Abstract
Automatic key establishment schemes are the root of secure communication in Mobile adhoc networks(MANETs). These schemes are not universal, their performance depends on many factors like routing protocols, type of attackers aimed at, the parameter used for key generation, etc. Among the routing protocols used in MANETs the most popular ones are reactive routing protocols DSR and AODV. In this paper, an efficient secret key establishment technique using traffic matrix is simulated in the two reactive routing protocol scenarios: DSR (Dynamic Source Routing) and AODV (Ad hoc On-demand Distance Vector routing). The simulation results are compared and analyzed in terms of the key generation complexity, packet loss ratio and active attacker detection. Finally the paper concludes the fact that traffic load based key generation scheme is preferable for reactive routing protocol based systems.
Similar content being viewed by others
References
Sarangapani, J. (2017). Wireless ad hoc and sensor networks: protocols, performance, and control. Boca Raton: CRC Press.
Shibu, K. R., & Pramila, R. S. (2019). Random bit extraction for secret key generation in MANETs. Wireless Personal Communications, 107, 1–15.
Nayyar, A., & Mahapatra, B. (2020). Effective Classification and handling of incoming data packets in mobile Ad Hoc networks (MANETs) using random forest ensemble technique (RF/ET). In Data Management, Analytics and Innovation (pp. 431–444). Springer, Singapore.
Darabkh, K. A., & Judeh, M. S. (2018). An improved reactive routing protocol over mobile Ad hoc networks. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 707–711). IEEE.
Shivahare, B. D., Wahi, C., & Shivhare, S. (2012). Comparison of proactive and reactive routing protocols in mobile adhoc network using routing protocol property. International Journal of Emerging Technology and Advanced Engineering, 2(3), 356–359.
Baby, B., & Pramila, R. S. (2018). Survey on analysis of energy optimization in MANET routing. International Journal of Engineering & Technology, 7(3), 1951–1955.
Usman, M., Jan, M. A., He, X., & Nanda, P. (2018). QASEC: A secured data communication scheme for mobile Ad hoc networks. Future Generation Computer Systems, 109, 604–610.
Balaji, N. A., Sukumar, R., & Parvathy, M. (2019). Enhanced dual authentication and key management scheme for data authentication in vehicular ad hoc network. Computers & Electrical Engineering, 76, 94–110.
Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484–2556.
Shibu, K. R., & SujiPramila, R. (2018). Routing protocol based key management schemes in manet: a survey. International Journal of Engineering & Technology, 7(3), 1453–1456.
Hegland, A. M., Winjum, E., Mjolsnes, S. F., Rong, C., Kure, O., & Spilling, P. (2006). A survey of key management in ad hoc networks. IEEE Communications Surveys & Tutorials, 8(3), 48–66.
Kang, N., Shakshuki, E. M., & Sheltami, T. R. (2010). Detecting misbehaving nodes in MANETs. In Proceedings of the 12th international conference on information integration and web-based applications & services (pp. 216–222). ACM.
Shrivastava, L., Bhadauria, S. S., & Tomar, G. S. (2011). Performance evaluation of routing protocols in MANET with different traffic loads. In 2011 International conference on communication systems and network technologies (pp. 13–16). IEEE.
Liang, Y., Poor, H. V., & Ying, L. (2011). Secrecy throughput of MANETs under passive and active attacks. IEEE Transactions on Information Theory, 57(10), 6692–6702.
Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security, 5(3), 338–346.
Najafi, G., & Gudakahriz, S. J. (2018). A stable routing protocol based on DSR protocol for mobile Ad Hoc networks. Int. J. Wirel. Microw. Technol. (IJWMT), 8(3), 14–22.
Jamal, T., & Butt, S. A. (2019). Malicious node analysis in MANETS. International Journal of Information Technology, 11(4), 859–867.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shibu, K.R., Suji Pramila, R. Load Based Key Generation for MANETs: A Comparative Study with DSR and AODV. Wireless Pers Commun 116, 1703–1712 (2021). https://doi.org/10.1007/s11277-020-07757-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07757-6