Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Gateway Discovery Protocol Using Rabin Signature Scheme in MANET

(*) Corresponding author

Authors' affiliations



Mobile ad hoc network is a compilation of various mobile nodes that form the network temporarily and then communicate with each other. The integration of the MANET with the internet enhances the network area and increases the application field of MANET. Different techniques have been proposed for the internet and MANET integration but they mostly work in non-conflicting environment. Due to the congestion in the network, malicious nodes misbehave in the route discovery process. Therefore, integrated internet MANET will not be prevailing without a feasible security solution due to energy constraint and wireless link. In this paper, a secure gateway discovery protocol is proposed that uses sign encryption mechanism that ensures confidentiality goal in heterogeneous environments. Registration process was included to remove the malicious nodes. The proposed protocol removes the threat of anti-confidentiality, anti – authentication and anti - duplication. The efficiency of this protocol is shown through AVISPA tool.
Copyright © 2017 Praise Worthy Prize - All rights reserved.


Mobile Ad Hoc Network; Gateway Discovery Approach; Secure Gateway Discovery Protocol; Analytical Model; Comparison Analysis

Full Text:



A. Radwa, R. Rizk, H. A. Ali, Internet connectivity for mobile ad hoc network: a survey based study, Wireless networks 21, no. 7, 2015, pp. 2369-2394.

Prakash, J., Kumar, R., Saini, J., Maurya, M., Periodicity Based Gateway Discovery Algorithm in Hybrid Multihop Network, (2016) International Review on Computers and Software (IRECOS), 11 (6), pp. 489-501.

R. Kumar, Vanzara, and M. Misra, An efficient mechanism for connecting MANET and Internet through complete adaptive gateway discovery, In First Int. Conference on Communication System Software and Middleware, IEEE, pp. 1-5, 2006.

P. Panos, and J. Zygmunt, Secure routing for mobile ad hoc networks, In the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, 2002, pp. 193-204, January 2002.

C. W. Chen, M.C.Chuang, and C.T.Shyong, An efficient authentication scheme between MANET and WLAN based on mobile ipv6, International Journal of Network Security 1, no. 1, pp. 14-23, 2005.

B. Xie, A .Kumar, A framework for integrated Internet and ad hoc network security, In Computers and Communications Proceedings ninth International Symposium on IEEE, vol. 1, pp. 318-324, 2004.

B.N. Park, W. Lee, C. Lee, J.P. Hong, and J. Kim, LAID: load-adaptive internet gateway discovery for ubiquitous wireless internet access networks, In International Conference on Information Networking, Springer Berlin Heidelberg, pp. 349-358, 2006.

A. S. Ali, V.C. M. Leung, Secure and Efficient Multi-Hop Mobile IP Registration Scheme for MANET-Internet Integrated Architecture, In Proc. of IEEE WCNC, pp.1-6, July 2010.

B. Vaidya,, D. Makrakis, and H. Mouftah, Provisioning secure on-demand routing protocol in mobile ad hoc network, In Internet (AH-ICI) Second Asian Himalayas International Conference on IEEE, pp. 1-5, 2011.

R. Manoharan, S. Mohanalakshmie, Trust based gateway selection scheme for integration of MANET with Internet, In IEEE ICRTIT 2011, June 3-5. MIT, Chennai (2011).

M. Pandya, A. Srivastava, Improvising Performance with Security of AODV Routing for MANET, In International Journal of Computer Application, vol-78, no.11, September 2013.

A.M Ahmed, K.R Khan, Trust Based Secure Gateway Discovery Mechanism for Integrated Internet and MANET, In International Conference on Distributed Computing and Internet Technology, Springer Berlin Heidelberg pp, 103-114, 2013.

W. Stallings, Cryptography and Network Security principles and practices, (Pearson Education Inc, third edition , 2003).

M. O. Rabin, Digitalized signature, Foundations of Secure Computation, eds. R. Lipton and R. De Milo, Academic Press, New York, 155–166.

M. Bellaire, P. Rogaway, The exact security of digital signatures: How to sign with RSA and Rabin, Advances in Cryptology EUROCRYPT’96, Lecture Notes in Computer Science, vol. 1070, Springer-Verlag, Berlin ed. U. Maurer, 399–416.

Avispa a tool for Automated Validation of Internet Security Protocols.

Y. Glouche, T. Genet, O. Heen, O. Courtay, A Security Protocol Animator Tool for AVISPA, In ARTIST-2 workshop on security of embedded systems, Pisa , 2006.

Jay Prakash, Rakesh Kumar and J.P. Saini, 2017, MANET-internet Integration Architecture, In Journal of Applied Sciences, 17: 264-281.

Adnan, A., Hanapi, Z., Geographic Routing Protocols for Wireless Sensor Networks: Design and Security Perspectives, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (4), pp. 197-211.

Enshaei, M., Mohd Hanapi, Z., Othman, M., A Review: Mobile Ad Hoc Networks Challenges, Attacks, Security, Vulnerability and Routing Protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 168-179.

Ramachandran, P., Murukanantham, D., A Location Based-Energy Aware Routing Approach for Mobile Ad Hoc Networks, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (4), pp. 114-123.

Ghadhban, H., Muniyandi, R., Improved Kalman Filter Based LAR in Vehicular Ad Hoc Network, (2016) International Review on Modelling and Simulations (IREMOS), 9 (5), pp. 361-366.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize