Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

A New Security Protocol for Mobile Ad Hoc Networks

Print
PDF
IJCA Special Issue on Communication Security
© 2012 by IJCA Journal
comnetcs - Number 1
Year of Publication: 2012
Authors:
K. Sahadevaiah
Prasad Reddy P.V.G.D.
G. Narsimha

K Sahadevaiah, Prasad Reddy P.V.G.D. and G Narsimha. Article: A New Security Protocol for Mobile Ad Hoc Networks. IJCA Special Issue on Communication Security comnetcs(1):9-15, March 2012. Full text available. BibTeX

@article{key:article,
	author = {K. Sahadevaiah and Prasad Reddy P.V.G.D. and G. Narsimha},
	title = {Article: A New Security Protocol for Mobile Ad Hoc Networks},
	journal = {IJCA Special Issue on Communication Security},
	year = {2012},
	volume = {comnetcs},
	number = {1},
	pages = {9-15},
	month = {March},
	note = {Full text available}
}

Abstract

A mobile ad hoc network (MANET) is a self-organized wireless short-lived network consisting of mobile nodes. The mobile nodes communicate with one another by wireless radio links. The unconstrained nature of a wireless medium of MANETs allows the attackers for interception, injection, and interference of communication among nodes. Various secure routing protocols, such as SAR, ARAN, SAODV, SRP, ARIADNE, SEAD, SMT, SLSP, CONFIDANT, etc. are existing in the literature. But these protocols are either too expensive or have unrealistic requirements. They consume a lot of resources. Security extensions for existing routing protocols do not contain important performance optimizations. In this paper, we propose a new security protocol, called cryptographic hybrid key management for secure routing in MANETs. The proposed security protocol has been implemented in Java SE 6 with light weight Bouncy Castle 1.6 API and empirically evaluated its performance via a security analysis and simulation assessments. The results obtained by the proposed approach have been compared with the results of other approaches. Simulation assessments have shown that the proposed approach has outperformed the others, and is a more effective and efficient way of providing security in MANETs

