Secure Routing Techniques for MANETs

— In this paper we present a survey of various existing secure routing protocols for mobile ad hoc networks (MANETs). A mobile ad-hoc network is a self-configuring network of mobile nodes, connected by wireless links, which act as routers and are free to move randomly and organize themselves arbitrarily. These types of networks operate in the absence of any fixed infrastructure which makes them easy to deploy but it becomes difficult to make use of the existing routing techniques for network services. In order to facilitate communication within the network, a Routing Protocol (RP) is used to discover routes between nodes. The primary goal of such an ad-hoc network RP is correct and efficient route establishment between a pair of nodes so that messages may be delivered in time. The wireless and distributed nature of MANETs poses security a great challenge to system designers. This paper contains two main sections: first section presents a short literature study on various types of security attacks and routing security schemes that have been proposed to prevent and/or detect these attacks and second gives a state-or-the-art review of the existing secure Routing Protocols designed for MANETs with a comparison for typical representatives.

[1]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[2]  Zygmunt J. Haas,et al.  The performance of query control schemes for the zone routing protocol , 1998, SIGCOMM '98.

[3]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[4]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[5]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[6]  Zygmunt J. Haas,et al.  The performance of query control schemes for the zone routing protocol , 2001, TNET.

[7]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[8]  Shyhtsun Felix Wu,et al.  Secure Routing Protocols: Theory and Practice* , 2001 .

[9]  Farhat Anwar,et al.  Quality of Service (QoS) Ad-Hoc On-demand Distance Vector (AODV) , 2011 .

[10]  Chris McDonald,et al.  Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks , 2005 .

[11]  Janne Lundberg Routing Security in Ad Hoc Networks , 2000 .

[12]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[13]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[14]  Markus Jakobsson,et al.  Stealth attacks on ad-hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[15]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[16]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[17]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[18]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[19]  Huaizhi Li,et al.  Secure Routing in Wired Networks and Wireless Ad Hoc Networks , 2002 .