QASEC: A secured data communication scheme for mobile Ad-hoc networks

Abstract Mobile Adhoc NETworks (MANETs) are valuable for various applications due to an efficient, flexible, low-cost and dynamic infrastructure. In these networks, proper utilization of network resources is desirable to maintain Quality of Service (QoS). In multi-hop end-to-end communication, intermediate nodes may eavesdrop on data in transit. As a result, a secured and reliable data delivery from source to destination is required. In this paper, we propose a novel scheme, known as QASEC, to achieve better throughput by securing end-to-end communication in MANETs. The QoS is maintained through an optimal link selection from a queue of available transmission links. The end-to-end communication is secured by authentication. A simple secret-key based symmetric encryption is deployed for interacting nodes. Our proposed QASEC scheme prevents the malicious nodes from data exchange with legitimate intermediate nodes on any established path between the source and the destination. Experimental results show that QASEC performs better in terms of packet-loss rate, jitter and end-to-end delay. Furthermore, QASEC is efficient against various attacks and has a much better performance in terms of associated costs, such as key generation, encryption, and storage and communication.

[1]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[2]  Martin Mauve,et al.  A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..

[3]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[4]  Yue Zhang,et al.  Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.

[5]  Isaac Woungang,et al.  Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.

[6]  Mohammed Gharib,et al.  Fully distributed ECC-based key management for mobile ad hoc networks , 2017, Comput. Networks.

[7]  Turgay Korkmaz,et al.  EMLTrust: An enhanced Machine Learning based Reputation System for MANETs , 2012, Ad Hoc Networks.

[8]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[9]  Shervin Erfani,et al.  Survey of multipath routing protocols for mobile ad hoc networks , 2009, J. Netw. Comput. Appl..

[10]  Francesco Scarcello,et al.  A New Distributed Application and Network Layer Protocol for VoIP in Mobile Ad Hoc Networks , 2014, IEEE Transactions on Mobile Computing.

[11]  Asaf Shabtai,et al.  Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes , 2016, IEEE Transactions on Mobile Computing.

[12]  Gen-Huey Chen,et al.  Bandwidth-Satisfied Multicast by Multiple Trees and Network Coding in Lossy MANETs , 2017, IEEE Systems Journal.

[13]  Pau Arce,et al.  Performance Evaluation of Scalable Video Streaming in Mobile Ad hoc Networks , 2016, IEEE Latin America Transactions.

[14]  Ali Moussaoui,et al.  A survey of routing protocols based on link-stability in mobile ad hoc networks , 2015, J. Netw. Comput. Appl..

[15]  Soumyadev Maity,et al.  Self-organized public key management in MANETs with enhanced security and without certificate-chains , 2014, Comput. Networks.

[16]  Li Li,et al.  Traffic-Load-Adaptive Medium Access Control for Fully Connected Mobile Ad Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.

[17]  Asaf Shabtai,et al.  Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks , 2017, IEEE Transactions on Mobile Computing.

[18]  Apollinaire Nadembega,et al.  An Integrated Predictive Mobile-Oriented Bandwidth-Reservation Framework to Support Mobile Multimedia Streaming , 2014, IEEE Transactions on Wireless Communications.

[19]  Rui Zhang,et al.  Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks , 2015, IEEE Transactions on Wireless Communications.

[20]  R. R. Manthalkar,et al.  QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network , 2016, Comput. Networks.

[21]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.

[22]  Mario Kolberg,et al.  Structured Peer-to-Peer overlay deployment on MANET: A survey , 2016, Comput. Networks.

[23]  Gyanappa A. Walikar,et al.  A survey on hybrid routing mechanisms in mobile ad hoc networks , 2017, J. Netw. Comput. Appl..