Secure Multipath Routing Protocol for Certificate Exchange in Mobile Ad Hoc Network


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


In Mobile Ad Hoc Networks (MANET), the certificate exchange technique helps the nodes to authenticate themselves with the members in the network before they get joined and starts accessing the network resources. The paths we use for certificate exchange should be secured and reliable. In MANET, the existing routing protocols do not provide security so that an active attacker can alter the control packets which can compromise the routing protocol’s integrity. Also the replay attack occurs when an attacking node listens to packets and then re-broadcast the same packets. In order to overcome these issues, in this paper, we propose a secure multipath routing protocol for certificate exchange which is based on optimized link state routing (OLSR) in MANET. Our proposed approach employs the neighborhood authentication technique that provides integrity. In this technique, the control message such as HELLO and topology control messages are used to construct the routing along with list of shareholder nodes. These control messages assist in attaining and distributing topology information and the generated signatures validates the integrity. Also in order to prevent the replay attacks, the timestamp exchange mechanism is employed. By simulation results we show that the proposed approach offers more security in MANET.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Mobile Ad Hoc Networks (MANET); Optimized Link State Routing (OLSR); Attacks

Full Text:

PDF


References


K. Sahadevaiah and O.B.V. Ramanaiah, “Self-Organized Public Key Cryptography in Mobile Ad Hoc Networks”, Journal of Ubiquitous Computing and Communication.

Jiazi Yi, Asmaa Adnane, Sylvain David, Benoît Parrein, “ Multipath optimized link state routing for mobile ad hoc networks”, Journal Ad Hoc Networks, pp 28-47, Volume 9 Issue 1, 2011.

Mawloud Omar, Yacine Challal, and Abdelmadjid Bouabdallah, “ Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks”, Computers & Security / Computers and Security, pp 199-214, 2009.

Mohamed Amine FERRAG, Mehdi NAFAA, “ Securing the OLSR routing protocol for Ad Hoc Detecting and Avoiding Wormhole Attack”, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011.

Frederic Cuppens, Nora Cuppens-Boulahia, Seila Nuon, Tony Ramard, “Property Based Intrusion Detection to Secure OLSR”, Proceedings of the Third International Conference on Wireless and Mobile Communications, (ICWMC), 2007.

Alia Fourati, Khaldoun Al Agha, “A shared secret-based algorithm for securing the OLSR routing protocol”, 2005

Cedric Adjih, Pascale Minet, Paul Muhlethaler, Emmanuel Baccelli and Thierry Plesse, “ QoS support, security and OSPF interconnection in a MANET using OLSR”, Journal of Telecommunications and Information technology, 2008.

K. Urmila Vidhya, M. Mohana Priya, “ A novel technique for defending routing attacks in OLSR MANET”, IEEE International Conference on Computational Intelligence and Computing Research, 2010

Uike N, Lohkare V, Deulkar B, and Tayde P, “ Mitigation Of Flooding Disruption Attacks In Olsr Network”, International Journal of Networking, Volume 2, Issue 1, pp.-60-63, 2012.

C. Adjih, D. Raffo, & P. Muhlethaler, “Attacks Against OLSR: Distributed Key Management for Security,” 2nd OLSR Interop/ Workshop, (2005).

Ahmed Mohamed Abdalla, Imane Aly Saroit, Amira Kotb, & Ali Hassan Afsari, “ An IDS for Detecting Misbehavior Nodes in Optimized Link State Routing Protocol”, International Journal of Advanced Computer Science, Vol. 1, No. 2, pp. 87-91, 2011.

Gimer Cervera, Michel Barbeau, Joaquin Garcia-Alfaroy and Evangelos Kranakis, “ Mitigation of Topology Control Traffic Attacks in OLSR Networks”, Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS), pp 1-8, 2010.

Gimer Cervera1, Michel Barbeau1, Joaquin Garcia-Alfaro2, and Evangelos Kranakis, “ preventing the Cluster Formation Attack Against the Hierarchical OLSR Protocol”, Proceeding of the 4th Canada-France MITACS conference on Foundations and Practice of Security, pp 118-131, 2011

Shushan Zhao, Akshai Aggarwal, Shuping Liu, Huapeng Wu, “ Secure Routing Protocol in Proactive Security Approach for Mobile Ad-hoc Networks”, IEEE Wireless Communications and Networking Conference (WCNC), pp 2627 – 2632, 2008.

Kitada, Y; Takemori, K; Watanabe, A; Sasase, I. “On Demand Distributed Public Key Management without Considering Routing Tables for Wireless Ad hoc Networks” 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, pp.375-380, 2005.

Hella Kaffel-Ben Ayed, A. Belkhiri, “ Toward a Peer-to-Peer PKI for Mobile Ad-Hoc Networks”, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011

Jaydip Sen, “A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks”, Second International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), pp 476 – 481, 2010.

Hisham Dahshan and James Irvine, “On Demand Self-Organized Public Key Management for Mobile Ad Hoc Networks”, IEEE 69th Vehicular Technology Conference, VTC Spring, 2009.

Priyadarsini, S., Umashankar, S., TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504.

Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.

Network Simulator , http://www.isi.edu/nsnam/ns


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize