SRDP: Secure Route Diversion Policy for Resisting Illegitimate Request in MANET

  • Authors

    • H C Ramaprasad
    • S C Lingareddy
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.16044
  • Mobile Adhoc Network, Adversaries, Attacks, Secure Routing, OLSR, Communication
  • Optimized Link Source Routing (OLSR) is currently identified as one of the robust on-demand protocol in Mobile Adhoc Network (MANET) for offering good communication performance. However, there are very less evidence where it is found to support potential security. After reviewing existing security approaches in MANET, it is found that there is a still an open scope of security in MANET where the potential of OLSR can be harnessed. Hence, this manuscript presents SRDP or Secure Route Diversion Policy that is capable of identifying the incoming threat irrespective of any form of attacks. SRDP allows comprehensive identification of threat and it offers safety to the network by further resisting such incoming messages to be propagated within its secured network. The study outcome shows that SRDP offers good communication performance and retain good balance with cost effectiveness in contrast to existing security schemes.

     

     

  • References

    1. [1] Jonathan Loo, Jaime Lloret Mauri, Jesús Hamilton Ortiz, “Mobile Ad Hoc Networks: Current Status and Future Trendsâ€, CRC Press, 2016.

      [2] A. L. Sandoval Orozco, J. García Matesanz, L. J. García Villalba, “Security Issues in Mobile Ad Hoc Networksâ€, SAGE-JOurnals, International Journal of Distributed Sensor Networks, 2012

      [3] A. Vij and V. Sharma, “Security issues in mobile adhoc network: A survey paperâ€, IEEE International Conference on Computing, Communication and Automation (ICCCA), Noida, pp. 561-566, 2016.

      [4] C. Alocious, H. Xiao and B. Christianson, “Analysis of DoS attacks at MAC Layer in mobile adhoc networksâ€, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, 2015, pp. 811-816.

      [5] H. Amraoui, A. Habbani, A. Hajami, and E. Bilal, “Research Article Security-Based Mechanism for Proactive Routing Schema Using Game Theory Modelâ€, Hindawi Publishing Corporation, pp. 17, 2016

      [6] F. Kandah, Y. Singh and Chonggang Wang, “Colluding injected attack in mobile ad-hoc networksâ€, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, pp. 235-240, 2011.

      [7] H. Moudni, M. Er-Rouidi, H. Mouncif and B. El Hadadi, “Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networksâ€, 2016 13th International Conference on Computer Graphics, Imaging and Visualization (CGiV), Beni Mellal, pp. 385-389, 2016.

      [8] S.Parvin, F. K. Hussainb and S. Ali, “A methodology to counter DoS attacks in mobile IP communicationâ€, Mobile Information Systems, pp. 127-152, 2012.

      [9] Y. Qin and D. Huang, “Least Squares Disclosure Attack in Mobile Ad Hoc Networksâ€, 2011 IEEE International Conference on Communications (ICC), Kyoto, pp. 1-5, 2011.

      [10] M. Sharma, A. Jain and S. Shah, “Wormhole attack in mobile ad-hoc networksâ€, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, pp. 1-4.2016.

      [11] R. Shrestha and S. Y. Nam, “Research Article Trustworthy Event-Information Dissemination in Vehicular Ad Hoc Networksâ€, Hindawi Mobile Information Systems, pp. 16, 2017

      [12] E. d. Silva and L.C.P. Albini, “Research Article SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networksâ€, Hindawi Publishing Corporation, pp. 18, 2016.

      [13] S. Singha and A. Das, “Detection and elimination of the topological threats in mobile ad hoc network: A new approachâ€, 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, pp. 907-911, 2015.

      [14] K. V. Arya and S. S. Rajput, “Securing AODV routing protocol in MANET using NMAC with HBKS techniqueâ€, 2014 International Conference on Signal Processing and Integrated Networks (SPIN), Noida, pp. 281-285, 2014.

      [15] A. B. C. Douss, S. Ayed, R. Abassi, N. Cuppens and S. G. E. Fatmi, “Trust Negotiation Based Approach to Enforce MANET Routing Securityâ€, 2015 10th International Conference on Availability, Reliability and Security, Toulouse, pp. 360-366, 2015.

      [16] P. D. Gawande and Y. Suryavanshi, “Cryptography based secured advanced on demand routing protocol in MANET'sâ€, 2015 International Conference on Communications and Signal Processing (ICCSP), Melmaruvathur, pp. 1478-1481, 2015.

      [17] I. Jawhar, F. Mohammed, J. A. Jaroodi and N. Mohamed, “TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networksâ€, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, pp. 382-387, 2016.

