Call for Paper - May 2019 Edition
IJCA solicits original research papers for the May 2019 Edition. Last date of manuscript submission is April 20, 2019. Read More

Survey of Cryptography Techniques against Impersonation Attacks in MANET

Print
PDF
IJCA Proceedings on International Conference on Communication, Computing and Information Technology
© 2018 by IJCA Journal
ICCCMIT 2017 - Number 1
Year of Publication: 2018
Authors:
P. Kavitha
Rajewsari Mukesh

P Kavitha and Rajewsari Mukesh. Article: Survey of Cryptography Techniques against Impersonation Attacks in MANET. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2017(1):1-8, June 2018. Full text available. BibTeX

@article{key:article,
	author = {P. Kavitha and Rajewsari Mukesh},
	title = {Article: Survey of Cryptography Techniques against Impersonation Attacks in MANET},
	journal = {IJCA Proceedings on International Conference on Communication, Computing and Information Technology},
	year = {2018},
	volume = {ICCCMIT 2017},
	number = {1},
	pages = {1-8},
	month = {June},
	note = {Full text available}
}

Abstract

Security is the main concern in Mobile Ad Hoc Networks (MANETs). There are numerous malicious activities performed on single as well as multi-layer of the MANET. Unlike specific layer attacks, the multi-layer attacks are intelligent, since they can coordinate the misbehaving activities in various layers and launch further sophisticated attacks. Most of the research works have focused only on the specific layer attacks. However, there is little progress in providing secure communication against multi-layer attacks. The security against impersonation attack is difficult and to provide the multi-layer protection becomes crucial. To meet the security requirements, several security algorithms have been proposed. However, solutions to the impersonation attack are still incomplete. The routing behavior analysis is insufficient to provide multi-layer protection against impersonation attack, and thus the cryptographic mechanism is widely used for providing authentication and preventing impersonation in MANET. This work conducts a survey on network attacks and conventional security solutions with its advantages and limitations. Finally, this work explores the complexities of symmetric, asymmetric, and group key management.

