Open Access Open Access  Restricted Access Subscription or Fee Access

Security Analysis of Secure Routing Protocols over MANET

Pradnya R. Patange, S.P. Medhane

Abstract


Security is one of the important aspects in mobile ad-hoc network (MANET). Also routing algorithm in MANET is different than traditional routing. This paper assesses limits of traditional routing protocols if applied to MANET. This paper also reviews routing protocols currently used in MANET and put focus on security analysis of routing protocol over several possible security attacks like Attacks using modification, Denial of Service attack, Wormhole attack, Impersonation attacks, Attacks Using fabrication, Rushing Attacks etc. Finally this paper emphasis on need for more robust protocol to detect wormhole attacks.


Keywords


MANET, Routing Algorithms, Security Analysis, Secure Routing Protocol, Network Lifetime

Full Text:

PDF

References


Stallings W, Network Security Essentials: Security Attacks. Prentice Hall. , 2000 (pp. 2- 17)

Parul Tomar, M. K. Soni and P.K. Suri ―A Comparative Study for Secure Routing in MANET‖ from YMCA University, MRIU and Kurukshetra University, in International Journal of Computer Applications (0975 – 8887), Volume 4 – No.5, July 2010, pp. 17-22.

C. Siva Ram Murthy and B.S. Manoj. Ad Hoc Wireless Networks, Architecture and Protocols: 2004 Pearson Education (pp. 321-386, 473-526)

Kimaya Sanzgir, Bridget Dahilly, Brian Neil Levine, Clay Shields, Elizabeth M and Belding-Royer ―A Secure Routing Protocol for Ad Hoc Networks‖. Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP‘02), 2002.

Seung Yi, Prasad Naldurg and Robin Kravets in the Dept. of Computer Science, University of Illinois at Urbana-Champaign.

Basagni, S. Conti, M. Giordano, S. Stojmenovi & cacute (Edit). Mobile Ad Hoc Networking: September 2004 Wiley-IEEE Press. (pp. 1-33, 275-300, 330-354), 2004.

Yih-Chun Hu, David B. Johnson and Adrian Perrig. ―Secure Efficient Ad hoc Distance vector routing‖ in the Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and applications (WMCSA‘02).

P. Papadimitratos and Z. Haas. Secure Link State Routing for Mobile Ad Hoc Networks. In IEEE Wksp. On Security and Assurance in Ad Hoc Networks, 2003.

P. Papadimitratos and Z. Haas. Secure Link State Routing for Mobile Ad Hoc Networks. In IEEE Wksp. On Security and Assurance in Ad Hoc Networks, 2003.

M. Zapata and N. Asokan. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. ACM Mobile Computing and Communications Review, vol. 3, no. 6, July 2002, pp. 106-107.

B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. WISE‘02, Atlanta, Georgia, September 2002, pp. 21-30.

P. Michiardi, R. Molva. Core: A Collaborative Reputation mechanism to enforrce node cooperation in Mobile Ad Hoc Networks. In Communication and Multimedia Security Conference, 2002.

S. Buchegger, Jean-Yves Le Boudec. Cooperation of Nodes — Fairness in Dynamic Ad-hoc NeTworks. IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC).

Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker.Mitigating routing misbehavior in mobile ad hoc networks. ACM MobiCom, 2000, pp- 255-265.

Sun Choi, Doo-young Kim, Do-hyeon Lee, Jae-il Jung, ―WAP:Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks‖, In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2008, pp. 343-348.

Wang, W.; Bhargava, B. Visualization of Wormholes in Sensor Networks. In Proceedings of the 2004 ACM workshop on Wireless Security (WiSe), ACM WiSE‘04, Philadelphia, PA, USA, October 2004; pp. 51–60.

W. Wang, B. Bhargava, Y. Lu, and X. Wu, Defending against wormhole attacks in mobile ad hoc networks: Research articles," Wirel. Commun. Mob. Comput., vol. 6,no. 4, pp. 483-503, 2006, 1144444.

Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. IEEE INFOCOM, Mar 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.