Skip to main content
Log in

Highly Reputed Authenticated Routing in MANET (HRARAN)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

An ad hoc network is a multi-hop wireless communication network supporting mobile users without any existing infrastructure. Security is an essential requirement in mobile ad hoc network to provide protected communication between mobile nodes by establishing robust and fault free route. Several secure routing protocols like SEAD, SAODV and SRP exists ensuring the three security pillars namely Confidentiality Integrity and Availability. Authenticated Routing for Ad hoc Network (ARAN) fills the void created by deficiencies in other protocols by providing authentication, integrity, and non-repudiation sans confidentiality. The proposed system demands the use of reputation in ad hoc network for efficient trust routers and relays in ARAN by tolerating the overhead caused by communication, computation and storage complexities. Simulation results in NS2 accurately predict the performance of proposed scheme in terms of packet delivery ratio, end-to-end delay, average path length, average route acquisition and control overhead under varying network conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Cayirci, E., & Rong, C. (2009). Security in wireless ad hoc and sensor networks (1st ed.). Chichester, UK: Wiley.

  2. Morgollan, M. (2008). Access authentication. In M. Morgollan (Ed.), Cryptography and security services: Mechanisms and applications (pp. 152–188). Hershey, PA: IGI Global. doi:10.4018/978-1-59904-837-6.ch007

  3. Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector (AODV) routing, in the second IEEE workshop on mobile computing systems and applications. LA: New Orleans.

    Google Scholar 

  4. Broch, J., Johnson, D. B., & Maltz, D. A. (1999). The dynamic source routing protocol for mobile ad hoc networks. IETF Internet Draft MANET Working Group.

  5. Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination sequence-vector routing (DSDV) for mobil computers. Computer Communication Review, 24(4), 34–244.

    Article  Google Scholar 

  6. Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40, 70–75.

  7. Hu, Y. C., Johnson, D. B., Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the 4th IEEE workshop on mobile computing systems & applications (WMCSA 2002), IEEE (pp. 3–13). Calicoon, NY, June 2002.

  8. Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks, In SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, TX, January 27–31, 2002.

  9. Chu-Hsin, L., Wei, Y., & Mei. A secure routing protocol for mobile ad hoc networks. IEEE, Journal No: 978-0-7695-3134-2/08, 2008.

  10. Hu, Y. C., Perrig, A., & Johnson, D. B. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th annual international conference on mobile computing and networking (MobiCom 2002), Atlanta, September 2002, pp. 12–23.

  11. Perrig, R. Canetti, D. Tygar, & Song, D. The TESLA broadcast authentication protocol, RSA cryptobytes (RSA Laboratories) (pp. 2–1). Vol 5, No 2, Summer/Fall 2002.

  12. Hu, Y. C., Perrig, A., & Johnson, D. B. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks, Mobicom’02. In Proceedings of the 8th annual international conference on mobile computing and networking (pp. 12–23). New York, USA: ACM.

  13. Zapata, M. G., & Asokan, N. (2002). Secure ad hoc on-demand distance vector (SAODV) routing. ACM Mobile Computing and Communications Review, 3(6), 106–107.

    Article  Google Scholar 

  14. Seema, M., Bhawna, G., & Preeti, N. (2010). Analyzing security of authenticated routing protocol (ARAN). International Journal on Computer Science and Engineering., 02(03), 664–668.

    Google Scholar 

  15. Mahmoud, A., & Kassas, A. S. S. (2005). Reputed authenticated routing for ad hoc networks protocol (Reputed ARAN), IEEE Journal No: 0-7803-9466-6.

  16. Sudha, R., & Sivakumar, D. (2011). A temporal table authenticated routing protocol for ad hoc networks. In 2011 international conference on Electronics, