.  A study of dynamic addressing techniques in mobile ad hoc networks , 2004, Wirel. Commun. Mob. Comput..

[15]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[16]  Lionel M. Ni,et al.  Prophet address allocation for large scale MANETs , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[17]  Elizabeth M. Belding-Royer,et al.  Dynamic Address Configuration in Mobile Ad hoc Networks , 2003 .

[18]  R. Datta,et al.  Security for Mobile Ad Hoc Networks , 2012 .

[19]  Xiaonan Wang,et al.  Dynamic and hierarchical IPv6 address configuration for a mobile ad hoc network , 2015, Int. J. Commun. Syst..

[20]  Raja Datta,et al.  An ID Based Secure Distributed Dynamic IP Configuration Scheme for Mobile Ad Hoc Networks , 2012, ICDCN.

[21]  Nitin H. Vaidya,et al.  Weak duplicate address detection in mobile ad hoc networks , 2002, MobiHoc '02.

[22]  Raja Datta,et al.  ADIP: an improved authenticated dynamic IP configuration scheme for mobile ad hoc networks , 2009, Int. J. Ultra Wideband Commun. Syst..

[23]  Ravi Prakash,et al.  MANETconf: configuration of hosts in a mobile ad hoc network , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[24]  Patrick Schaumont,et al.  Design and benchmarking of an ASIC with five SHA-3 finalist candidates , 2013, Microprocess. Microsystems.

[25]  Soyeon Ahn,et al.  AROD: An address autoconfiguration with address reservation and optimistic duplicated address detection for mobile ad hoc networks , 2007, Comput. Commun..

[26]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[27]  Otto Carlos Muniz Bandeira Duarte,et al.  An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks , 2013, IEEE/ACM Transactions on Networking.

[28]  Kilian Weniger,et al.  PACMAN: passive autoconfiguration for mobile ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[29]  Ravi Prakash,et al.  IP address assignment in a mobile ad hoc network , 2002, MILCOM 2002. Proceedings.

[30]  Ignas G. Niemegeers,et al.  Address autoconfiguration in wireless ad hoc networks: protocols and techniques , 2008, IEEE Wireless Communications.

[31]  Majid Tajamolian,et al.  Lightweight Secure IP Address Auto-Configuration Based on VASM , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[32]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[33]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[34]  Ilya Mironov,et al.  Hash functions: Theory, attacks, and applications , 2005 .

[35]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[36]  Yu-Chee Tseng,et al.  The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.

[37]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.