Abstract
Mobile adhoc network is dynamic in nature and it operates completely in an infrastructure-less environment. It discovers the way routes dynamically to reach the destination. Securing a dynamic way route, which is not known before establishing communication, is always a challenge in the mobile ad hoc network. Most of the existing secure routing protocols target to evade specific type of attacks or malicious behaviour of the nodes or networks. We propose a novel secure way routing protocol for securing the dynamic way routes in MANET. It provides a unique session key for each route to secure the data communication. Moreover, it authenticates the data packets using asymmetric cryptography and secures the routing field message using two-way asymmetric cryptography. The proposal is implemented and tested for assessing the protocol’s performance. We have also compared the protocol with the other secure routing protocols for evaluating its performance.
Similar content being viewed by others
References
Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.
He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.
Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.
Zhou, L., Xiong, N., Shu, L., Vasilakos, A., & Yeo, S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.
Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.
Lacuesta, R., Lloret, J., Garcia, M., & Peñalver, L. (2013). A secure protocol for spontaneous wireless ad hoc networks creation. IEEE Transactions on Parallel and Distributed Systems, 24(4), 629–641.
Mukesh, M., & Rishi, K. R. (2010). Security aspects in mobile ad hoc network (MANETs): Technical review. International Journal of Computer Applications, 12(2), 37–43.
Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.
Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4–18.
Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.
Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.
Zhou, L., Chao, H. C., & Vasilakos, A. V. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.
Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.
Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.
Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of things. Journal of Network and Computer Applications, 42, 120–134.
Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward Incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: perspectives and challenges. Wireless Networks, 20(8), 2481–2501.
Liu, J., Li, Y., Wang, H., Jin, D., Su, L., Zeng, L., & Vasilakos, T. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.
Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 488–502.
Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11(1), 38–47.
Busch, C., Kannan, R., & Vasilakos, A. V. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.
Dvir, A., & Vasilakos, A. V. (2010). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 40(4), 405–406.
Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.
Yen, Y. S., Chao, H. C., Chang, R. S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.
Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks. doi:10.1002/sec.1243.
Khalil, I., & Bagchi, S. (2011). Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Transactions on Mobile Computing, 10(8), 1096–1112.
Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). SecCloud: Bridging secure storage and computation in cloud. In Proceedings of the IEEE 30th international conference on distributed computing systems workshops (ICDCSW), June 2010.
Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. M. (2012). a survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.
Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In Proceedings of the IEEE INFOCOM, March 2012.
Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.
Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.
Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.
Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, 99, 1.
Perkins, C. E., Royer, E. M., & Das, S. R. (2003). Ad hoc on-demand distance vector (AODV) routing. IETF Internet draft, MANET working group, February 2003.
Johnson, D. B., Maltz, D. A., & Hu, Y. C. (2004). The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF Internet draft, MANET working group, July 2004.
Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Royer, E. M. (2002). A secure routing protocol for ad hoc networks (pdf). Technical Report: UM-CS-2002-032, 2002.
Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security, September 2002.
Pirzada, A., & McDonald, C. (2005). Secure routing with the AODV protocol. In Proceedings of the Asia-Pacific conference on communications, October 2005.
Yu, W., Sun, Y., & Liu, K. J. R. (2005). HADOF: Defense against routing disruption in mobile ad hoc networks. In Proceedings of the 24th annual joint conference of the IEEE computer and communications societies (INFOCOM 2005), March 2005.
Yu, W., Sun, Y., & Liu, K. J. R. (2005). Stimulating cooperation and defending against attacks in self-organized mobile ad hoc networks. In Proceedings of the second annual IEEE communications society conference on sensor and ad hoc communications and networks (SECON’05), September 2005.
Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2006). LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks. Ad Hoc Networks, 4(5), 567–585.
Yan, J., Ma, J., Li, F., & Moon, S. J. (2010). Key pre-distribution scheme with node revocation for wireless sensor networks. Ad Hoc and Sensor Wireless Networks, 10(2/3), 235–251.
Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2005). Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications, 23(3), 598–610.
Luo, H., Zerfos, P., Kong, J., Lu, S., & Zhang, L. (2002). Self-securing ad hoc wireless networks. In Proceedings of the seventh international symposium on computers and communications (ISCC 2002), July 2002.
Abedi, O., & Fathy, M. (2008). Enhancing AODV routing protocol using mobility parameters in VANET. In Proceedings of the IEEE/ACS international conference on computer systems and applications (AICCSA 2008), March/April 2008.
Papadimitratos, P., & Haas, Z. (2002). Secure routing for mobile ad hoc networks. In Proceedings of the SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), January 2002.
Asokan, N., & Ginzboorg, P. (2000). Key agreement in ad-hoc networks. Computer Communication Review, 23, 1627–1637.
Kong, J., Zerfos, P., Luo, H., Lu, S., & L. Zhang. (2001). Providing robust and ubiquitous security support for wireless mobile networks. In Proceedings of ninth international conference on network protocols, November 2001.
Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11/12), 2314–2341.
Sahadevaiah, K., & Prasad Reddy, P. V. G. D. (2011). Impact of security attacks on a new security protocol for mobile ad hoc networks. Network Protocols and Algorithms, 3(4), 122–140.
Zeng, X., Bagrodia, R., & Gerla, M. (1998). GloMoSim: A library for parallel simulation of large-scale wireless networks. In Proceedings of twelfth workshop on parallel and distributed simulation, May 1998.
Kumar, V., & Das, M. L. (2008). Securing wireless sensor networks with public key techniques. Ad Hoc and Sensor Wireless Networks, 5(3/4), 189–201.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rajeshwar, J., Narsimha, G. Secure way routing protocol for mobile ad hoc network. Wireless Netw 23, 345–354 (2017). https://doi.org/10.1007/s11276-015-1161-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-015-1161-3