Abstract
We are here to introduce the different approach that prevents security threat in MANET routing protocol. In recent year, secure routing protocol has been extensively studied. A mobile ad hoc network (MANET) is an infrastructure-less network where each node acts as an administrator for establishing end-to-end connection and a host for the source or destination. Security in MANET routing protocol is a mechanism to transfer data packet safely. Mostly, the routing protocols are based on cryptography scheme, security association, key distribution, authentication, and so on. The security research area is still open as many of the provided solutions are designed keeping a limited size scenario and limited kind of attacks and vulnerabilities. MANET is the future network because it is practically versatile, easy to use, inexpensive and can instantly update and reconfigure itself. In this paper, we have highlighted some of the typical vulnerabilities that are caused by characteristics of mobile ad hoc networks such as dynamic topology, limited resources (e.g., bandwidth, power), and lack of central management’s points.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhou, L., Haas, Z.J.: Secure ad hoc routing. IEEE 13, 22–30 (1999)
Perkins, C.E.: Ad hoc Networking. Addison-Wesley, Boston (2001)
Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Comm. 23(3), (2005)
Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing, pp. 90–100 (1999)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings ICNP 2002, pp. 78–87. Paris, France, 12–15 Nov 2002
Johnson, D.B., Maltz, D.A., Broch, J.: The dynamic source routing protocol for multi-hop wireless ad hoc networks
Kim, H.S., Kang, B.S., Pack, S., Kang, C.H.: Route Investigation for Secure Routing in Mobile Ad-hoc Networks, pp. 163–168 (2007)
HuBaux, J-.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings MobiHoc, pp. 146–155 (2001)
Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2(1), 52–64 (2003)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security and support for wireless mobile networks. In: Proceedings ICNP, pp. 251–260 (2001)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad hoc networks). In: Proceedings MobiCom, pp. 226–236 (2002)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: Proceedings MobiCom, pp. 255–265 (2000)
Just, M., Kranakis, E., Wan, T.: Resisting malicious packet dropping in wireless ad hoc networks. In: Proceedings Ad hoc Now, pp. 151–163 (2003)
Buttyan, L., Hubaux, J.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings MobiHoc, pp. 87–96 (2000)
Sundaramurthy, S., Belding-Royer, E.: The ADMIX protocol for encouraging participation in mobile ad hoc networks. In: Proceedings IEEE ICNP, pp. 156–167 (2003)
Hu, Y., Perrig, A., Johnson, D.: ARIADNE: A secure on-demand routing protocol for ad hoc networks. In: Proceedings MobiCom, pp. 12–23 (2002)
Papadimitratos, P., Haas, Z.J., Samar, P.: The secure routing protocol (SRP) for ad hoc networks draft-papadimitratos-secure –routing–protocol–00.txt, (2002)
Mehuron, W.: Digital signature standard (DSS) U.S. department of commerce, national institute of standards and technology (NIST), information technology laboratory (ITL). FIPS PEB 186 (1994)
Kumar, J., Kulkarni, M., Gupta, D.: Secure routing protocols in ad hoc network: a review. Special Issue of IJCCT for International Conference (ICCT-2010), vol. 2(2), pp. 3–4, 3–5 Dec 2010
Papadimitratos, P., Haas, Z.: Secure link state routing for mobile ad-hoc networks. In: Proceedings of Symposium on Applications and the Internet Workshops (SAINT’03), pp. 379–383 (2003)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Cambridge (1996)
Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks. IFIP-Communication and Multimedia Security Conference (2002)
Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad-hoc networks. IEEE J. Sel. Areas Commun. 24(2), 261–273 (2006)
Gonzalez, O.F., Ansa, Godwin, Howorth, M., Pavlou, G.: Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks. J. Int. Eng. 2, 1 (2008)
Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. IJCSI Int. J. Comput. Sci. Issues 2, 54–59 (2009)
Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: Proceedings of ACM MOBIHOC, pp. 299–302 (2001)
Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Proceedings of Radio and Wireless Conference, RAWCON apos; 03, vol. 10(13), pp. 75–78 (2003)
Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM (2002)
Khurana, S., Gupta, N., Aneja, N.: Minimum exposed path to the attack (MEPA) in mobile ad-hoc network (MANET). 6th International Conference on Networking (ICN’07), p. 16 (2007)
Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV against wormhole attacks in emergency MANET multimedia communications. Mobimedia’09. London, UK, 7–9 Sept 2009
Capkun, S., Buttyan, L., Hubaux, J.: Sector: secure tracking of node encounters in multihop wireless networks. Proceedings of the ACM Workshop on Security of Ad-hoc and Sensor Networks (2003)
Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: Proceedings of the ACM Workshop on Wireless Security (Wise’04), pp. 51–60 (2004)
Choi, S., Kim, D.Y., Lee, D., Jung, J.: WAP: wormhole attack prevention algorithm in mobile ad-hoc networks. In: Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 0, pp. 343–348. ISBN = 978-0- 7695-3158-8, (2008)
Song, N., Qian, L., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (2005)
Ming, Yu., Zhou, M., Su, W.: A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 58(1), 449–460 (2009)
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002)
Chang, J.M., Tsou, P.C., Chao, H.C., Chen, J.L.: Cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture, 978-1-4577-0787-2/11/$26.00, IEEE (2011)
Mamatha, G.S., Sharma, S.C.: A highly secured approach against attacks in MANETS, Int. J. Comput. Theor. Eng. 2(5), 1793–8201 (2010)
Santhosh Krishna, B.V., Vallikannu, A.L.: Detecting malicious nodes for secure routing in MANETS using reputation based mechanism. Int. J. Sci. Eng. Res. 1(3), 1SSN 2229-5518 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Chandrakar, A., Sarkar, R. (2014). Secure Routing Technique in MANET: A Review. In: Mohapatra, D.P., Patnaik, S. (eds) Intelligent Computing, Networking, and Informatics. Advances in Intelligent Systems and Computing, vol 243. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1665-0_135
Download citation
DOI: https://doi.org/10.1007/978-81-322-1665-0_135
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1664-3
Online ISBN: 978-81-322-1665-0
eBook Packages: EngineeringEngineering (R0)