Distributed secure routing protocol for Mobile Ad-Hoc Networks

Mobile Ad-Hoc Networks (MANETs) reputation is ever increasing rapidly. With the wide spread of MANET the need for securing routing protocols emerges as a very important issue, which is not easy to achieve in MANET. The concept and structure of MANETs make them prone to be easily attacked using several techniques often used against wired networks as well as new methods that have been particularly developed for MANETs. In this paper, we have focused, in particular, on the security issues related to Ad-Hoc routing protocols. A new protocol, based on Authenticated Routing for Ad-Hoc Networks (ARAN) Protocol and Zone Routing Protocol (ZRP) is proposed. The proposed Authenticated Routing for Ad-Hoc Networks with zoning (ARANz) introduces a distributive nature routing algorithm, which improves performance of routing protocol by dividing the area into zones. ARANz also saves network bandwidth and nodes memory by using reactive routing protocol instead of proactive one (ARAN). Furthermore, it increases network security by introducing local and global Certificate Authority servers.The performance of ARANz is compared to the two existing well known routing protocols: AODV and ARAN protocols. This comparison was done using GloMoSim simulator. The results show the superiority of our protocol in various aspects.

[1]  Issa M. Khalil,et al.  MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks , 2008, SecureComm.

[2]  Krupa A Talwar,et al.  A Survey: Routing Protocols in MANETs , 2014 .

[3]  David Lundberg,et al.  Ad hoc Protocol Evaluation and Experiences of Real World Ad Hoc Networking , 2002 .

[4]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[5]  Issa M. Khalil,et al.  Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks , 2007, Ad Hoc Networks.

[6]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Siddharth Sharma,et al.  An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks , 2010, ArXiv.

[10]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[11]  Yuguang Fang,et al.  A secure incentive protocol for mobile ad hoc networks , 2007, Wirel. Networks.

[12]  Li Xu,et al.  Secure and Anonymous Source Routing Protocol for Wireless Ad Hoc Networks , 2009 .

[13]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[14]  J. J. Garcia-Luna-Aceves,et al.  An end-to-end approach to secure routing in MANETs , 2010, Secur. Commun. Networks.

[15]  Issa M. Khalil,et al.  Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping , 2009, Ad Hoc Networks.

[16]  Christos Douligeris,et al.  Security for Ad Hoc Networks , 2010, Handbook of Information and Communication Security.

[17]  François Siewe,et al.  Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.