SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks

Because of the absence of central control and limited capabilities of tiny nodes in mobile ad hoc networks MANETs, these types of networks are always vulnerable to different kind of threats. Threats can be active and passive. Many cryptographic techniques are suggested for securing MANETs from various threats. This paper introduces a new method using cluster heads with cryptographic keys, for each node, in cluster-based MANETs. Cluster heads are selected according to some definite criteria among the nodes in the clusters. Cluster heads keep the private keys for decryption while each member node is assigned a unique public key for encryption purpose. The approach is very flexible as it supports the nodes' migration to other clusters and transfer of control for one cluster head to another. Different scenarios are explained in the paper to tackle the security mechanism and nodes migration to other clusters. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Angad Singh,et al.  Cluster Based on Demand Routing Protocol for Mobile Ad Hoc Network , 2012 .

[2]  Pritee Parwekar,et al.  Security Issues and Its Counter Measures in Mobile Ad Hoc Networks , 2014 .

[3]  Yang Lu,et al.  Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic , 2007 .

[4]  R Sakthivel,et al.  A Grid Connected Flicker Compensation of DFIG for Power Quality Improvement by using ANN , 2015 .

[5]  Chenyang Lu,et al.  Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[6]  Jaime Lloret Mauri,et al.  Energy‐efficient multi‐level and distance‐aware clustering mechanism for WSNs , 2015, Int. J. Commun. Syst..

[7]  Zhihong Liu,et al.  Asymmetric Key Pre-distribution Scheme for sensor networks , 2009, IEEE Transactions on Wireless Communications.

[8]  J. Godwin Ponsam,et al.  A Survey on MANET Security Challenges, Attacks and its Countermeasures , 2014 .

[9]  Vikaram M. Agrawal,et al.  An Overview of security issues in Mobile Ad hoc Networks , 2015 .

[10]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[11]  Abdul Hanan Abdullah,et al.  Efficient Cluster Head Selection Algorithm for MANET , 2013, J. Comput. Networks Commun..

[12]  Pascal Lorenz,et al.  A Clustering-Based Scalable Key Management Protocol for Ad Hoc Networks , 2009, 2009 Second International Conference on Communication Theory, Reliability, and Quality of Service.

[13]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[14]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[15]  R. Dorf,et al.  The handbook of ad hoc wireless networks , 2003 .

[16]  Jianfeng Ma,et al.  Asymmetric Key Pre-distribution Scheme for sensor networks , 2009, IEEE Trans. Wirel. Commun..

[17]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[18]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[19]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[20]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[21]  Poonam Sinha,et al.  EFFICIENT TECHNIQUES FOR SAODV IN MOBILE ADHOC NETWORK , 2011 .

[22]  Ping Yu,et al.  Electronic Health Record , 2012, Encyclopedia of Gerontology and Population Aging.

[23]  R. Balasubramanian,et al.  Efficient Group Key Management Protocol for Region Based MANETs , 2011 .

[24]  Boon-Chong Seet,et al.  The Handbook of Ad Hoc Wireless Networks , 2002 .

[25]  Kapil Govil,et al.  Cluster head selection technique for optimization of energy conservation in MANET , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.

[26]  Moni Naor,et al.  Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.

[27]  Chun-Ta Li,et al.  Security of Wireless Sensor Networks: Current Status and Key Issues , 2010 .

[28]  Vivek Tiwari,et al.  Experimental Study of Fly-ash Brick Masonry Under Subjected to Cyclic Loading , 2014 .

[29]  Amjad Mehmood,et al.  SALMA: An Efficient State-Based Hybrid Routing Protocol for Mobile Nodes in Wireless Sensor Networks , 2016, Int. J. Distributed Sens. Networks.

[30]  Aldar C.-F. Chan,et al.  Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[31]  Chris McDonald,et al.  Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..