Skip to main content
Log in

Load Based Key Generation for MANETs: A Comparative Study with DSR and AODV

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Automatic key establishment schemes are the root of secure communication in Mobile adhoc networks(MANETs). These schemes are not universal, their performance depends on many factors like routing protocols, type of attackers aimed at, the parameter used for key generation, etc. Among the routing protocols used in MANETs the most popular ones are reactive routing protocols DSR and AODV. In this paper, an efficient secret key establishment technique using traffic matrix is simulated in the two reactive routing protocol scenarios: DSR (Dynamic Source Routing) and AODV (Ad hoc On-demand Distance Vector routing). The simulation results are compared and analyzed in terms of the key generation complexity, packet loss ratio and active attacker detection. Finally the paper concludes the fact that traffic load based key generation scheme is preferable for reactive routing protocol based systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Sarangapani, J. (2017). Wireless ad hoc and sensor networks: protocols, performance, and control. Boca Raton: CRC Press.

    Book  Google Scholar 

  2. Shibu, K. R., & Pramila, R. S. (2019). Random bit extraction for secret key generation in MANETs. Wireless Personal Communications, 107, 1–15.

    Article  Google Scholar 

  3. Nayyar, A., & Mahapatra, B. (2020). Effective Classification and handling of incoming data packets in mobile Ad Hoc networks (MANETs) using random forest ensemble technique (RF/ET). In Data Management, Analytics and Innovation (pp. 431–444). Springer, Singapore.

  4. Darabkh, K. A., & Judeh, M. S. (2018). An improved reactive routing protocol over mobile Ad hoc networks. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 707–711). IEEE.

  5. Shivahare, B. D., Wahi, C., & Shivhare, S. (2012). Comparison of proactive and reactive routing protocols in mobile adhoc network using routing protocol property. International Journal of Emerging Technology and Advanced Engineering, 2(3), 356–359.

    Google Scholar 

  6. Baby, B., & Pramila, R. S. (2018). Survey on analysis of energy optimization in MANET routing. International Journal of Engineering & Technology, 7(3), 1951–1955.

    Article  Google Scholar 

  7. Usman, M., Jan, M. A., He, X., & Nanda, P. (2018). QASEC: A secured data communication scheme for mobile Ad hoc networks. Future Generation Computer Systems, 109, 604–610.

    Article  Google Scholar 

  8. Balaji, N. A., Sukumar, R., & Parvathy, M. (2019). Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network. Computers & Electrical Engineering, 76, 94–110.

    Article  Google Scholar 

  9. Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484–2556.

    Article  Google Scholar 

  10. Shibu, K. R., & SujiPramila, R. (2018). Routing protocol based key management schemes in manet: a survey. International Journal of Engineering & Technology, 7(3), 1453–1456.

    Article  Google Scholar 

  11. Hegland, A. M., Winjum, E., Mjolsnes, S. F., Rong, C., Kure, O., & Spilling, P. (2006). A survey of key management in ad hoc networks. IEEE Communications Surveys & Tutorials, 8(3), 48–66.

    Article  Google Scholar 

  12. Kang, N., Shakshuki, E. M., & Sheltami, T. R. (2010). Detecting misbehaving nodes in MANETs. In Proceedings of the 12th international conference on information integration and web-based applications & services (pp. 216–222). ACM.

  13. Shrivastava, L., Bhadauria, S. S., & Tomar, G. S. (2011). Performance evaluation of routing protocols in MANET with different traffic loads. In 2011 International conference on communication systems and network technologies (pp. 13–16). IEEE.

  14. Liang, Y., Poor, H. V., & Ying, L. (2011). Secrecy throughput of MANETs under passive and active attacks. IEEE Transactions on Information Theory, 57(10), 6692–6702.

    Article  MathSciNet  Google Scholar 

  15. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security, 5(3), 338–346.

    Google Scholar 

  16. Najafi, G., & Gudakahriz, S. J. (2018). A stable routing protocol based on DSR protocol for mobile Ad Hoc networks. Int. J. Wirel. Microw. Technol. (IJWMT), 8(3), 14–22.

    Article  Google Scholar 

  17. Jamal, T., & Butt, S. A. (2019). Malicious node analysis in MANETS. International Journal of Information Technology, 11(4), 859–867.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. R. Shibu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shibu, K.R., Suji Pramila, R. Load Based Key Generation for MANETs: A Comparative Study with DSR and AODV. Wireless Pers Commun 116, 1703–1712 (2021). https://doi.org/10.1007/s11277-020-07757-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07757-6

Keywords

Navigation