A Secure Routing Protocol for MANETs Against Byzantine Attacks

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 131)


MANETs are collection of mobile hosts which are self-configurable. Nodes in MANET communicate with each other through wireless channels with no centralized control. MANET nodes rely on multi-hop communication. Security in MANETs is always a very big issue. There are many attacks in MANET due to which the legitimacy of a network is compromised. Many approaches already existed to address these security issues. In this paper an algorithm was proposed for data transmission by using RSA algorithm for authentication purpose, and a blacklist to prevent sending data packets to those nodes which are malicious. Because of this data security is improved. The proposed routing algorithm is more secure as compared to AODV routing algorithm. The performance is analyzed on the basis of various performance metrics like Packets Received and Network Routing Overhead in the network by using the NS2 Simulator.


  1. 1.
    Taneja S, Kush A (2010) A survey of routing protocols in mobile ad hoc networks. Int J Innov Manag Technol 1(3):279–285Google Scholar
  2. 2.
    Vijaya Kumar G, Vasudeva Reddyr Y (2010) Current research work on routing protocols for MANET: a literature survey. Int J Comput Sci Eng 2(3):706–713Google Scholar
  3. 3.
    Panaousis EA, Ramrekha TA, Millar GP, Politis C (2010) Adaptive and secure routing protocol For emergency mobile ad-hoc networks. Int J Wirel Mobile Netw 2(2):66–78Google Scholar
  4. 4.
    Hu Y-C, Johnson DB, Perrig A (2002) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networksGoogle Scholar
  5. 5.
    Lu S, Li L, Lam K-Y, Jia L (2009) SAODV: a MANET routing protocol that can withstand black hole attack. International conference on computational intelligence and securityGoogle Scholar
  6. 6.
    Yu M, Zhou M, Su W (2009) A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Trans Veh Technol 58(1):449–460Google Scholar
  7. 7.
    Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C, Rubens H (2007) ODSBR: an on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans Inf Sys Secur (TISSEC) 10.4(2008):6Google Scholar
  8. 8.
    Buchegger S, Le Boudec J-Y (2002) Performance analysis of the CONFIDANT protocol: cooperation of nodes-fairness in distributed ad-hoc neTworks. Proceedings of IEEE/ACM workshop on mobile ad hoc networking and computing (MobiHOC), IEEE, Lausanne, CH, JuneGoogle Scholar
  9. 9.
    Luo J, Fan M, Ye D (2008) Black hole attack prevention based on authentication mechanism, ICCS 2008 IEEEGoogle Scholar
  10. 10.
    Jaafar MA, Zukarnain ZA (2009) Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment. Eur J Sci Res 32(3):430–443. ISSN 1450–216XGoogle Scholar
  11. 11.
    Kannhavong B, Nakayama H, Nemoto Y, Kato N (2007) A survey of routing attacks in mobile ad hoc networks. IEEE Wirel Commun 14(5):85–91Google Scholar
  12. 12.
    Abusalah L, Khokhar A, Guizani M (2008) A survey of secure mobile ad hoc routing protocols. IEEE Commun Surv Tutor 10(4):78–93Google Scholar
  13. 13.
    Zhang C, Zhu X, Song Y, Fang Y (2010) A formal study of trust- based routing in wireless ad hoc networks. Proceedings IEEE, INFOCOMGoogle Scholar
  14. 14.
    Weerasinghe H, Fu H (2008) Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. International journal of software engineering and its applicationsGoogle Scholar
  15. 15.
    Burmester M, de Medeiros B (2009) On the security of route discovery in MANETs. IEEE Trans Mobile Comput 8(9):1180–1188Google Scholar
  16. 16.
    Mahapatra RP, SM IACSIT, Katyal M (2010) Taxonomy of routing security for ad-hoc network. Int J Comput Theory Eng 2(2):303–307Google Scholar
  17. 17.
  18. 18.
    Perkins CE, Bhagwat P (1994) Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers. In: ACM SIGCOMM’94, 1994Google Scholar
  19. 19.
    C. E. Perkins and E. M. Royer, “Ad-Hoc On-Demand Distance Vector Routing”, Proc. 2nd IEEE Wksp. Mobile Computer Systems and Applications, 1999, pp. 90–100Google Scholar
  20. 20.
    Hu Y, Perrig A, Johonson DB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Proceedings of ACM MobiCom ‘02, 23–26 Sept 2002Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of Computer EngineeringAryabhatta Group of institutionsBarnalaIndia
  2. 2.Department of Computer EngineeringShri Ram College of Engineering and TechnologyMuzaffarnagarIndia

Personalised recommendations