Skip to main content
Log in

Pair-wise key agreement and hop-by-hop authentication protocol for MANET

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In MANET, the most important issues are authentication of data packet in the network. Due to the hostile environment, security is major concern while data transmission. In order to overcome this issue, in this paper, we propose hop by hop group key agreement protocol where each node generates pairwise key for encryption of data. The session key is generated only between the nodes which is carrying the data packet for transmission. The key exchange can be performed between two nodes before data transmission. Ni constructs Lagrange interpolating polynomial with degree n − 1. Each Ni broadcasts the generated polynomial. After that, group key agreement protocol is used to provide complete authentication for those nodes. Simulation result show that the proposed algorithm is efficient as it minimizes bandwidth usage, delay, packet drop, and overhead, as well as fulfills all primary security concern, with improved delivery ratio and throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Xing, Z., & Gruenwald, L. (2007). Issues in designing concurrency control techniques for mobile ad-hoc network databases. Technical Report, School of Computer Science, University of Oklahoma, July 2007.

  2. Mukilan, P. & Wahi, A. (2012). EENMDRA: Efficient energy and node mobility based data replication algorithm for MANET. IJCSI International Journal of Computer Science Issues, 9(3), 357–364, No 1, May 2012, ISSN (Online): 1694-0814.

  3. Moon, A. & Cho, H. (2004). Energy efficient replication extended database state machine in mobile ad-hoc network. IADIS International Conference on Applied Computing, 224–228.

  4. Youssef, M., Ibrahim, M., Abdelatif, M., & Chen, L. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.

    Article  Google Scholar 

  5. Attar, A., Tang, H., Vasilakos, A., Yu, F. R., & Leung, V. C. M. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  6. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2002). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM 2012, pp. 100–108.

  7. Khaleel, T. A., & Ahmed, M. Y. (2012). The enhancement of routing security in mobile ad-hoc networks. International Journal of Computer Applications (0975888), 48(16).

  8. Sun, Y., Hany, Z., & Liu, K. J. R. (2008). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, pp. 112–119, February 2008, 0163-6804/08/$25.00 © 2008 IEEE.

  9. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.

    Article  Google Scholar 

  10. Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.

    Article  Google Scholar 

  11. Busch, C., Kannan, R., & Vasilakos, A. (2012). Approximating congestion + dilation in networks via ‘quality of routing’ games. IEEE Transaction on Computers, 61(9), 1270–1283.

    Article  MathSciNet  Google Scholar 

  12. Sun, Y. L., Hany, Z., Yuy, W., & Liu, K. J. R. (2006). Attacks on trust evaluation in distributed networks. In 40th annual conference on information science and systems, March 22–24, 2006, pp. 1461–1466.

  13. Yen, Y.-S., Chao, H.-C., Chang, R.-S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11–12), 2238–2250.

    Article  Google Scholar 

  14. Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A. V., & Rong, X. (2015). Data mining for the internet of things: Literature review and challenges. International Journal of Distributed Sensor Networks, 2015, 14. doi:10.1155/2015/431047.

    Google Scholar 

  15. Meng, T., Wu, F., Yang, Z., & Chen, G. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE TMC. doi:10.1109/TC.2015.2417543.

    Google Scholar 

  16. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405–406.

    Google Scholar 

  17. Yu, Y., Kaminsky, M., Gibbons, P. B., & Flaxman, A. (2006). SybilGuard: Defending against Sybil attacks via social networks. In ACM SIGCOMM conference on computer communications (SIGCOMM 2006), 2006 ACM 1595933085/06/0009, Pisa, Italy, September 2006.

  18. Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.

    Article  Google Scholar 

  19. Vasilakos, A., & Zhang, Y. (2012). Thrasyvoulos spyropoulos, delay tolerant networks: Protocols and applications. Boca Raton: CRC Press.

    Google Scholar 

  20. Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.

    Article  Google Scholar 

  21. Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP Traceback: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.

    Article  Google Scholar 

  22. England, P., Shi, Q., Askwith, B., & Bouhafs, F. (2012). A survey of trust management in mobile ad-hoc networks. Liverpool John Moores University, June 2012, ISBN: 978-1-902560-26-7 © 2012 PGNet.

  23. Khokhar, R. H., Ngadi, M. A., & Mandala, S. (2008). A review of current routing attacks in mobile ad hoc networks. International Journal of Computer Science and Security, 2(3).

  24. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  25. Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  26. Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.

    Article  Google Scholar 

  27. Gurjar, A. A., & Dande, A. A. (213). Black hole attack in Manet’s: A review study. International Journal of IT, Engineering and Applied Sciences Research (IJIEASR), 2(3). ISSN: 2319-4413, March 2013.

  28. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24, 370–380.

    Article  Google Scholar 

  29. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  30. Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Science, 314, 255–276.

    Article  Google Scholar 

  31. Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., & Guizani, M. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transaction on Network, 18(4), 1234–1247.

    Article  Google Scholar 

  32. Yasmin, R., Ritter, E., & Wang, G. (2010). An authentication framework for wireless sensor networks using identity-based signatures. In Computer and information technology (CIT), 2010 IEEE 10th international conference on June 29 2010July 1 2010, pp. 882–889, Print ISBN: 978-1-4244-7547-6, INSPEC Accession Number: 11529085. doi:10.1109/CIT.2010.165

  33. Dahiya, A., & Sharma, V. (2009). A survey on securing user authentication in vehicular ad hoc networks. In National conference on recent drifts, break in applied sciences and its technology for innovation management (NCRDBAIM), KIET, Ghaziabad, August 7–9, 2009.

  34. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks. In Distributed computing systems workshops, 2003, 23rd international conference on 1922 May 2003, pp. 749–755, Print ISBN: 0-7695-1921-0, INSPEC Accession Number: 8071255. doi:10.1109/ICDCSW.2003.1203642

  35. Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.

    Article  Google Scholar 

  36. He, D., Chen, C., Chan, S., & Bu, J. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  Google Scholar 

  37. Sanzgiri, K., Dahilly, B., Leviney, B. N., Shieldsz, C., & Belding-Royer, E. M. (20002). A secure routing protocol for ad hoc networks. In 10th IEEE international conference on network protocols (ICNP’02) 1092-1648/02 $17.00 © 2002 IEEE.

  38. Hu, Y.-C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Ad hoc networks 1, 1570-8705/$—see front matter 2003 Published by Elsevier B.V. doi:10.1016/S1570-8705(03)00019-2, pp. 175–192.

  39. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11, 21–38.

    Article  Google Scholar 

  40. Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.

    Article  Google Scholar 

  41. Liu, J., Yu, F. R., Lung, C.-H., & Tang, H. (2009). Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications, 8(2), 806–815.

    Article  Google Scholar 

  42. Li, L.-C., & Liu, R.-S. (2010). Securing cluster-based ad hoc networks with distributed authorities. IEEE Transactions on Wireless Communications, 9(10), 3072–3081.

    Article  Google Scholar 

  43. Bu, S., Yu, F. R., Liu, X. P., Mason, P., & Tang, H. (2011). Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 60(3), 1025–1036.

    Article  Google Scholar 

  44. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.

    Article  Google Scholar 

  45. Network Simulator. http://www.isi.edu/nsnam/ns

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Shanthi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shanthi, K., Murugan, D. Pair-wise key agreement and hop-by-hop authentication protocol for MANET. Wireless Netw 23, 1025–1033 (2017). https://doi.org/10.1007/s11276-015-1191-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1191-x

Keywords

Navigation