Abstract
Autoconfiguration in mobile ad-hoc networks is a challenging mechanism in a potentially hostile environment. Autoconfiguration schemes are prone to various types of security threats that interfere or even paralyze the mechanism. In this paper an autoconfiguration scheme that overcomes the security threats has been proposed. The protocol uses a grid based hierarchical architecture to resolve the address duplication detection. Specialized agent nodes with high confidence score are dynamically selected for the duplication detection process. The selected agents use digital signatures for authentication and also a hashing scheme to check the tampered messages during communication. The proposed protocol has been simulated and compared with three other schemes. The results show that even with added security features the protocol has fairly good protocol overhead, address acquisition delay and packet losses when compared to the similar schemes. The analyses also conclude that protocol provides high security in unsafe environments.
Similar content being viewed by others
Notes
The scheme here uses the IPv4 addresses of 32bit length. The scheme can also use IPv6 addresses of 128bit length.
References
Weniger, K., & Zitterbart, M. (2002). IPv6 autoconfiguration in large scale mobile ad-hoc networks. European Wireless Proceedings, 1, 142–148.
Fan, Z., & Subramani, S. (2005). An address autoconfiguration protocol for IPv6 hosts in a mobile ad hoc network. Computer Communications, 28(4), 339–350.
Sonia, G. M., Amine, E., & Kamoun, F. (2010). Distributed address auto configuration protocol for Manet networks. Telecommunication Systems, 44(1-2), 39–48.
Weniger, K. (2005). PACMAN: Passive autoconfiguration for mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 23(3), 507–519.
Natalia, C. F., Marcelo, D., Donato, M., & Otto, C. M. (2013). An efficient and robust addressing protocol for node autoconfiguration in ad hoc networks. IEEE/ACM Transactions on Networking (TON), 21(3), 845–856.
Adjih, C., Boudjit, S., Jacquet, P., Laouiti, A., & Mühlethaler, P. (2005). An advanced configuration and duplicate address detection mechanism for a multi-interface OLSR Network. http://www-l2ti.univ-paris13.fr/~boudjit/Research/RR-INRIA/RR-5747.pdf. Accessed Sept 30, 2015.
Hussain, S. R., Saha, S., & Rahman, R. (2011). SAAMAN: Scalable address autoconfiguration in mobile ad hoc networks. Journal of Network and Systems Management, 19(3), 394–426.
Villalba, L. G., Matesanz, J. G., Sandoval Orozco, A. L., & Márquez Díaz, J. D. (2011). Distributed dynamic host configuration protocol (D2HCP). Sensors, 11(4), 4438–4461.
Villalba, L. G., Orozco, A. S., Matesanz, J. G., & Kim, T. H. (2014). E-D2HCP: Enhanced distributed dynamic host configuration protocol. Computing, 96(9), 777–791.
Grajzer, M., Żernicki, T., & Głąbowski, M. (2014). ND++—An extended IPv6 neighbor discovery protocol for enhanced stateless address autoconfiguration in MANETs. International Journal of Communication Systems, 27(10), 2269–2288.
Bouk, S. H., & Sasase, I. (2009). IPv6 autoconfiguration for hierarchical MANETs with efficient leader election algorithm. Journal of Communications and Networks, 11(3), 248–260.
Wang, X., & Qian, H. (2012). Hierarchical and low power IPv6 address configuration for wireless sensor networks. International Journal of Communication Systems, 25(12), 1513–1529.
Wang, X., & Qian, H. (2014). A tree-based address configuration for a MANET. Pervasive and Mobile Computing, 12, 123–137.
Reshmi, T. R., & Murugan, K. (2014). Filter-based address autoconfiguration protocol for duplicate address detection and recovery in MANETs. Computing, 97(3), 309–331.
Villanueva, M. J., Calafate, C. T., Torres, Á., Cano, J., Cano, J. C., & Manzoni, P. (2013). Seamless MANET autoconfiguration through enhanced 802.11 beaconing. Mobile Information Systems, 9(1), 19–35.
AlS’adeh, A., & Meinel, C. (2012). Secure neighbor discovery: Review, challenges, perspectives, and recommendations. IEEE Security and Privacy Magazine, 10(4), 26–34.
Zohra, S., Abdelmalek, A., Feham, M., & Taleb-Ahmed, A. (2011). Secure and robust IPv6 autoconfiguration protocol for mobile adhoc networks under strong adversarial model. International Journal of Computer Networks and Communications (IJCNC), 3(4), 1108–1334.
Wang, P., Reeves, D. S., & Ning, P. (2005). Secure address autoconfiguration for Mobile Ad Hoc Networks. In Proceedings of second annual international conference (MobiQuitous), IEEE, pp. 519–521.
Ghosh, U., & Datta, R. (2009). Adip: An improved authenticated dynamic ip configuration scheme for mobile ad hoc networks. International Journal of Ultra Wideband Communications and Systems, 2, 102–117.
Ghosh, U., & Datta, R. (2011). A secure dynamic IP configuration scheme for mobile adhoc networks. Ad Hoc Networks, 7, 1327–1342.
Ghosh, U., & Datta, R. (2012). An id based secure distributed dynamic ip configuration scheme for mobile ad hoc networks. In Distributed computing and networking, pp. 295–308.
Arkko, J., Kempf, J., Zill, B., & Nikander, P. (2005). Secure neighbor discovery (SEND), RFC 3971.
Conta, A., & Gupta, M. (2006). Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification. IETF RFC 4443, 1–24.
Aura, T. (2005). Cryptographically Generated Addresses (CGA). RFC 3972. Retrieved from http://tools.ietf.org/html/rfc3972.
Cheneau, T., Boudguiga, A., & Laurent, M. (2010). Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. Computers AND Security, 29(4), 419–431.
Kaur, K., & Seema, E. (2012). Hybrid algorithm with DSA, RSA and MD5 encryption algorithm for wireless devices. International Journal of Engineering Research and Applications, 5, 914–917.
Network Simulator: http://www.isi.edu/nsnam/ns.
Clausen, T., Dearlove, C., Dean, J., & Adjih, C. (2009). Generalized Mobile Ad Hoc Network (MANET) packet/message format. RFC 5444. Internet Engineering Task Force.
Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile Ad Hoc networks by dynamic learning method. International Journal of Network Security, 5(3), 338–346.
Eu, Z., & Seah, W. (2006). Mitigating route request flooding attacks in mobile Ad Hoc networks. In Proceedings of the international conference on information networking. Sendai, Japan, January 2006.
Perkins, C. E., Belding-Royer, E., & Das, S. (2005). Ad Hoc on demand distance vector (AODV) routing. IETF RFC, 3561, 2005.
IEEE Trial-Use standards. (2006). Wireless access in vehicular environment—Security services for application and management messages. IEEE, 1609, 2.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Reshmi, T.R., Murugan, K. Secure and Reliable Autoconfiguration Protocol (SRACP) for MANETs. Wireless Pers Commun 89, 1243–1264 (2016). https://doi.org/10.1007/s11277-016-3314-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3314-9