Lightweight authentication-based scheme for AODV in ad-hoc networks

A mobile ad hoc network is a group of wireless mobile nodes with no infrastructure, in which individual mobile nodes are able to self organize and self configure in order to communicate within a direct wireless transmission range. However, the vulnerable nature of the mobile ad hoc networks (MANETs) makes them very prone to an adversary's malicious attacks such as dropping data or sending fake data etc. As the demand of MANETs is increasing day by day, the problem of security especially in the network layer must be solved appropriately and in accordance with the special characteristics of MANETs. In this paper, we present some attacks against routing in MANETs, and we focus on analyzing the working process of AODV routing protocol which is a representative protocol of on-demand routing protocols in ad-hoc. Then we propose an enhancement design to AODV based on authentication, using digital signatures, in order to prevent potential routing attacks against this protocol from intruders and malicious nodes. Finally, we compare the effectiveness of our improved protocol with some related secure routing protocols from literature, and against some well known attacks.

[1]  Jalel Ben-Othman,et al.  IBC‐HWMP: a novel secure identity‐based cryptography‐based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s , 2013, Concurr. Comput. Pract. Exp..

[2]  M. K. Jayanthi,et al.  Reliability Analysis of Link Stability in Secured Routing Protocols for MANETs , 2014 .

[3]  Abdellah Jamali,et al.  A review and a new approach to reduce routing overhead in MANETs , 2015, Wirel. Networks.

[4]  A. Amara Korba,et al.  Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.

[5]  Rituparna Chaki,et al.  IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network , 2007, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).

[6]  Rituparna Chaki,et al.  BHIDS: a new, cluster based algorithm for black hole IDS , 2010, Secur. Commun. Networks.

[7]  N. Kasiviswanath,et al.  Performance Analysis of Secure Routing Protocols in Mobile Ad-Hoc Networks , 2012 .

[8]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[9]  Wei Sat,et al.  Guidelines on Selecting Intrusion Detection Methods in MANET , 2004 .

[10]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[11]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[12]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[13]  Elisa Bertino,et al.  A Collaborative Reputation System Based on Credibility Propagation in WSNs , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).

[14]  Jalel Ben-Othman,et al.  On Securing HWMP Using IBC , 2011, 2011 IEEE International Conference on Communications (ICC).

[15]  Jalel Ben-Othman,et al.  Performance Comparison between IBC-HWMP and Hash-HWMP , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[16]  A. Rajaram,et al.  An Efficient Security Aware Routing Protocol for Mobile Ad Hoc Networks , 2015 .

[17]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[18]  Vishnu Sharma,et al.  Security issues in mobile adhoc network: A survey paper , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[19]  D. O'Mahony,et al.  Shared RSA key generation in a mobile ad hoc network , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[20]  Rituparna Chaki Intrusion detection: Ad-hoc networks to ambient intelligence framework , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).

[21]  S. Sumathy,et al.  Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks , 2010, ArXiv.