Skip to main content

Secure Routing Technique in MANET: A Review

  • Conference paper
Intelligent Computing, Networking, and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 243))

  • 1269 Accesses

Abstract

We are here to introduce the different approach that prevents security threat in MANET routing protocol. In recent year, secure routing protocol has been extensively studied. A mobile ad hoc network (MANET) is an infrastructure-less network where each node acts as an administrator for establishing end-to-end connection and a host for the source or destination. Security in MANET routing protocol is a mechanism to transfer data packet safely. Mostly, the routing protocols are based on cryptography scheme, security association, key distribution, authentication, and so on. The security research area is still open as many of the provided solutions are designed keeping a limited size scenario and limited kind of attacks and vulnerabilities. MANET is the future network because it is practically versatile, easy to use, inexpensive and can instantly update and reconfigure itself. In this paper, we have highlighted some of the typical vulnerabilities that are caused by characteristics of mobile ad hoc networks such as dynamic topology, limited resources (e.g., bandwidth, power), and lack of central management’s points.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhou, L., Haas, Z.J.: Secure ad hoc routing. IEEE 13, 22–30 (1999)

    Google Scholar 

  2. Perkins, C.E.: Ad hoc Networking. Addison-Wesley, Boston (2001)

    Google Scholar 

  3. http://www.krazytech.com/technical-papers/computer-science-technical-papers-technicalpapers/security-aspects-in-mobile-ad-hoc-network-manets

  4. Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Comm. 23(3), (2005)

    Google Scholar 

  5. Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing, pp. 90–100 (1999)

    Google Scholar 

  6. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings ICNP 2002, pp. 78–87. Paris, France, 12–15 Nov 2002

    Google Scholar 

  7. Johnson, D.B., Maltz, D.A., Broch, J.: The dynamic source routing protocol for multi-hop wireless ad hoc networks

    Google Scholar 

  8. Kim, H.S., Kang, B.S., Pack, S., Kang, C.H.: Route Investigation for Secure Routing in Mobile Ad-hoc Networks, pp. 163–168 (2007)

    Google Scholar 

  9. HuBaux, J-.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings MobiHoc, pp. 146–155 (2001)

    Google Scholar 

  10. Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2(1), 52–64 (2003)

    Google Scholar 

  11. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security and support for wireless mobile networks. In: Proceedings ICNP, pp. 251–260 (2001)

    Google Scholar 

  12. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Google Scholar 

  13. Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad hoc networks). In: Proceedings MobiCom, pp. 226–236 (2002)

    Google Scholar 

  14. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: Proceedings MobiCom, pp. 255–265 (2000)

    Google Scholar 

  15. Just, M., Kranakis, E., Wan, T.: Resisting malicious packet dropping in wireless ad hoc networks. In: Proceedings Ad hoc Now, pp. 151–163 (2003)

    Google Scholar 

  16. Buttyan, L., Hubaux, J.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings MobiHoc, pp. 87–96 (2000)

    Google Scholar 

  17. Sundaramurthy, S., Belding-Royer, E.: The ADMIX protocol for encouraging participation in mobile ad hoc networks. In: Proceedings IEEE ICNP, pp. 156–167 (2003)

    Google Scholar 

  18. Hu, Y., Perrig, A., Johnson, D.: ARIADNE: A secure on-demand routing protocol for ad hoc networks. In: Proceedings MobiCom, pp. 12–23 (2002)

    Google Scholar 

  19. Papadimitratos, P., Haas, Z.J., Samar, P.: The secure routing protocol (SRP) for ad hoc networks draft-papadimitratos-secure –routing–protocol–00.txt, (2002)

    Google Scholar 

  20. Mehuron, W.: Digital signature standard (DSS) U.S. department of commerce, national institute of standards and technology (NIST), information technology laboratory (ITL). FIPS PEB 186 (1994)

    Google Scholar 

  21. Kumar, J., Kulkarni, M., Gupta, D.: Secure routing protocols in ad hoc network: a review. Special Issue of IJCCT for International Conference (ICCT-2010), vol. 2(2), pp. 3–4, 3–5 Dec 2010

    Google Scholar 

  22. Papadimitratos, P., Haas, Z.: Secure link state routing for mobile ad-hoc networks. In: Proceedings of Symposium on Applications and the Internet Workshops (SAINT’03), pp. 379–383 (2003)

    Google Scholar 

  23. Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Cambridge (1996)

    Google Scholar 

  24. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks. IFIP-Communication and Multimedia Security Conference (2002)

    Google Scholar 

  25. Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad-hoc networks. IEEE J. Sel. Areas Commun. 24(2), 261–273 (2006)

    Article  Google Scholar 

  26. Gonzalez, O.F., Ansa, Godwin, Howorth, M., Pavlou, G.: Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks. J. Int. Eng. 2, 1 (2008)

    Google Scholar 

  27. Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. IJCSI Int. J. Comput. Sci. Issues 2, 54–59 (2009)

    Google Scholar 

  28. Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: Proceedings of ACM MOBIHOC, pp. 299–302 (2001)

    Google Scholar 

  29. Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Proceedings of Radio and Wireless Conference, RAWCON apos; 03, vol. 10(13), pp. 75–78 (2003)

    Google Scholar 

  30. Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM (2002)

    Google Scholar 

  31. Khurana, S., Gupta, N., Aneja, N.: Minimum exposed path to the attack (MEPA) in mobile ad-hoc network (MANET). 6th International Conference on Networking (ICN’07), p. 16 (2007)

    Google Scholar 

  32. Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV against wormhole attacks in emergency MANET multimedia communications. Mobimedia’09. London, UK, 7–9 Sept 2009

    Google Scholar 

  33. Capkun, S., Buttyan, L., Hubaux, J.: Sector: secure tracking of node encounters in multihop wireless networks. Proceedings of the ACM Workshop on Security of Ad-hoc and Sensor Networks (2003)

    Google Scholar 

  34. Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: Proceedings of the ACM Workshop on Wireless Security (Wise’04), pp. 51–60 (2004)

    Google Scholar 

  35. Choi, S., Kim, D.Y., Lee, D., Jung, J.: WAP: wormhole attack prevention algorithm in mobile ad-hoc networks. In: Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 0, pp. 343–348. ISBN = 978-0- 7695-3158-8, (2008)

    Google Scholar 

  36. Song, N., Qian, L., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (2005)

    Google Scholar 

  37. Ming, Yu., Zhou, M., Su, W.: A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 58(1), 449–460 (2009)

    Article  Google Scholar 

  38. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002)

    Google Scholar 

  39. Chang, J.M., Tsou, P.C., Chao, H.C., Chen, J.L.: Cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture, 978-1-4577-0787-2/11/$26.00, IEEE (2011)

    Google Scholar 

  40. Mamatha, G.S., Sharma, S.C.: A highly secured approach against attacks in MANETS, Int. J. Comput. Theor. Eng. 2(5), 1793–8201 (2010)

    Google Scholar 

  41. Santhosh Krishna, B.V., Vallikannu, A.L.: Detecting malicious nodes for secure routing in MANETS using reputation based mechanism. Int. J. Sci. Eng. Res. 1(3), 1SSN 2229-5518 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aartika Chandrakar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Chandrakar, A., Sarkar, R. (2014). Secure Routing Technique in MANET: A Review. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_135

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1665-0_135

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1664-3

  • Online ISBN: 978-81-322-1665-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics