Implementation of a personal area network for secure routing in MANETs by using low-cost hardware

Presently, mobile ad hoc networks (MANETs) are being used extensively in the defense, private, domestic, etc. fields and each of these emulates a personal area network (PAN). A MANET does not require any infrastructure; moreover, it can behave as a mobile network. These features have boosted the popularity of MANETs in the community. As more and more fields become dependent on MANETs, the system needs to be more energy aware and low cost. To commercialize MANETs, the routing protocols need to be lightweight, secure, and energy efficient, and the hardware on which it is to be implemented should be low cost at the same time. In this paper, we have proposed a lightweight, energy aware, secure routing model for MANETs, which has been implemented on low-cost hardware. Our model uses fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that secure neighbor or not. It also uses packets like Report and Recommendation that help the protocol to detect and eliminate the malicious nodes from the network. To make the protocol energy aware we have formulated new battery thresholds, so that the battery can be monitored and losses can be minimized. To observe the results we implement this protocol in hardware, on the Arduino platform, which is a scalable, reliable, cheap, and open source. We observe that our protocol exhibits high packet delivery fraction, low normalize routing load, and low end to end delay, compared to existing secure routing protocols.

[1]  Gene Tsudik,et al.  ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2007, IEEE Transactions on Mobile Computing.

[2]  Ling Liu,et al.  RLM: A General Model for Trust Representation and Aggregation , 2012, IEEE Transactions on Services Computing.

[3]  M. Bansal,et al.  Mobile Ad hoc Networking ( MANET ) : Routing Protocol Performance Issues and Evaluation Considerations , 2010 .

[4]  Ratan K. Guha,et al.  Discovering Man-in-the-Middle Attacks in Authentication Protocols , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[5]  Himadri Nath Saha,et al.  Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network , 2011 .

[6]  Ming Gu,et al.  USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks , 2012, IEEE Transactions on Wireless Communications.

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  Andrea Passarella,et al.  Group Communication Applications for MANETs : Requirements and Real Implementations , 2006 .

[9]  Chung-wei Lee,et al.  Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.

[10]  Per Johansson,et al.  Wireless ad hoc networking—The art of networking without a network , 2000 .

[11]  C.K. Sarkar,et al.  Implementation of a Topology Control Algorithm for MANETs Using Nomadic Community Mobility Model , 2008, 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems.

[12]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[13]  S Sharmila,et al.  HARDWARE IMPLEMENTATION OF SECURE AODV FOR WIRELESS SENSOR NETWORKS , 2010 .

[14]  Brij B. Gupta,et al.  A Novel Solution to Handle DDOS Attack in MANET , 2013 .

[15]  Kannan Govindan,et al.  Rendezvous based trust propagation to enhance distributed network security , 2011, INFOCOM WKSHPS 2011.

[16]  Weihua Zhuang,et al.  Statistical QoS routing for IEEE 802.11 multihop ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[17]  Juan-Carlos Cano,et al.  Evaluating the energy-consumption reduction in a MANET by dynamically switching-off network interfaces , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.