SDRP: Secure and dynamic routing protocol for mobile ad-hoc networks

RSA-based secure routing protocols are computationally expensive because of the use of large public keys and/or signatures that are disadvantageous for mobile ad-hoc networks. In this study, the authors proposed a secure dynamic routing protocol, named SDRP, which uses identity-based scheme with pairing on elliptic curve. It makes use of signature and `Message Authentication Code' algorithms to provide end-to-end, hop-to-hop and whole-route authentications. The proposed SDRP has several advantages over the existing RSA-based secure routing solutions. Firstly, it requires fewer signature generations and verifications on a route. Secondly, the SDRP makes use of an identity-based scheme which is certificate-less, thus saving routing overhead (RO) and storage. Finally, it uses a hardware address to generate its small size of public key. Both the qualitative analysis and the simulation results show that the proposed SDRP provides secure routes and better packet delivery fraction and with significantly less RO and latency compared with previous RSA-based secure routing protocols.

[1]  Jean-Marie Bonnin,et al.  HOTA: Handover optimized ticket-based authentication in network-based mobility management , 2013, Inf. Sci..

[2]  Paul F. Syverson The use of logic in the analysis of cryptographic protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[4]  Raja Datta,et al.  Identity based secure AODV and TCP for mobile ad hoc networks , 2011, ACWR '11.

[5]  Gene Tsudik,et al.  SRDP: securing route discovery in DSR , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[6]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[7]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[8]  Raja Datta,et al.  A secure dynamic IP configuration scheme for mobile ad hoc networks , 2011, Ad Hoc Networks.

[9]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[10]  Yih-Chun Hu,et al.  SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks , 2009, Secur. Commun. Networks.

[11]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[12]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[13]  A. Yasinsac,et al.  Identifying flaws in the secure routing protocol , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..

[14]  Raja Datta,et al.  A novel signature scheme to secure distributed dynamic address configuration protocol in mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[15]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[16]  Jonathan Katz,et al.  Aggregate Message Authentication Codes , 1995 .

[17]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..