A Review on Secure Routing Protocols inMANET

Mobile Ad hoc network (MANET) is a collection of self configuring, multi-hop wireless network. Due to the mobility and dynamic nature of MANET, network is not secure. MANET is more vulnerable to different types of attacks and security threats because of its characteristics. A routing protocol in a mobile Ad hoc network should be secure against both inside and outside attackers. Most of the routing protocols in MANETs assume that all the nodes in a network will cooperate to each other while forwarding data packets to other nodes. But intermediate nodes may cause several problems like it can deny to forward the packet, can also extract useful information from the packet or may modify the content of packet. Such nodes are referred as malicious nodes. An Improvised Secure routing approach should be used to address these issues in MANET by applying suitable cryptography or encryption techniques which can prevent outside attackers. By applying intrusion detection system (IDS), internal attackers can be prevented. In this paper various previously used routing protocols are discussed. Analysis is done by considering various previously used mechanisms used by those protocols and aim is to find out one new authentication based approach for secure routing.

[1]  Gene Tsudik,et al.  SRDP: Secure route discovery for dynamic source routing in MANETs , 2009, Ad Hoc Networks.

[2]  Celia Li,et al.  Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..

[3]  Anupam Joshi,et al.  On intrusion detection and response for mobile ad hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[4]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[5]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[6]  Soumyadev Maity,et al.  Secure Routing with an Integrated Localized Key Management Protocol in MANETs , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[7]  Lin Chen,et al.  A Secure and Efficient Link State Routing Protocol for Ad Hoc Networks , 2006, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06).

[8]  Turgay Korkmaz,et al.  HEAP: A packet authentication scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[9]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[10]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[11]  Akshai Aggarwal,et al.  A key management and secure routing integrated framework for Mobile Ad-hoc Networks , 2013, Ad Hoc Networks.