Secure Routing Technique in MANET: A Review

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 243)

Abstract

We are here to introduce the different approach that prevents security threat in MANET routing protocol. In recent year, secure routing protocol has been extensively studied. A mobile ad hoc network (MANET) is an infrastructure-less network where each node acts as an administrator for establishing end-to-end connection and a host for the source or destination. Security in MANET routing protocol is a mechanism to transfer data packet safely. Mostly, the routing protocols are based on cryptography scheme, security association, key distribution, authentication, and so on. The security research area is still open as many of the provided solutions are designed keeping a limited size scenario and limited kind of attacks and vulnerabilities. MANET is the future network because it is practically versatile, easy to use, inexpensive and can instantly update and reconfigure itself. In this paper, we have highlighted some of the typical vulnerabilities that are caused by characteristics of mobile ad hoc networks such as dynamic topology, limited resources (e.g., bandwidth, power), and lack of central management’s points.

Keywords

Route investigation protocol MANET Key management Security Authentication Malicious node 

References

  1. 1.
    Zhou, L., Haas, Z.J.: Secure ad hoc routing. IEEE 13, 22–30 (1999)Google Scholar
  2. 2.
    Perkins, C.E.: Ad hoc Networking. Addison-Wesley, Boston (2001)Google Scholar
  3. 3.
  4. 4.
    Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Comm. 23(3), (2005)Google Scholar
  5. 5.
    Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing, pp. 90–100 (1999)Google Scholar
  6. 6.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings ICNP 2002, pp. 78–87. Paris, France, 12–15 Nov 2002Google Scholar
  7. 7.
    Johnson, D.B., Maltz, D.A., Broch, J.: The dynamic source routing protocol for multi-hop wireless ad hoc networks Google Scholar
  8. 8.
    Kim, H.S., Kang, B.S., Pack, S., Kang, C.H.: Route Investigation for Secure Routing in Mobile Ad-hoc Networks, pp. 163–168 (2007)Google Scholar
  9. 9.
    HuBaux, J-.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings MobiHoc, pp. 146–155 (2001)Google Scholar
  10. 10.
    Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2(1), 52–64 (2003)Google Scholar
  11. 11.
    Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security and support for wireless mobile networks. In: Proceedings ICNP, pp. 251–260 (2001)Google Scholar
  12. 12.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)Google Scholar
  13. 13.
    Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad hoc networks). In: Proceedings MobiCom, pp. 226–236 (2002)Google Scholar
  14. 14.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: Proceedings MobiCom, pp. 255–265 (2000)Google Scholar
  15. 15.
    Just, M., Kranakis, E., Wan, T.: Resisting malicious packet dropping in wireless ad hoc networks. In: Proceedings Ad hoc Now, pp. 151–163 (2003)Google Scholar
  16. 16.
    Buttyan, L., Hubaux, J.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings MobiHoc, pp. 87–96 (2000)Google Scholar
  17. 17.
    Sundaramurthy, S., Belding-Royer, E.: The ADMIX protocol for encouraging participation in mobile ad hoc networks. In: Proceedings IEEE ICNP, pp. 156–167 (2003)Google Scholar
  18. 18.
    Hu, Y., Perrig, A., Johnson, D.: ARIADNE: A secure on-demand routing protocol for ad hoc networks. In: Proceedings MobiCom, pp. 12–23 (2002)Google Scholar
  19. 19.
    Papadimitratos, P., Haas, Z.J., Samar, P.: The secure routing protocol (SRP) for ad hoc networks draft-papadimitratos-secure –routing–protocol–00.txt, (2002)Google Scholar
  20. 20.
    Mehuron, W.: Digital signature standard (DSS) U.S. department of commerce, national institute of standards and technology (NIST), information technology laboratory (ITL). FIPS PEB 186 (1994)Google Scholar
  21. 21.
    Kumar, J., Kulkarni, M., Gupta, D.: Secure routing protocols in ad hoc network: a review. Special Issue of IJCCT for International Conference (ICCT-2010), vol. 2(2), pp. 3–4, 3–5 Dec 2010Google Scholar
  22. 22.
    Papadimitratos, P., Haas, Z.: Secure link state routing for mobile ad-hoc networks. In: Proceedings of Symposium on Applications and the Internet Workshops (SAINT’03), pp. 379–383 (2003)Google Scholar
  23. 23.
    Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Cambridge (1996)Google Scholar
  24. 24.
    Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks. IFIP-Communication and Multimedia Security Conference (2002)Google Scholar
  25. 25.
    Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad-hoc networks. IEEE J. Sel. Areas Commun. 24(2), 261–273 (2006)CrossRefGoogle Scholar
  26. 26.
    Gonzalez, O.F., Ansa, Godwin, Howorth, M., Pavlou, G.: Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks. J. Int. Eng. 2, 1 (2008)Google Scholar
  27. 27.
    Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. IJCSI Int. J. Comput. Sci. Issues 2, 54–59 (2009)Google Scholar
  28. 28.
    Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: Proceedings of ACM MOBIHOC, pp. 299–302 (2001)Google Scholar
  29. 29.
    Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Proceedings of Radio and Wireless Conference, RAWCON apos; 03, vol. 10(13), pp. 75–78 (2003)Google Scholar
  30. 30.
    Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM (2002)Google Scholar
  31. 31.
    Khurana, S., Gupta, N., Aneja, N.: Minimum exposed path to the attack (MEPA) in mobile ad-hoc network (MANET). 6th International Conference on Networking (ICN’07), p. 16 (2007)Google Scholar
  32. 32.
    Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV against wormhole attacks in emergency MANET multimedia communications. Mobimedia’09. London, UK, 7–9 Sept 2009Google Scholar
  33. 33.
    Capkun, S., Buttyan, L., Hubaux, J.: Sector: secure tracking of node encounters in multihop wireless networks. Proceedings of the ACM Workshop on Security of Ad-hoc and Sensor Networks (2003)Google Scholar
  34. 34.
    Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: Proceedings of the ACM Workshop on Wireless Security (Wise’04), pp. 51–60 (2004)Google Scholar
  35. 35.
    Choi, S., Kim, D.Y., Lee, D., Jung, J.: WAP: wormhole attack prevention algorithm in mobile ad-hoc networks. In: Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 0, pp. 343–348. ISBN = 978-0- 7695-3158-8, (2008)Google Scholar
  36. 36.
    Song, N., Qian, L., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (2005)Google Scholar
  37. 37.
    Ming, Yu., Zhou, M., Su, W.: A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 58(1), 449–460 (2009)CrossRefGoogle Scholar
  38. 38.
    Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002)Google Scholar
  39. 39.
    Chang, J.M., Tsou, P.C., Chao, H.C., Chen, J.L.: Cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture, 978-1-4577-0787-2/11/$26.00, IEEE (2011)Google Scholar
  40. 40.
    Mamatha, G.S., Sharma, S.C.: A highly secured approach against attacks in MANETS, Int. J. Comput. Theor. Eng. 2(5), 1793–8201 (2010)Google Scholar
  41. 41.
    Santhosh Krishna, B.V., Vallikannu, A.L.: Detecting malicious nodes for secure routing in MANETS using reputation based mechanism. Int. J. Sci. Eng. Res. 1(3), 1SSN 2229-5518 (2010)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceCentral Institute of TechnologyRaipurIndia

Personalised recommendations