SRDP: Secure Route Diversion Policy for Resisting Illegitimate Request in MANET
Keywords:Mobile Adhoc Network, Adversaries, Attacks, Secure Routing, OLSR, Communication
Optimized Link Source Routing (OLSR) is currently identified as one of the robust on-demand protocol in Mobile Adhoc Network (MANET) for offering good communication performance. However, there are very less evidence where it is found to support potential security. After reviewing existing security approaches in MANET, it is found that there is a still an open scope of security in MANET where the potential of OLSR can be harnessed. Hence, this manuscript presents SRDP or Secure Route Diversion Policy that is capable of identifying the incoming threat irrespective of any form of attacks. SRDP allows comprehensive identification of threat and it offers safety to the network by further resisting such incoming messages to be propagated within its secured network. The study outcome shows that SRDP offers good communication performance and retain good balance with cost effectiveness in contrast to existing security schemes.
 Jonathan Loo, Jaime Lloret Mauri, JesÃºs Hamilton Ortiz, â€œMobile Ad Hoc Networks: Current Status and Future Trendsâ€, CRC Press, 2016.
 A. L. Sandoval Orozco, J. GarcÃa Matesanz, L. J. GarcÃa Villalba, â€œSecurity Issues in Mobile Ad Hoc Networksâ€, SAGE-JOurnals, International Journal of Distributed Sensor Networks, 2012
 A. Vij and V. Sharma, â€œSecurity issues in mobile adhoc network: A survey paperâ€, IEEE International Conference on Computing, Communication and Automation (ICCCA), Noida, pp. 561-566, 2016.
 C. Alocious, H. Xiao and B. Christianson, â€œAnalysis of DoS attacks at MAC Layer in mobile adhoc networksâ€, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, 2015, pp. 811-816.
 H. Amraoui, A. Habbani, A. Hajami, and E. Bilal, â€œResearch Article Security-Based Mechanism for Proactive Routing Schema Using Game Theory Modelâ€, Hindawi Publishing Corporation, pp. 17, 2016
 F. Kandah, Y. Singh and Chonggang Wang, â€œColluding injected attack in mobile ad-hoc networksâ€, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, pp. 235-240, 2011.
 H. Moudni, M. Er-Rouidi, H. Mouncif and B. El Hadadi, â€œAttacks against AODV Routing Protocol in Mobile Ad-Hoc Networksâ€, 2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV), Beni Mellal, pp. 385-389, 2016.
 S.Parvin, F. K. Hussainb and S. Ali, â€œA methodology to counter DoS attacks in mobile IP communicationâ€, Mobile Information Systems, pp. 127-152, 2012.
 Y. Qin and D. Huang, â€œLeast Squares Disclosure Attack in Mobile Ad Hoc Networksâ€, 2011 IEEE International Conference on Communications (ICC), Kyoto, pp. 1-5, 2011.
 M. Sharma, A. Jain and S. Shah, â€œWormhole attack in mobile ad-hoc networksâ€, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, pp. 1-4.2016.
 R. Shrestha and S. Y. Nam, â€œResearch Article Trustworthy Event-Information Dissemination in Vehicular Ad Hoc Networksâ€, Hindawi Mobile Information Systems, pp. 16, 2017
 E. d. Silva and L.C.P. Albini, â€œResearch Article SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networksâ€, Hindawi Publishing Corporation, pp. 18, 2016.
 S. Singha and A. Das, â€œDetection and elimination of the topological threats in mobile ad hoc network: A new approachâ€, 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, pp. 907-911, 2015.
 K. V. Arya and S. S. Rajput, â€œSecuring AODV routing protocol in MANET using NMAC with HBKS techniqueâ€, 2014 International Conference on Signal Processing and Integrated Networks (SPIN), Noida, pp. 281-285, 2014.
 A. B. C. Douss, S. Ayed, R. Abassi, N. Cuppens and S. G. E. Fatmi, â€œTrust Negotiation Based Approach to Enforce MANET Routing Securityâ€, 2015 10th International Conference on Availability, Reliability and Security, Toulouse, pp. 360-366, 2015.
 P. D. Gawande and Y. Suryavanshi, â€œCryptography based secured advanced on demand routing protocol in MANET'sâ€, 2015 International Conference on Communications and Signal Processing (ICCSP), Melmaruvathur, pp. 1478-1481, 2015.
