Skip to main content

2014 | OriginalPaper | Buchkapitel

Secure Routing Technique in MANET: A Review

verfasst von : Aartika Chandrakar, Rajib Sarkar

Erschienen in: Intelligent Computing, Networking, and Informatics

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We are here to introduce the different approach that prevents security threat in MANET routing protocol. In recent year, secure routing protocol has been extensively studied. A mobile ad hoc network (MANET) is an infrastructure-less network where each node acts as an administrator for establishing end-to-end connection and a host for the source or destination. Security in MANET routing protocol is a mechanism to transfer data packet safely. Mostly, the routing protocols are based on cryptography scheme, security association, key distribution, authentication, and so on. The security research area is still open as many of the provided solutions are designed keeping a limited size scenario and limited kind of attacks and vulnerabilities. MANET is the future network because it is practically versatile, easy to use, inexpensive and can instantly update and reconfigure itself. In this paper, we have highlighted some of the typical vulnerabilities that are caused by characteristics of mobile ad hoc networks such as dynamic topology, limited resources (e.g., bandwidth, power), and lack of central management’s points.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhou, L., Haas, Z.J.: Secure ad hoc routing. IEEE 13, 22–30 (1999) Zhou, L., Haas, Z.J.: Secure ad hoc routing. IEEE 13, 22–30 (1999)
2.
Zurück zum Zitat Perkins, C.E.: Ad hoc Networking. Addison-Wesley, Boston (2001) Perkins, C.E.: Ad hoc Networking. Addison-Wesley, Boston (2001)
4.
Zurück zum Zitat Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Comm. 23(3), (2005) Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Comm. 23(3), (2005)
5.
Zurück zum Zitat Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing, pp. 90–100 (1999) Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing, pp. 90–100 (1999)
6.
Zurück zum Zitat Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings ICNP 2002, pp. 78–87. Paris, France, 12–15 Nov 2002 Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings ICNP 2002, pp. 78–87. Paris, France, 12–15 Nov 2002
7.
Zurück zum Zitat Johnson, D.B., Maltz, D.A., Broch, J.: The dynamic source routing protocol for multi-hop wireless ad hoc networks Johnson, D.B., Maltz, D.A., Broch, J.: The dynamic source routing protocol for multi-hop wireless ad hoc networks
8.
Zurück zum Zitat Kim, H.S., Kang, B.S., Pack, S., Kang, C.H.: Route Investigation for Secure Routing in Mobile Ad-hoc Networks, pp. 163–168 (2007) Kim, H.S., Kang, B.S., Pack, S., Kang, C.H.: Route Investigation for Secure Routing in Mobile Ad-hoc Networks, pp. 163–168 (2007)
9.
Zurück zum Zitat HuBaux, J-.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings MobiHoc, pp. 146–155 (2001) HuBaux, J-.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings MobiHoc, pp. 146–155 (2001)
10.
Zurück zum Zitat Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2(1), 52–64 (2003) Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2(1), 52–64 (2003)
11.
Zurück zum Zitat Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security and support for wireless mobile networks. In: Proceedings ICNP, pp. 251–260 (2001) Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security and support for wireless mobile networks. In: Proceedings ICNP, pp. 251–260 (2001)
12.
Zurück zum Zitat Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999) Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
13.
Zurück zum Zitat Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad hoc networks). In: Proceedings MobiCom, pp. 226–236 (2002) Buchegger, S., Le Boudec, J.-Y.: Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad hoc networks). In: Proceedings MobiCom, pp. 226–236 (2002)
14.
Zurück zum Zitat Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: Proceedings MobiCom, pp. 255–265 (2000) Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: Proceedings MobiCom, pp. 255–265 (2000)
15.
