HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks

Mobile ad-hoc networks are wireless self-organized networks in which mobile nodes can connect directly to each other. This fact makes such networks highly susceptible to security risks and threats, as malicious nodes can easily disguise as new trusted nodes and start attacking the network after a certain period of time. Hence, the security of data transmission in MANET has been a hot topic in the past years. Several research works attempted to detect and stop various attacks on MANET nodes and packets. This paper presents an efficient mechanism for secure data dissemination in MANETs. Our approach is based on the identity based cryptography and Message Authentication Code (MAC). The proposed security mechanism prevents malicious nodes from tampering or replaying intermediate packets by means of signing and encrypting the packet at each intermediate trusted node. We tested the efficiency of our system using the ns2 simulator by comparing it to a similar security mechanism. The simulations illustrate that our approach obtains many advantages over other existing approaches for secure data dissemination in MANETs.

[1]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[2]  Gurpreet Singh Bhamra,et al.  Ant colony algorithms in MANETs: A review , 2012, J. Netw. Comput. Appl..

[3]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[4]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[5]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.

[6]  Davide Cerri,et al.  Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.

[7]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[8]  Christos Douligeris,et al.  Authentication in a layered security approach for mobile ad hoc networks , 2007, Comput. Secur..

[9]  Gaurav Sharma,et al.  A Reliable Tactic for Detecting Black Hole Attack in Vehicular Ad Hoc Networks , 2017 .

[10]  Huapeng Wu,et al.  A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[11]  Thorsten Holz,et al.  SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines , 2012, DIMVA.

[12]  Issa M. Khalil,et al.  CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks , 2012, Comput. Networks.

[13]  Wei Chen,et al.  A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks , 2007 .

[14]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[15]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[16]  Kwangjo Kim,et al.  Secure authenticated group key agreement protocol in the MANET environment , 2008, Inf. Secur. Tech. Rep..

[17]  N. Bhalaji,et al.  Dynamic Trust Based Method to Mitigate Greyhole Attack in Mobile Adhoc Networks , 2012 .

[18]  Hassan Artail,et al.  A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[19]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[20]  Gautam M. Borkar,et al.  A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks , 2017, Wirel. Networks.

[21]  Jung-Shian Li,et al.  Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks , 2006, Comput. Commun..

[22]  Sourav Mukhopadhyay,et al.  Computationally secure self-healing key distribution with revocation in wireless ad hoc networks , 2010, Ad Hoc Networks.

[23]  Dimitris Vergados,et al.  Layered security design for mobile ad hoc networks , 2006, Comput. Secur..

[24]  Gene Tsudik,et al.  SRDP: Secure route discovery for dynamic source routing in MANETs , 2009, Ad Hoc Networks.

[25]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[26]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[27]  Eleftheria Makri,et al.  Constant round group key agreement protocols: A comparative study , 2011, Comput. Secur..

[28]  Lazaros F. Merakos,et al.  A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms , 2006, Comput. Networks.

[29]  Panayiotis Kotzanikolaou,et al.  SecMR - a secure multipath routing protocol for ad hoc networks , 2007, Ad Hoc Networks.

[30]  Susanne Wetzel,et al.  Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.

[31]  Raja Datta,et al.  Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.

[32]  Abdelkamel Tari,et al.  Secure and reliable certificate chains recovery protocol for mobile ad hoc networks , 2016, J. Netw. Comput. Appl..

[33]  J. Eberspacher,et al.  Hop distances in homogeneous ad hoc networks , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..

[34]  K. M. S. Soyjaudah,et al.  Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security , 2009, Int. J. Netw. Secur..