Abstract
In MANET, the most important issues are authentication of data packet in the network. Due to the hostile environment, security is major concern while data transmission. In order to overcome this issue, in this paper, we propose hop by hop group key agreement protocol where each node generates pairwise key for encryption of data. The session key is generated only between the nodes which is carrying the data packet for transmission. The key exchange can be performed between two nodes before data transmission. Ni constructs Lagrange interpolating polynomial with degree n − 1. Each Ni broadcasts the generated polynomial. After that, group key agreement protocol is used to provide complete authentication for those nodes. Simulation result show that the proposed algorithm is efficient as it minimizes bandwidth usage, delay, packet drop, and overhead, as well as fulfills all primary security concern, with improved delivery ratio and throughput.
Similar content being viewed by others
References
Xing, Z., & Gruenwald, L. (2007). Issues in designing concurrency control techniques for mobile ad-hoc network databases. Technical Report, School of Computer Science, University of Oklahoma, July 2007.
Mukilan, P. & Wahi, A. (2012). EENMDRA: Efficient energy and node mobility based data replication algorithm for MANET. IJCSI International Journal of Computer Science Issues, 9(3), 357–364, No 1, May 2012, ISSN (Online): 1694-0814.
Moon, A. & Cho, H. (2004). Energy efficient replication extended database state machine in mobile ad-hoc network. IADIS International Conference on Applied Computing, 224–228.
Youssef, M., Ibrahim, M., Abdelatif, M., & Chen, L. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.
Attar, A., Tang, H., Vasilakos, A., Yu, F. R., & Leung, V. C. M. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.
Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2002). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM 2012, pp. 100–108.
Khaleel, T. A., & Ahmed, M. Y. (2012). The enhancement of routing security in mobile ad-hoc networks. International Journal of Computer Applications (0975–888), 48(16).
Sun, Y., Hany, Z., & Liu, K. J. R. (2008). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, pp. 112–119, February 2008, 0163-6804/08/$25.00 © 2008 IEEE.
Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.
Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.
Busch, C., Kannan, R., & Vasilakos, A. (2012). Approximating congestion + dilation in networks via ‘quality of routing’ games. IEEE Transaction on Computers, 61(9), 1270–1283.
Sun, Y. L., Hany, Z., Yuy, W., & Liu, K. J. R. (2006). Attacks on trust evaluation in distributed networks. In 40th annual conference on information science and systems, March 22–24, 2006, pp. 1461–1466.
Yen, Y.-S., Chao, H.-C., Chang, R.-S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.
Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A. V., & Rong, X. (2015). Data mining for the internet of things: Literature review and challenges. International Journal of Distributed Sensor Networks, 2015, 14. doi:10.1155/2015/431047.
Meng, T., Wu, F., Yang, Z., & Chen, G. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE TMC. doi:10.1109/TC.2015.2417543.
Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.
Yu, Y., Kaminsky, M., Gibbons, P. B., & Flaxman, A. (2006). SybilGuard: Defending against Sybil attacks via social networks. In ACM SIGCOMM conference on computer communications (SIGCOMM 2006), 2006 ACM 1595933085/06/0009, Pisa, Italy, September 2006.
Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.
Vasilakos, A., & Zhang, Y. (2012). Thrasyvoulos spyropoulos, delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.
Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.
Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP Traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.
England, P., Shi, Q., Askwith, B., & Bouhafs, F. (2012). A survey of trust management in mobile ad-hoc networks. Liverpool John Moores University, June 2012, ISBN: 978-1-902560-26-7 © 2012 PGNet.
Khokhar, R. H., Ngadi, M. A., & Mandala, S. (2008). A review of current routing attacks in mobile ad hoc networks. International Journal of Computer Science and Security, 2(3).
Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.
Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.
Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.
Gurjar, A. A., & Dande, A. A. (213). Black hole attack in Manet’s: A review study. International Journal of IT, Engineering and Applied Sciences Research (IJIEASR), 2(3). ISSN: 2319-4413, March 2013.
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24, 370–380.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.
Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Science, 314, 255–276.
Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., & Guizani, M. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transaction on Network, 18(4), 1234–1247.
Yasmin, R., Ritter, E., & Wang, G. (2010). An authentication framework for wireless sensor networks using identity-based signatures. In Computer and information technology (CIT), 2010 IEEE 10th international conference on June 29 2010–July 1 2010, pp. 882–889, Print ISBN: 978-1-4244-7547-6, INSPEC Accession Number: 11529085. doi:10.1109/CIT.2010.165
Dahiya, A., & Sharma, V. (2009). A survey on securing user authentication in vehicular ad hoc networks. In National conference on recent drifts, break in applied sciences and its technology for innovation management (NCRDBAIM), KIET, Ghaziabad, August 7–9, 2009.
Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks. In Distributed computing systems workshops, 2003, 23rd international conference on 19–22 May 2003, pp. 749–755, Print ISBN: 0-7695-1921-0, INSPEC Accession Number: 8071255. doi:10.1109/ICDCSW.2003.1203642
Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.
He, D., Chen, C., Chan, S., & Bu, J. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.
Sanzgiri, K., Dahilly, B., Leviney, B. N., Shieldsz, C., & Belding-Royer, E. M. (20002). A secure routing protocol for ad hoc networks. In 10th IEEE international conference on network protocols (ICNP’02) 1092-1648/02 $17.00 © 2002 IEEE.
Hu, Y.-C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Ad hoc networks 1, 1570-8705/$—see front matter 2003 Published by Elsevier B.V. doi:10.1016/S1570-8705(03)00019-2, pp. 175–192.
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11, 21–38.
Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.
Liu, J., Yu, F. R., Lung, C.-H., & Tang, H. (2009). Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications, 8(2), 806–815.
Li, L.-C., & Liu, R.-S. (2010). Securing cluster-based ad hoc networks with distributed authorities. IEEE Transactions on Wireless Communications, 9(10), 3072–3081.
Bu, S., Yu, F. R., Liu, X. P., Mason, P., & Tang, H. (2011). Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 60(3), 1025–1036.
Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.
Network Simulator. http://www.isi.edu/nsnam/ns
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shanthi, K., Murugan, D. Pair-wise key agreement and hop-by-hop authentication protocol for MANET. Wireless Netw 23, 1025–1033 (2017). https://doi.org/10.1007/s11276-015-1191-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-015-1191-x