Zurück zum Zitat Just, M., Kranakis, E., Wan, T.: Resisting malicious packet dropping in wireless ad hoc networks. In: Proceedings Ad hoc Now, pp. 151–163 (2003) Just, M., Kranakis, E., Wan, T.: Resisting malicious packet dropping in wireless ad hoc networks. In: Proceedings Ad hoc Now, pp. 151–163 (2003)
16.
Zurück zum Zitat Buttyan, L., Hubaux, J.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings MobiHoc, pp. 87–96 (2000) Buttyan, L., Hubaux, J.: Enforcing service availability in mobile ad-hoc WANs. In: Proceedings MobiHoc, pp. 87–96 (2000)
17.
Zurück zum Zitat Sundaramurthy, S., Belding-Royer, E.: The ADMIX protocol for encouraging participation in mobile ad hoc networks. In: Proceedings IEEE ICNP, pp. 156–167 (2003) Sundaramurthy, S., Belding-Royer, E.: The ADMIX protocol for encouraging participation in mobile ad hoc networks. In: Proceedings IEEE ICNP, pp. 156–167 (2003)
18.
Zurück zum Zitat Hu, Y., Perrig, A., Johnson, D.: ARIADNE: A secure on-demand routing protocol for ad hoc networks. In: Proceedings MobiCom, pp. 12–23 (2002) Hu, Y., Perrig, A., Johnson, D.: ARIADNE: A secure on-demand routing protocol for ad hoc networks. In: Proceedings MobiCom, pp. 12–23 (2002)
19.
Zurück zum Zitat Papadimitratos, P., Haas, Z.J., Samar, P.: The secure routing protocol (SRP) for ad hoc networks draft-papadimitratos-secure –routing–protocol–00.txt, (2002) Papadimitratos, P., Haas, Z.J., Samar, P.: The secure routing protocol (SRP) for ad hoc networks draft-papadimitratos-secure –routing–protocol–00.txt, (2002)
20.
Zurück zum Zitat Mehuron, W.: Digital signature standard (DSS) U.S. department of commerce, national institute of standards and technology (NIST), information technology laboratory (ITL). FIPS PEB 186 (1994) Mehuron, W.: Digital signature standard (DSS) U.S. department of commerce, national institute of standards and technology (NIST), information technology laboratory (ITL). FIPS PEB 186 (1994)
21.
Zurück zum Zitat Kumar, J., Kulkarni, M., Gupta, D.: Secure routing protocols in ad hoc network: a review. Special Issue of IJCCT for International Conference (ICCT-2010), vol. 2(2), pp. 3–4, 3–5 Dec 2010 Kumar, J., Kulkarni, M., Gupta, D.: Secure routing protocols in ad hoc network: a review. Special Issue of IJCCT for International Conference (ICCT-2010), vol. 2(2), pp. 3–4, 3–5 Dec 2010
22.
Zurück zum Zitat Papadimitratos, P., Haas, Z.: Secure link state routing for mobile ad-hoc networks. In: Proceedings of Symposium on Applications and the Internet Workshops (SAINT’03), pp. 379–383 (2003) Papadimitratos, P., Haas, Z.: Secure link state routing for mobile ad-hoc networks. In: Proceedings of Symposium on Applications and the Internet Workshops (SAINT’03), pp. 379–383 (2003)
23.
Zurück zum Zitat Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Cambridge (1996) Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Cambridge (1996)
24.
Zurück zum Zitat Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks. IFIP-Communication and Multimedia Security Conference (2002) Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks. IFIP-Communication and Multimedia Security Conference (2002)
25.
Zurück zum Zitat Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad-hoc networks. IEEE J. Sel. Areas Commun. 24(2), 261–273 (2006)CrossRef Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad-hoc networks. IEEE J. Sel. Areas Commun. 24(2), 261–273 (2006)CrossRef
26.
Zurück zum Zitat Gonzalez, O.F., Ansa, Godwin, Howorth, M., Pavlou, G.: Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks. J. Int. Eng. 2, 1 (2008) Gonzalez, O.F., Ansa, Godwin, Howorth, M., Pavlou, G.: Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks. J. Int. Eng. 2, 1 (2008)
27.
Zurück zum Zitat Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. IJCSI Int. J. Comput. Sci. Issues 2, 54–59 (2009) Raj, P.N., Swadas, P.B.: DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET. IJCSI Int. J. Comput. Sci. Issues 2, 54–59 (2009)
28.
Zurück zum Zitat Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: Proceedings of ACM MOBIHOC, pp. 299–302 (2001) Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: Proceedings of ACM MOBIHOC, pp. 299–302 (2001)
29.
Zurück zum Zitat Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Proceedings of Radio and Wireless Conference, RAWCON apos; 03, vol. 10(13), pp. 75–78 (2003) Patcha, A., Mishra, A.: Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In: Proceedings of Radio and Wireless Conference, RAWCON apos; 03, vol. 10(13), pp. 75–78 (2003)
30.
Zurück zum Zitat Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM (2002) Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM (2002)
31.
Zurück zum Zitat Khurana, S., Gupta, N., Aneja, N.: Minimum exposed path to the attack (MEPA) in mobile ad-hoc network (MANET). 6th International Conference on Networking (ICN’07), p. 16 (2007) Khurana, S., Gupta, N., Aneja, N.: Minimum exposed path to the attack (MEPA) in mobile ad-hoc network (MANET). 6th International Conference on Networking (ICN’07), p. 16 (2007)
32.
Zurück zum Zitat Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV against wormhole attacks in emergency MANET multimedia communications. Mobimedia’09. London, UK, 7–9 Sept 2009 Panaousis, E.A., Nazaryan, L., Politis, C.: Securing AODV against wormhole attacks in emergency MANET multimedia communications. Mobimedia’09. London, UK, 7–9 Sept 2009
33.
Zurück zum Zitat Capkun, S., Buttyan, L., Hubaux, J.: Sector: secure tracking of node encounters in multihop wireless networks. Proceedings of the ACM Workshop on Security of Ad-hoc and Sensor Networks (2003) Capkun, S., Buttyan, L., Hubaux, J.: Sector: secure tracking of node encounters in multihop wireless networks. Proceedings of the ACM Workshop on Security of Ad-hoc and Sensor Networks (2003)
34.
Zurück zum Zitat Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: Proceedings of the ACM Workshop on Wireless Security (Wise’04), pp. 51–60 (2004) Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: Proceedings of the ACM Workshop on Wireless Security (Wise’04), pp. 51–60 (2004)
35.
Zurück zum Zitat Choi, S., Kim, D.Y., Lee, D., Jung, J.: WAP: wormhole attack prevention algorithm in mobile ad-hoc networks. In: Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 0, pp. 343–348. ISBN = 978-0- 7695-3158-8, (2008) Choi, S., Kim, D.Y., Lee, D., Jung, J.: WAP: wormhole attack prevention algorithm in mobile ad-hoc networks. In: Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 0, pp. 343–348. ISBN = 978-0- 7695-3158-8, (2008)
36.
Zurück zum Zitat Song, N., Qian, L., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (2005) Song, N., Qian, L., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (2005)
37.
Zurück zum Zitat Ming, Yu., Zhou, M., Su, W.: A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 58(1), 449–460 (2009)CrossRef Ming, Yu., Zhou, M., Su, W.: A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 58(1), 449–460 (2009)CrossRef
38.
Zurück zum Zitat Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002) Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002)
39.
Zurück zum Zitat Chang, J.M., Tsou, P.C., Chao, H.C., Chen, J.L.: Cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture, 978-1-4577-0787-2/11/$26.00, IEEE (2011) Chang, J.M., Tsou, P.C., Chao, H.C., Chen, J.L.: Cooperative bait detection scheme to prevent malicious node for MANET based on hybrid defense architecture, 978-1-4577-0787-2/11/$26.00, IEEE (2011)
40.
Zurück zum Zitat Mamatha, G.S., Sharma, S.C.: A highly secured approach against attacks in MANETS, Int. J. Comput. Theor. Eng. 2(5), 1793–8201 (2010) Mamatha, G.S., Sharma, S.C.: A highly secured approach against attacks in MANETS, Int. J. Comput. Theor. Eng. 2(5), 1793–8201 (2010)
41.
Zurück zum Zitat Santhosh Krishna, B.V., Vallikannu, A.L.: Detecting malicious nodes for secure routing in MANETS using reputation based mechanism. Int. J. Sci. Eng. Res. 1(3), 1SSN 2229-5518 (2010) Santhosh Krishna, B.V., Vallikannu, A.L.: Detecting malicious nodes for secure routing in MANETS using reputation based mechanism. Int. J. Sci. Eng. Res. 1(3), 1SSN 2229-5518 (2010)
Metadaten
Titel
Secure Routing Technique in MANET: A Review
verfasst von
Aartika Chandrakar
Rajib Sarkar
Copyright-Jahr
2014
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-1665-0_135