Abstract
An ad hoc network is a multi-hop wireless communication network supporting mobile users without any existing infrastructure. Security is an essential requirement in mobile ad hoc network to provide protected communication between mobile nodes by establishing robust and fault free route. Several secure routing protocols like SEAD, SAODV and SRP exists ensuring the three security pillars namely Confidentiality Integrity and Availability. Authenticated Routing for Ad hoc Network (ARAN) fills the void created by deficiencies in other protocols by providing authentication, integrity, and non-repudiation sans confidentiality. The proposed system demands the use of reputation in ad hoc network for efficient trust routers and relays in ARAN by tolerating the overhead caused by communication, computation and storage complexities. Simulation results in NS2 accurately predict the performance of proposed scheme in terms of packet delivery ratio, end-to-end delay, average path length, average route acquisition and control overhead under varying network conditions.
Similar content being viewed by others
References
Cayirci, E., & Rong, C. (2009). Security in wireless ad hoc and sensor networks (1st ed.). Chichester, UK: Wiley.
Morgollan, M. (2008). Access authentication. In M. Morgollan (Ed.), Cryptography and security services: Mechanisms and applications (pp. 152–188). Hershey, PA: IGI Global. doi:10.4018/978-1-59904-837-6.ch007
Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector (AODV) routing, in the second IEEE workshop on mobile computing systems and applications. LA: New Orleans.
Broch, J., Johnson, D. B., & Maltz, D. A. (1999). The dynamic source routing protocol for mobile ad hoc networks. IETF Internet Draft MANET Working Group.
Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination sequence-vector routing (DSDV) for mobil computers. Computer Communication Review, 24(4), 34–244.
Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40, 70–75.
Hu, Y. C., Johnson, D. B., Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the 4th IEEE workshop on mobile computing systems & applications (WMCSA 2002), IEEE (pp. 3–13). Calicoon, NY, June 2002.
Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks, In SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, TX, January 27–31, 2002.
Chu-Hsin, L., Wei, Y., & Mei. A secure routing protocol for mobile ad hoc networks. IEEE, Journal No: 978-0-7695-3134-2/08, 2008.
Hu, Y. C., Perrig, A., & Johnson, D. B. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th annual international conference on mobile computing and networking (MobiCom 2002), Atlanta, September 2002, pp. 12–23.
Perrig, R. Canetti, D. Tygar, & Song, D. The TESLA broadcast authentication protocol, RSA cryptobytes (RSA Laboratories) (pp. 2–1). Vol 5, No 2, Summer/Fall 2002.
Hu, Y. C., Perrig, A., & Johnson, D. B. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks, Mobicom’02. In Proceedings of the 8th annual international conference on mobile computing and networking (pp. 12–23). New York, USA: ACM.
Zapata, M. G., & Asokan, N. (2002). Secure ad hoc on-demand distance vector (SAODV) routing. ACM Mobile Computing and Communications Review, 3(6), 106–107.
Seema, M., Bhawna, G., & Preeti, N. (2010). Analyzing security of authenticated routing protocol (ARAN). International Journal on Computer Science and Engineering., 02(03), 664–668.
Mahmoud, A., & Kassas, A. S. S. (2005). Reputed authenticated routing for ad hoc networks protocol (Reputed ARAN), IEEE Journal No: 0-7803-9466-6.
Sudha, R., & Sivakumar, D. (2011). A temporal table authenticated routing protocol for ad hoc networks. In 2011 international conference on Electronics, Communication and Computing Technologies (ICECCT), Pauls Nagar, 12–13 September 2011 (pp. 8–12). IEEE
Singh, Parul, & Singh, Gopal. (2014). Security issues and link expiration in secure routing protocols in MANET: A review. International Journal of Advanced Research in Computer and Communication Engineering, 3(7), 7559–7565.
Zhang, Y., Li, X., & Wang, X. (2008). A cooperative secure routing protocol based on reputation system for ad hoc networks. Journal of Communications, 3(6), 43–50.
Mahmoud, A., Sameh, A., EI-Kassas, S. (2005). Reputed authenticated routing for ad hoc networks protocols (reputed- ARAN). In Proceeding PE-WASUN’05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (pp. 258–259).
Djenouril, D., Mahmoudil, O., Bouamamal, M., Llewellyn-Jones, D., & Merabti, M. (2007) On securing MANET routing protocol against control packet dropping. In IEEE international conference on pervasive services (pp. 100–108). IEEE Computer Society.
Ghazizadeh, S., Ilghami, O., Sirin, E., Yaman, F. (2002). Security aware adaptive dynamic source routing protocol. In Proceedings of the 27th annual IEEE conference on local computer networks (LCN. 02) 0742-1303/02 $17. 00 © 2002 IEEE.
Garg, A., & Beniwal, V. (2012). A review on security issues of routing protocols in mobile ad-hoc networks. International Journal of Advanced Research in Computer Science and Software Engineering, 2(9).
Gowda, S. R., & Hiremath, P. (2013). Review of security approaches in routing protocol in mobile adhoc network. International Journal of Computer Science Issues (IJCSI), 10(1).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Annadurai, P., Vijayalakshmi, S. Highly Reputed Authenticated Routing in MANET (HRARAN). Wireless Pers Commun 83, 455–472 (2015). https://doi.org/10.1007/s11277-015-2403-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2403-5