Skip to main content
Log in

Secure and Reliable Autoconfiguration Protocol (SRACP) for MANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Autoconfiguration in mobile ad-hoc networks is a challenging mechanism in a potentially hostile environment. Autoconfiguration schemes are prone to various types of security threats that interfere or even paralyze the mechanism. In this paper an autoconfiguration scheme that overcomes the security threats has been proposed. The protocol uses a grid based hierarchical architecture to resolve the address duplication detection. Specialized agent nodes with high confidence score are dynamically selected for the duplication detection process. The selected agents use digital signatures for authentication and also a hashing scheme to check the tampered messages during communication. The proposed protocol has been simulated and compared with three other schemes. The results show that even with added security features the protocol has fairly good protocol overhead, address acquisition delay and packet losses when compared to the similar schemes. The analyses also conclude that protocol provides high security in unsafe environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Notes

  1. The scheme here uses the IPv4 addresses of 32bit length. The scheme can also use IPv6 addresses of 128bit length.

References

  1. Weniger, K., & Zitterbart, M. (2002). IPv6 autoconfiguration in large scale mobile ad-hoc networks. European Wireless Proceedings, 1, 142–148.

    Google Scholar 

  2. Fan, Z., & Subramani, S. (2005). An address autoconfiguration protocol for IPv6 hosts in a mobile ad hoc network. Computer Communications, 28(4), 339–350.

    Article  Google Scholar 

  3. Sonia, G. M., Amine, E., & Kamoun, F. (2010). Distributed address auto configuration protocol for Manet networks. Telecommunication Systems, 44(1-2), 39–48.

    Article  Google Scholar 

  4. Weniger, K. (2005). PACMAN: Passive autoconfiguration for mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 23(3), 507–519.

    Article  Google Scholar 

  5. Natalia, C. F., Marcelo, D., Donato, M., & Otto, C. M. (2013). An efficient and robust addressing protocol for node autoconfiguration in ad hoc networks. IEEE/ACM Transactions on Networking (TON), 21(3), 845–856.

    Article  Google Scholar 

  6. Adjih, C., Boudjit, S., Jacquet, P., Laouiti, A., & Mühlethaler, P. (2005). An advanced configuration and duplicate address detection mechanism for a multi-interface OLSR Network. http://www-l2ti.univ-paris13.fr/~boudjit/Research/RR-INRIA/RR-5747.pdf. Accessed Sept 30, 2015.

  7. Hussain, S. R., Saha, S., & Rahman, R. (2011). SAAMAN: Scalable address autoconfiguration in mobile ad hoc networks. Journal of Network and Systems Management, 19(3), 394–426.

    Article  Google Scholar 

  8. Villalba, L. G., Matesanz, J. G., Sandoval Orozco, A. L., & Márquez Díaz, J. D. (2011). Distributed dynamic host configuration protocol (D2HCP). Sensors, 11(4), 4438–4461.

    Article  Google Scholar 

  9. Villalba, L. G., Orozco, A. S., Matesanz, J. G., & Kim, T. H. (2014). E-D2HCP: Enhanced distributed dynamic host configuration protocol. Computing, 96(9), 777–791.

    Article  Google Scholar 

  10. Grajzer, M., Żernicki, T., & Głąbowski, M. (2014). ND++—An extended IPv6 neighbor discovery protocol for enhanced stateless address autoconfiguration in MANETs. International Journal of Communication Systems, 27(10), 2269–2288.

    Article  Google Scholar 

  11. Bouk, S. H., & Sasase, I. (2009). IPv6 autoconfiguration for hierarchical MANETs with efficient leader election algorithm. Journal of Communications and Networks, 11(3), 248–260.

    Article  Google Scholar 

  12. Wang, X., & Qian, H. (2012). Hierarchical and low power IPv6 address configuration for wireless sensor networks. International Journal of Communication Systems, 25(12), 1513–1529.

    Article  Google Scholar 

  13. Wang, X., & Qian, H. (2014). A tree-based address configuration for a MANET. Pervasive and Mobile Computing, 12, 123–137.

    Article  Google Scholar 

  14. Reshmi, T. R., & Murugan, K. (2014). Filter-based address autoconfiguration protocol for duplicate address detection and recovery in MANETs. Computing, 97(3), 309–331.

    Article  MathSciNet  MATH  Google Scholar 

  15. Villanueva, M. J., Calafate, C. T., Torres, Á., Cano, J., Cano, J. C., & Manzoni, P. (2013). Seamless MANET autoconfiguration through enhanced 802.11 beaconing. Mobile Information Systems, 9(1), 19–35.

    Article  Google Scholar 

  16. AlS’adeh, A., & Meinel, C. (2012). Secure neighbor discovery: Review, challenges, perspectives, and recommendations. IEEE Security and Privacy Magazine, 10(4), 26–34.

    Article  Google Scholar 

  17. Zohra, S., Abdelmalek, A., Feham, M., & Taleb-Ahmed, A. (2011). Secure and robust IPv6 autoconfiguration protocol for mobile adhoc networks under strong adversarial model. International Journal of Computer Networks and Communications (IJCNC), 3(4), 1108–1334.

    Google Scholar 

  18. Wang, P., Reeves, D. S., & Ning, P. (2005). Secure address autoconfiguration for Mobile Ad Hoc Networks. In Proceedings of second annual international conference (MobiQuitous), IEEE, pp. 519–521.

  19. Ghosh, U., & Datta, R. (2009). Adip: An improved authenticated dynamic ip configuration scheme for mobile ad hoc networks. International Journal of Ultra Wideband Communications and Systems, 2, 102–117.

    Article  Google Scholar 

  20. Ghosh, U., & Datta, R. (2011). A secure dynamic IP configuration scheme for mobile adhoc networks. Ad Hoc Networks, 7, 1327–1342.

    Article  Google Scholar 

  21. Ghosh, U., & Datta, R. (2012). An id based secure distributed dynamic ip configuration scheme for mobile ad hoc networks. In Distributed computing and networking, pp. 295–308.

  22. Arkko, J., Kempf, J., Zill, B., & Nikander, P. (2005). Secure neighbor discovery (SEND), RFC 3971.

  23. Conta, A., & Gupta, M. (2006). Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. IETF RFC 4443, 1–24.

  24. Aura, T. (2005). Cryptographically Generated Addresses (CGA). RFC 3972. Retrieved from http://tools.ietf.org/html/rfc3972.

  25. Cheneau, T., Boudguiga, A., & Laurent, M. (2010). Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Computers AND Security, 29(4), 419–431.

    Article  Google Scholar 

  26. Kaur, K., & Seema, E. (2012). Hybrid algorithm with DSA, RSA and MD5 encryption algorithm for wireless devices. International Journal of Engineering Research and Applications, 5, 914–917.

    Google Scholar 

  27. Network Simulator: http://www.isi.edu/nsnam/ns.

  28. Clausen, T., Dearlove, C., Dean, J., & Adjih, C. (2009). Generalized Mobile Ad Hoc Network (MANET) packet/message format. RFC 5444. Internet Engineering Task Force.

  29. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile Ad Hoc networks by dynamic learning method. International Journal of Network Security, 5(3), 338–346.

    Google Scholar 

  30. Eu, Z., & Seah, W. (2006). Mitigating route request flooding attacks in mobile Ad Hoc networks. In Proceedings of the international conference on information networking. Sendai, Japan, January 2006.

  31. Perkins, C. E., Belding-Royer, E., & Das, S. (2005). Ad Hoc on demand distance vector (AODV) routing. IETF RFC, 3561, 2005.

    Google Scholar 

  32. IEEE Trial-Use standards. (2006). Wireless access in vehicular environment—Security services for application and management messages. IEEE, 1609, 2.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. R. Reshmi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Reshmi, T.R., Murugan, K. Secure and Reliable Autoconfiguration Protocol (SRACP) for MANETs. Wireless Pers Commun 89, 1243–1264 (2016). https://doi.org/10.1007/s11277-016-3314-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3314-9

Keywords

Navigation