 I. Jawhar, F. Mohammed, J. A. Jaroodi and N. Mohamed, â€œTRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networksâ€, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, pp. 382-387, 2016.
 S. S. Narayanan and S. Radhakrishnan, â€œSecure AODV to combat black hole attack in MANETâ€, 2013 International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, pp. 447-452, 2013.
 U. Singh, M. Samvatsar, A. Sharma and A. K. Jain, â€œDetection and avoidance of unified attacks on MANET using trusted secure AODV routing protocolâ€, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, pp. 1-6, 2016.
 W. Wu, N. Huang, L. Sun, and X. Zheng, â€œResearch Article Measurement and Analysis of MANET Resilience with Fault Tolerance Strategiesâ€, Hindawi Mathematical Problems in Engineering, pp. 10, 2017
 H. Xia, J. Yu, Z. Y. Zhang, X. G. Cheng and Z. K. Pan, â€œTrust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETsâ€, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, pp. 473-480, 2014.
 H. Amraoui, A. Habbani and A. Hajami, â€œEffect of selfish behaviour on OLSR and AODV routing protocols in MANETsâ€, 2014 Global Summit on Computer & Information Technology (GSCIT), Sousse, pp. 1-6, 2014.
 J. Ben-othman and Y. I. S. Benitez, â€œA new method to secure RA-OLSR using IBEâ€, 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, pp. 354-358, 2012.
 A. G. Bowitz, E. G. Graarud, L. Brown and M. G. Jaatun, â€œBatCave: Adding security to the BATMAN protocolâ€, 2011 Sixth International Conference on Digital Information Management, Melbourn, QLD, pp. 199-204, 2011.
 Y. Jeon, T. H. Kim, Y. Kim and J. Kim, â€œLT-OLSR: Attack-tolerant OLSR against link spoofingâ€, 37th Annual IEEE Conference on Local Computer Networks, Clearwater, FL, pp. 216-219, 2012.
 N. Schweitzer, A. Stulman, R. D. Margalit and A. Shabtai, â€œContradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networksâ€, in IEEE Transactions on Mobile Computing, vol. 16, no. 8, p. 2174-2183, Aug. 1 2017.
 F. Semchedine, A. Moussaoui, K. Zouaoui and S. Mehamel, â€œCRY OLSR: Crypto Optimized Link State Routing for MANETâ€, 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, pp. 290-293, 2016.
 Y. Snoussi, J. M. Robert and H. Otrok, â€œNovel detection mechanisms for malicious attacks targeting the cluster-based OLSR protocolâ€, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Wuhan, pp. 135-140, 2011.
 L. J. G. Villalba, J. G. Matesanz, D. R. Canas and A. L. S. Orozco, â€œSecure extension to the optimised link state routing protocolâ€, in IET Information Security, vol. 5, no. 3, pp. 163-169, September 2011.
 Seung Yi, Prasad Naldurg, Robin Kravets, â€œSecurity-Aware Ad hoc Routing for Wireless Networksâ€, In Second ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc'01), 2001.
 Kimaya Sanzgiri , Bridget Dahill, Brian Neil Levine, Elizabeth Royer, Clay Shields, â€œA Secure Routing Protocol for Ad Hoc Networksâ€, In 10 Conference on Network Protocols (ICNP), November 2002.
 P. Papadimitratos, Z.J. Haas, P. Samar, â€œThe Secure Routing Protocol (SRP) for Ad Hoc Networksâ€, draft-papadimitratossecure-routing-protocol-00.txt 2002-12-11
 Yih-Chun Hu, David B. Johnson, and Adrian Perrig, â€œSEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networksâ€, In 4th IEEE Workshop on Mobile Computing Systems & Applications, 2002.
 P. Papadimitratos and Z. Haas, â€œSecure Link State Routing for Mobile Ad Hoc Networksâ€, In IEEE Wksp. On Security and Assurance in Ad Hoc Networks, 2003.
 Manel Guerrero Zapata , and N. Asokan, â€œSecure Ad hoc On-Demand Distance Vector (SAODV) Routingâ€, ACM Mobile Computing and Communications Review, vol. 3, no. 6, 106-107, July 2002, pp.
 B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour, â€œSA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networksâ€, 2008 IEEE International Conference on Communications, Beijing, pp. 1464-1468, 2008.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).