References

  • Nie, Pin. "Security In Ad Hoc Network. ", 2006.
  • Wu B, Chen J, Wu J, Cardei M. , "A Survey Of Attacks And Countermeasures In Mobile Ad Hoc Networks", In Wireless Network Security, Springer, Pp. 103-135, 2007.
  • Daza V, Herranz J, Morillo P, Ràfols C. , "Cryptographic Techniques For Mobile Ad-Hoc Networks", Computer Networks, Vol. 51, No. 18, Pp. 4938-50, 2007.
  • Anantvalee, T. , & Wu, J "A Survey On Intrusion Detection In Mobile Ad Hoc Networks", In Wireless Network Security, Springer, Pp. (159-180), 2007.
  • Zhang, C. , Zhu, X. , Song, Y. , & Fang, Y, "A Formal Study Of Trust-Based Routing In Wireless Ad Hoc Networks", Ieee Infocom, Pp. (1-9), 2010.
  • Martinovic, I. , Pichota, P. , Schmitt, "J. B. : Jamming For Good: Design And Analysis Of A Crypto-Less Protection For Wsns", In: Proceedings Of The Second Conference On Wireless Network Security (Wisec) (March 2009).
  • Balarengadurai, C. And Saraswathi, S. , "Comparative Analysis Of Detection Of Ddos Attacks In Ieee 802. 15 For Low Rate Wireless Personal Area Network", Procedia Engineering, Vol. 38, Pp. 3855-3863, 2012.
  • Kannhavong, Bounpadith, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, And Abbas Jamalipour. "A Survey Of Routing Attacks In Mobile Ad Hoc Networks" ,Ieee Wireless Communications, Vol. 14, No. 5, Pp. 85-91, 2007.
  • Nadeem, Adnan, And Michael P. Howarth. "A Survey Of Manet Intrusion Detection & Prevention Approaches For Network Layer Attack. ", Ieee Communications Surveys & Tutorials, Vol. 15, No. 4, Pp. 2027-2045, 2013.
  • Pal, Sarit, Asish K. Mukhopadhyay, And Parthapratim Bhattacharya. "Defending Mechanisms Against Sybil Attack In Next Generation Mobile Ad Hoc Networks. " ,Iete Technical Review 25. 4 (2008): 209-215.
  • Goyal P, Parmar V, Rishi R. "Manet: Vulnerabilities, Challenges, Attacks, Application", Ijcem International Journal Of Computational Engineering & Management,2011 .
  • Grover, Jyoti, Manoj Singh Gaur, And Vijay Laxmi. "A Novel Defense Mechanism Against Sybil Attacks In Vanet", Proceedings Of The 3rd International Conference On Security Of Information And Networks. Acm, 2010.
  • Awerbuch, B. , Holmer, D. , Nita-Rotaru, C. , & Rubens, H. "An On-Demand Secure Routing Protocol Resilient To Byzantine Failures", Inproceedings Of The 1st Acm Workshop On Wireless Security (Pp. 21-30). Acm 2002.
  • Deb, N. , &Chaki, N. , "Tids: Trust-Based Intrusion Detection System For Wireless Ad-Hoc Networks", In Computer Information Systems And Industrial Management Springer, Pp. 80-91), 2012
  • Pankaj Sharma And Yogendra Kumar Jain, "Trust Based Secure Aodv In Manet", Journal Of Global Research In Computer Science, Vol. 3, No. 6, 2012
  • Dalal, R. , Khari, M. , & Singh, Y, "Survey Of Trust Schemes On Ad-Hoc Network", In Advances In Computer Science And Information Technology. Networks And Communications, Springer, Pp. 170-180, 2012.
  • Amiri, E. , Keshavarz, H. , Heidari, H. , Mohamadi, E. , &Moradzadeh, H. , "Intrusion Detection Systems In Manet: A Review", Procedia-Social And Behavioral Sciences, 129, Pp. 453-459, 2014
  • Khan, M. S. , Jadoon, Q. K. , & Khan, M. I. "A Comparative Performance Analysis Of Manet Routing Protocols Under Security Attacks", In Mobile And Wireless Technology 2015 (Pp. 137-145). Springer Berlin Heidelberg, 2015.
  • Hernandez-Orallo, E. , Serrat, M. D. , Cano, J. C. , Calafate, C. T. , & Manzoni, P. , "Cocowa: A Collaborative Contact-Based Watchdog For Detecting Selfish Nodes", 2014
  • Kim,Y. , Perrig, A. , And Tsudik, G. " Simple And Fault-Tolerant Key Agreement For Dynamic Collaborative Groups", Technical Report 2, Usc Technical Report 00-737, 2002
  • Kim, Y. , Perrig, A. , And Tsudik, G "Simple And Fault-Tolerant Key Agreement For Dynamic Collaborative Groups", In 7th Acm Conference On Computer And Communications Security, Pp. 235-244, Acm Press,2000.
  • Steiner, M. , Tsudik, G. , And Waidner, M "Cliques: A New Approach To Group Key Agreement. Ieee Transactions On Parallel And Distributed Systems",2000.
  • Cocks, C. "An Identity Based Encryption Scheme Based On Quadratic Residues. In Proc. Ima Conference On Cryptography And Coding", Lncs, Springer,Pp. 360–36,2000.
  • Hubaux, J. , Buttyan, L. , And Capkun, S. "The Quest For Security In Mobile Ad Hoc Networks", In Proc. Of The Acm Symposium On Mobile Ad Hoc Networking & Computing , 2001(Mobihoc 2001).
  • Capkun, S. , Buttya, L. , And Hubaux, P "Self-Organized Public Key Management For Mobile Ad Hoc Networks", Ieee Trans. Mobile Computing, Vol. 2, No. 1, Pp. 52-64,2003.
  • Chen, L. , And Kudla, C. " Identity Based Authenticated Key Agreement Protocolsfrom Pairings", Tech. Rep. Hpl-2003-25, Hewlett Packard Laboratories, Feb. 12 2003.
  • Clausen, T. , And Jacquet, P. Rfc3626 " Optimized Link State Routing Protocol (Olsr), 2003.
  • Rafaeli, S. And Hutchison, D. (2003). "A Survey Of Key Management For Secure Group Communication", Acm Computing Surveys, Vol. 35, No. 3, Pp. 309-329.
  • Sherman, T. And Mcgrew, A. "Key Establishment In Large Dynamic Groups Using One-Way Function Trees", Ieee Transactions On Software Engineering, Vol. 29, No. 5, Pp. 444-458, 2003.
  • Chien, H. -Y. , And Lin, R. -Y. "Identity-Based Key Agreement Protocol For Mobile Ad-Hoc Networks Using Bilinear Pairing", In Proc. Sensor Networks, Ubiquitous, And Trustworthy Computing , Ieee, Pp. 520–529, 2006.
  • Chien, H. -Y. , And Lin, R. -Y " Improved Id-Based Security Framework For Ad Hoc Network", Ad Hoc Network ,47–60, 2002. .
  • D. Benetti, M. Merro, And L. Vigan`O, "Model Checking Ad Hoc Network Routing Protocols: Aran Vs. Endair A," In Proceedings Of The 8th Ieee International Conference On Software Engineering And Formal Methods (Sefm '10), Pp. 191–202, September 2010.
  • S. Lu, L. Li, K. -Y. Lam, And L. Jia, "Saodv: A Manet Routing Protocol That Can Withstand Black Hole Attack," In Proceedings Of The International Conference On Computational Intelligence And Security (Cis '09), Pp. 421–425, Beijing, China, December 2009.
  • C. H. Lin, W. S. Lai, Y. L. Huang, And M. Chou, "I-Sead: A Secure Routing Protocol Formobileadhoc Networks," Multimedia And Ubiquitous Engineering, Vol. 1, No. 1, Pp. 102–107, 2008.
  • M. O. Pervaiz, M. Cardei, And J. Wu, "Routing Security In Ad Hoc Wireless Networks," Network Security, Pp. 117–142, 2010.
  • M. Sbeiti, A. Wolff, And C. Wietfeld, "Paser: Position Aware Secure And Efficient Route Discovery Protocol Forwireless Mesh Networks," In Proceedings Of The 5th International Conference On Emerging Security Information, Systems And Technologies (Securware '11), Pp. 63–70, Saint Laurent Du Var, France, August 2011.
  • S. Madria And J. Yin, "Serwa: A Secure Routing Protocol Against Wormhole Attacks In Sensor Networks," Ad Hoc Networks, Vol. 7, No. 6, Pp. 1051–1063, 2009.
  • H. -M. Sun, C. -H. Chen, C. -W. Yeh, And Y. -H. Chen, "A Collaborative Routing Protocol Against Routing Disruptions In Manets," Personal And Ubiquitous Computing, Vol. 17, No. 5, Pp. 865–874, 2013.