References

  • C.K. Tok, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Pearson Education, pp. 28-30, 2002.
  • X. Cheng, X. Huang and D.Z Du, Ad Hoc Wireless Networking, Kluwer Academic Publishers, pp. 319-364, 2006.
  • C. Siva Ram Murthy and B.S Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, Pearson Education, 2006.
  • F. Anjum and P. Mouchtaris, Security for Wireless Ad hoc Networks, John Wiley & Sons, 2007.
  • Prasant Mohapatra and Srikanth V. Krishnamurthy, Ad Hoc Networks: Technologies and Protocols, Springer International Edition, 2005.
  • C E. Perkins: Ad Hoc Networks, Addition Wesley, 2001.
  • S. Basagni, M. Conti, S. Giordono and I. Stojmenovic: Mobile Ad Hoc Networks, IEEE Press Wiley, New York, 2003.
  • A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996.
  • L. Zhou and Z. J. Haas: Securing Ad Hoc Networks, IEEE Network Magazine, Vol. 13, No.6, pp. 24–30, 1999.
  • H. Luo, J. Kong, P. Zerfox, S. Lu, and L. Zhang, URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, IEEE/ACM Transactions on Networking, Vol.12, No.6, pp.1049–1063, 2004.
  • B. Lehane, L. Doyle, and D. O’Mahony, Shared RSA Key Generation in a Mobile Ad Hoc Network, Proceedings of IEEE Military Communications Conference (MILCOM), Vol.2, pp.814–819, 2003.
  • B. Zhu, F. Bao, R.H. Deng, M.S. Kankanhalli, and G. Wang, Efficient and Robust Key Management for Large Mobile Ad Hoc Networks, Computer Networks - Elsevier, Vol.48, pp.657–682, 2005.
  • M. Narasimha, G. Tsudik, and J. Yi, On the Utility of Distributed Cryptography and P2P and MANETs: The Case of Membership Control, Proceedings of IEEE International Conference on Network Protocols (ICNP), pp.336–345, 2003.
  • S. Jarecki, N. Saxena, and J.H. Yi, An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol, Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, pp.1–9, 2004.
  • S. Capkun, L. Buttyan, and J. P. Hubaux, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Vol.2, No.1, pp.52–64, 2003.
  • S. Capkun, J. P. Hubaux, and L. Buttyan, Mobile Helps Peer-to-Peer Security, IEEE Transactions on Mobile Computing, Vol.5, No.1, pp.43–51, 2006.Daeseon CHOI, Younho LEE, Yongsu PARK, Seung-hun JIN, and Hyunsoo YOON, Efficient and Secure Self- Organized Public Key Management for Mobile Ad Hoc Networks, IEICE Transactions on Communications,Vol.E91– B, No.11, pp. 3574-3583, 2008.
  • S. Capkuny, L. Buttyan and J. Hubaux, Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph, New Security Paradigms Workshop 2002, Norfolk, Viginia 2002.
  • C. Gandhi and M. Dave, A review of security in mobile ad hoc networks, IETE Technical Review, Vol. 23, No. 6, pp 335-344, 2006.
  • S Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating Routing Misbehavior in Mobile Ad hoc Networks, 6th ACM Annual International Conference on Mobile Computing and Networks (MOBICOM 2000), pp. 255-265, Boston, USA 2000.
  • P. Papadimitratos and Z. J. Haas, Secure Routing for Mobile Ad hoc Networks, Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), pp. 27-31, San Antonio, USA 2002.
  • H. Deng, W. Li and D.P. Agrawal, Routing Security in Wireless Ad hoc Networks, IEEE Communications Magazine, pp. 70-75, 2002.S. Gupta and M. Singhal, Secure Routing in Mobile Wireless Ad hoc Networks, Ad Hoc Networks, Vol.1, pp. 151-174 2003.
  • K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields and E. M. Belding-Royer, A Secure Routing Protocol for Ad hoc Networks, Proceedings of 10th IEEE International Conference on Network Protocols (ICNP2002), pp. 78-87, Paris, France, 2002.
  • L.M. Kornfelder, Toward a Practical Public-Key Cryptosystem, Bachelor’s Thesis, Department of Electrical Engineering., Massachusetts Institute of Technology, Cambridge, 1978.
  • Allen C. Sun: Design and Implementation of Fisheye Routing Protocol for Mobile Ad Hoc Networks, Massachusetts Institute of Technology, USA, 2000.
  • R. Sedgewick: Weighted Graphs, Addison-Wesley, chapter 31, 1983.
  • Internet X.509 Public Key Infrastructure Certificate and CRL Profile - RFC 2459.
  • Weihong Wang, Ying Zhu, and Baochun Li, Self-Managed Heterogeneous Certification in Mobile Ad Hoc Networks, Proceedings of IEEE Vehicular Technology Conference (VTC 2003), Orlando, Florida, 2003.
  • Matei Ciobanu Morogan, Sead Muftic, Certificate Management in Ad Hoc Networks, Symposium on Applications and the Internet Workshops (SAINT'03 Workshops), pp. 337, 2003.
  • H. Dahshan and J. Irvine, On Demand Self Organized Public Key Management for Mobile Ad Hoc Networks, IEEE 69th Vehicular Technology Conference (VTC’09), ISBN: 978-1-4244-2517-4, pp.1-5, 2009.
  • H. Dahshan and J. Irvine, A Robust Self Organized Public Key Management for Mobile Ad Hoc Networks, Security and Communication Networks, Wiley InterScience, pp. 16- 30, Vol.3, 2009.
  • T. A. Driscoll, Learning MATLAB, Siam publishers, ISBN: 978-0-898716-83-2, USA, 2009.
  • Y. Kirani Sigh and B. B. Chaudhuri, MATLAB Programming, Prentice Hall of India, 2007.
  • E. R. Harold, Java Network Programming, Third Edition, O’Reilly Publishers, ISBN: 0-596-00721-3, 2004.