Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2185216.2185308acmconferencesArticle/Chapter ViewAbstractPublication PagesacwrConference Proceedingsconference-collections
research-article

Identity based secure AODV and TCP for mobile ad hoc networks

Published: 18 December 2011 Publication History

Abstract

Security is a prime requirement for communication between authorized hosts in mobile ad hoc networks(MANETs). Recently, several approaches have been proposed to secure the routing of MANET. However, most of the approaches do not consider the security aspect on data transmission of transmission control protocol (TCP). As a result, several types of security threats in TCP can be observed. In this paper, we propose an identity (ID) based scheme that secures AODV and transmit TCP data to the authorized hosts. The proposed scheme secures the AODV using sequential aggregate signatures (SAS) based on RSA and also securely generates the session key for the MANET nodes to secure the TCP. In the proposed scheme, each node have an ID which is evaluated from its public key and messages are sent along with signature/MAC for authentication purpose. Following the proposed scheme a node cannot change its ID throughout the lifetime of the MANET. Therefore, the scheme is secure against the attacks that are associated with AODV and TCP in MANET. Performance analysis shows that our proposed scheme is secure and efficient against various types of attacks with fairly good overhead.

References

[1]
R. P. C. Kaufman and M. Speciner. Network security private communication in a public world. In Handbook of Wireless Networks and Mobile Computing. Prentice Hall PTR, A division of Pearson Education, 2002.
[2]
W. Diffie and M. E. Hellman. New directions in cryptography. In IEEE Trans. Inf. Theory, volume IT-22, pages 644--654, November 2006.
[3]
U. Ghosh and R. Datta. A secure dynamic ip configuration scheme for mobile ad hoc networks. Ad Hoc Networks, 9(7):1327--1342, 2011.
[4]
H. Hsieh and R. Sivakumar. Transport overwireless networks. In Handbook of Wireless Networks and Mobile Computing. Edited by Ivan Stojmenovic. John Wiley and Sons, 2002.
[5]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th Annual ACM International Conference on Mobile Computing and Networking (MobiCom '02), September 2002.
[6]
D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. in T. Imielinski and H. Korth, editors, Mobile Computing, pages 153--181, Kluwer Academic Publishers, 1996.
[7]
J. Kim and G. Tsudik. Srdp: securing route discovery in dsr. In Mobile and Ubiquitous Systems: Networking and Services, pages 247--258, July 2005.
[8]
P. Papadimitratos and Z. Haas. Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Networks J., 2003.
[9]
P. Papadimitratos and Z. J. Haas. Secure routing for mobile ad hoc networks. In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 27--31 2002.
[10]
C. Perkins, E. Belding-Royer, and S. Das. Ad hoc on-demand distance vector (aodv) routing. draft-ietf-manet-aodv-11.txt, June 2002 (work in progress).
[11]
C. E. Perkins and P. Bhagwat. Highly dynamic destination sequenced distance vector (dsdv) routing for mobile computers. Proc. ACM SIGCOMM Š94 Conf. Communications Architectures, Protocols and Applications, pages 234--244, 1994 (ACM Press).
[12]
A. Perrig, R. Canetti, D. Song, and J. Tygar. Efficient and secure source authentication for multicast. In Proceedings of Network and Distributed System Security Symposium and NDSS'01, pages 35--46, February 2001.
[13]
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer. A secure routing protocol for ad hoc networks. In Proceedings of 10th IEEE International Conference on Network Protocols and ICNP'02, pages 78--87. IEEE Computer Society, 2002.
[14]
H. Shacham. Sequential aggregate signatures from trapdoor homomorphic permutations. 2003.
[15]
B. Wu, J. Chen, J. Wu, and M. Cardei. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security. Springer US, 2007.
[16]
M. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2002.

Cited By

View all
  • (2024)Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing Protocols2024 7th International Conference on Information and Computer Technologies (ICICT)10.1109/ICICT62343.2024.00081(462-467)Online publication date: 15-Mar-2024
  • (2020)An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc NetworksWireless Personal Communications10.1007/s11277-020-07423-xOnline publication date: 12-May-2020
  • (2020)On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc NetworksCombating Security Challenges in the Age of Big Data10.1007/978-3-030-35642-2_5(87-104)Online publication date: 27-May-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACWR '11: Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
December 2011
517 pages
ISBN:9781450310116
DOI:10.1145/2185216
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 December 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AODV
  2. MANET
  3. TCP
  4. attacker
  5. security
  6. signature

Qualifiers

  • Research-article

Conference

ACWR '11

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing Protocols2024 7th International Conference on Information and Computer Technologies (ICICT)10.1109/ICICT62343.2024.00081(462-467)Online publication date: 15-Mar-2024
  • (2020)An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc NetworksWireless Personal Communications10.1007/s11277-020-07423-xOnline publication date: 12-May-2020
  • (2020)On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc NetworksCombating Security Challenges in the Age of Big Data10.1007/978-3-030-35642-2_5(87-104)Online publication date: 27-May-2020
  • (2019)ISDSR+: Improving the Security and Availability of Secure Routing ProtocolIEEE Access10.1109/ACCESS.2019.29163187(74849-74868)Online publication date: 2019
  • (2017)Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi2017 Fifth International Symposium on Computing and Networking (CANDAR)10.1109/CANDAR.2017.68(230-236)Online publication date: Nov-2017
  • (2016)Towards Provable Security of Dynamic Source Routing Protocol and Its ApplicationsAdvances in Conceptual Modeling10.1007/978-3-319-47717-6_20(231-239)Online publication date: 14-Oct-2016
  • (2015)Considering security for ZigBee protocol using message authentication code2015 Annual IEEE India Conference (INDICON)10.1109/INDICON.2015.7443625(1-6)Online publication date: Dec-2015
  • (2015)Term weighting using contextual information for categorization of unstructured text documents2015 Annual IEEE India Conference (INDICON)10.1109/INDICON.2015.7443216(1-4)Online publication date: Dec-2015
  • (2014)Security Enhanced Adaptive TCP for Wireless Ad Hoc NetworksJournal of Information Security10.4236/jis.2014.5401905:04(207-217)Online publication date: 2014
  • (2014)SDRP: secure and dynamic routing protocol for mobile ad-hoc networksIET Networks10.1049/iet-net.2013.00563:3(235-243)Online publication date: 1-Sep-2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media