Skip to main content
Log in

Secure way routing protocol for mobile ad hoc network

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile adhoc network is dynamic in nature and it operates completely in an infrastructure-less environment. It discovers the way routes dynamically to reach the destination. Securing a dynamic way route, which is not known before establishing communication, is always a challenge in the mobile ad hoc network. Most of the existing secure routing protocols target to evade specific type of attacks or malicious behaviour of the nodes or networks. We propose a novel secure way routing protocol for securing the dynamic way routes in MANET. It provides a unique session key for each route to secure the data communication. Moreover, it authenticates the data packets using asymmetric cryptography and secures the routing field message using two-way asymmetric cryptography. The proposal is implemented and tested for assessing the protocol’s performance. We have also compared the protocol with the other secure routing protocols for evaluating its performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.

    Article  Google Scholar 

  2. He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  Google Scholar 

  3. Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.

    Article  Google Scholar 

  4. Zhou, L., Xiong, N., Shu, L., Vasilakos, A., & Yeo, S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.

    Article  Google Scholar 

  5. Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.

    Article  Google Scholar 

  6. Lacuesta, R., Lloret, J., Garcia, M., & Peñalver, L. (2013). A secure protocol for spontaneous wireless ad hoc networks creation. IEEE Transactions on Parallel and Distributed Systems, 24(4), 629–641.

    Article  Google Scholar 

  7. Mukesh, M., & Rishi, K. R. (2010). Security aspects in mobile ad hoc network (MANETs): Technical review. International Journal of Computer Applications, 12(2), 37–43.

    Article  Google Scholar 

  8. Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.

    Article  Google Scholar 

  9. Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4–18.

    Article  Google Scholar 

  10. Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.

    Article  Google Scholar 

  11. Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.

    Google Scholar 

  12. Zhou, L., Chao, H. C., & Vasilakos, A. V. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.

    Article  Google Scholar 

  13. Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.

    Article  Google Scholar 

  14. Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.

    Article  Google Scholar 

  15. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of things. Journal of Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  16. Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward Incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.

    Article  Google Scholar 

  17. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  18. Liu, J., Li, Y., Wang, H., Jin, D., Su, L., Zeng, L., & Vasilakos, T. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.

    Article  Google Scholar 

  19. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 488–502.

    Google Scholar 

  20. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11(1), 38–47.

    Article  Google Scholar 

  21. Busch, C., Kannan, R., & Vasilakos, A. V. (2012). Approximating congestion + dilation in networks via “quality of routing” games. IEEE Transactions on Computers, 61(9), 1270–1283.

    Article  MathSciNet  Google Scholar 

  22. Dvir, A., & Vasilakos, A. V. (2010). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 40(4), 405–406.

    Article  Google Scholar 

  23. Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  24. Yen, Y. S., Chao, H. C., Chang, R. S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.

    Article  Google Scholar 

  25. Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software-defined networking. Security and Communication Networks. doi:10.1002/sec.1243.

    Google Scholar 

  26. Khalil, I., & Bagchi, S. (2011). Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Transactions on Mobile Computing, 10(8), 1096–1112.

    Article  Google Scholar 

  27. Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). SecCloud: Bridging secure storage and computation in cloud. In Proceedings of the IEEE 30th international conference on distributed computing systems workshops (ICDCSW), June 2010.

  28. Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. M. (2012). a survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  29. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In Proceedings of the IEEE INFOCOM, March 2012.

  30. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.

    Article  Google Scholar 

  31. Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.

    Article  Google Scholar 

  32. Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.

    Article  Google Scholar 

  33. Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, 99, 1.

    Google Scholar 

  34. Perkins, C. E., Royer, E. M., & Das, S. R. (2003). Ad hoc on-demand distance vector (AODV) routing. IETF Internet draft, MANET working group, February 2003.

  35. Johnson, D. B., Maltz, D. A., & Hu, Y. C. (2004). The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF Internet draft, MANET working group, July 2004.

  36. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Royer, E. M. (2002). A secure routing protocol for ad hoc networks (pdf). Technical Report: UM-CS-2002-032, 2002.

  37. Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security, September 2002.

  38. Pirzada, A., & McDonald, C. (2005). Secure routing with the AODV protocol. In Proceedings of the Asia-Pacific conference on communications, October 2005.

  39. Yu, W., Sun, Y., & Liu, K. J. R. (2005). HADOF: Defense against routing disruption in mobile ad hoc networks. In Proceedings of the 24th annual joint conference of the IEEE computer and communications societies (INFOCOM 2005), March 2005.

  40. Yu, W., Sun, Y., & Liu, K. J. R. (2005). Stimulating cooperation and defending against attacks in self-organized mobile ad hoc networks. In Proceedings of the second annual IEEE communications society conference on sensor and ad hoc communications and networks (SECON’05), September 2005.

  41. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2006). LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks. Ad Hoc Networks, 4(5), 567–585.

    Article  Google Scholar 

  42. Yan, J., Ma, J., Li, F., & Moon, S. J. (2010). Key pre-distribution scheme with node revocation for wireless sensor networks. Ad Hoc and Sensor Wireless Networks, 10(2/3), 235–251.

    Google Scholar 

  43. Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2005). Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications, 23(3), 598–610.

    Article  Google Scholar 

  44. Luo, H., Zerfos, P., Kong, J., Lu, S., & Zhang, L. (2002). Self-securing ad hoc wireless networks. In Proceedings of the seventh international symposium on computers and communications (ISCC 2002), July 2002.

  45. Abedi, O., & Fathy, M. (2008). Enhancing AODV routing protocol using mobility parameters in VANET. In Proceedings of the IEEE/ACS international conference on computer systems and applications (AICCSA 2008), March/April 2008.

  46. Papadimitratos, P., & Haas, Z. (2002). Secure routing for mobile ad hoc networks. In Proceedings of the SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), January 2002.

  47. Asokan, N., & Ginzboorg, P. (2000). Key agreement in ad-hoc networks. Computer Communication Review, 23, 1627–1637.

    Article  Google Scholar 

  48. Kong, J., Zerfos, P., Luo, H., Lu, S., & L. Zhang. (2001). Providing robust and ubiquitous security support for wireless mobile networks. In Proceedings of ninth international conference on network protocols, November 2001.

  49. Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11/12), 2314–2341.

    Article  Google Scholar 

  50. Sahadevaiah, K., & Prasad Reddy, P. V. G. D. (2011). Impact of security attacks on a new security protocol for mobile ad hoc networks. Network Protocols and Algorithms, 3(4), 122–140.

    Article  Google Scholar 

  51. Zeng, X., Bagrodia, R., & Gerla, M. (1998). GloMoSim: A library for parallel simulation of large-scale wireless networks. In Proceedings of twelfth workshop on parallel and distributed simulation, May 1998.

  52. Kumar, V., & Das, M. L. (2008). Securing wireless sensor networks with public key techniques. Ad Hoc and Sensor Wireless Networks, 5(3/4), 189–201.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jarupula Rajeshwar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajeshwar, J., Narsimha, G. Secure way routing protocol for mobile ad hoc network. Wireless Netw 23, 345–354 (2017). https://doi.org/10.1007/s11276-015-1161-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1161-3

Keywords

Navigation