      [18] S. S. Narayanan and S. Radhakrishnan, “Secure AODV to combat black hole attack in MANETâ€, 2013 International Conference on Recent Trends in Information Technology (ICRTIT), Chennai, pp. 447-452, 2013.

      [19] U. Singh, M. Samvatsar, A. Sharma and A. K. Jain, “Detection and avoidance of unified attacks on MANET using trusted secure AODV routing protocolâ€, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, pp. 1-6, 2016.

      [20] W. Wu, N. Huang, L. Sun, and X. Zheng, “Research Article Measurement and Analysis of MANET Resilience with Fault Tolerance Strategiesâ€, Hindawi Mathematical Problems in Engineering, pp. 10, 2017

      [21] H. Xia, J. Yu, Z. Y. Zhang, X. G. Cheng and Z. K. Pan, “Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETsâ€, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, pp. 473-480, 2014.

      [22] H. Amraoui, A. Habbani and A. Hajami, “Effect of selfish behaviour on OLSR and AODV routing protocols in MANETsâ€, 2014 Global Summit on Computer & Information Technology (GSCIT), Sousse, pp. 1-6, 2014.

      [23] J. Ben-othman and Y. I. S. Benitez, “A new method to secure RA-OLSR using IBEâ€, 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, pp. 354-358, 2012.

      [24] A. G. Bowitz, E. G. Graarud, L. Brown and M. G. Jaatun, “BatCave: Adding security to the BATMAN protocolâ€, 2011 Sixth International Conference on Digital Information Management, Melbourn, QLD, pp. 199-204, 2011.

      [25] Y. Jeon, T. H. Kim, Y. Kim and J. Kim, “LT-OLSR: Attack-tolerant OLSR against link spoofingâ€, 37th Annual IEEE Conference on Local Computer Networks, Clearwater, FL, pp. 216-219, 2012.

      [26] N. Schweitzer, A. Stulman, R. D. Margalit and A. Shabtai, “Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networksâ€, in IEEE Transactions on Mobile Computing, vol. 16, no. 8, p. 2174-2183, Aug. 1 2017.

      [27] F. Semchedine, A. Moussaoui, K. Zouaoui and S. Mehamel, “CRY OLSR: Crypto Optimized Link State Routing for MANETâ€, 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, pp. 290-293, 2016.

      [28] Y. Snoussi, J. M. Robert and H. Otrok, “Novel detection mechanisms for malicious attacks targeting the cluster-based OLSR protocolâ€, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Wuhan, pp. 135-140, 2011.

      [29] L. J. G. Villalba, J. G. Matesanz, D. R. Canas and A. L. S. Orozco, “Secure extension to the optimised link state routing protocolâ€, in IET Information Security, vol. 5, no. 3, pp. 163-169, September 2011.

      [30] Seung Yi, Prasad Naldurg, Robin Kravets, “Security-Aware Ad hoc Routing for Wireless Networksâ€, In Second ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc'01), 2001.

      [31] Kimaya Sanzgiri , Bridget Dahill, Brian Neil Levine, Elizabeth Royer, Clay Shields, “A Secure Routing Protocol for Ad Hoc Networksâ€, In 10 Conference on Network Protocols (ICNP), November 2002.

      [32] P. Papadimitratos, Z.J. Haas, P. Samar, “The Secure Routing Protocol (SRP) for Ad Hoc Networksâ€, draft-papadimitratossecure-routing-protocol-00.txt 2002-12-11

      [33] Yih-Chun Hu, David B. Johnson, and Adrian Perrig, “SEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networksâ€, In 4th IEEE Workshop on Mobile Computing Systems & Applications, 2002.

      [34] P. Papadimitratos and Z. Haas, “Secure Link State Routing for Mobile Ad Hoc Networksâ€, In IEEE Wksp. On Security and Assurance in Ad Hoc Networks, 2003.

      [35] Manel Guerrero Zapata , and N. Asokan, “Secure Ad hoc On-Demand Distance Vector (SAODV) Routingâ€, ACM Mobile Computing and Communications Review, vol. 3, no. 6, 106-107, July 2002, pp.

      [36] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour, “SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networksâ€, 2008 IEEE International Conference on Communications, Beijing, pp. 1464-1468, 2008.

  • Downloads

  • How to Cite

    C Ramaprasad, H., & C Lingareddy, S. (2018). SRDP: Secure Route Diversion Policy for Resisting Illegitimate Request in MANET. International Journal of Engineering & Technology, 7(3.12), 290-295. https://doi.org/10.14419/ijet.v7i3.12.16044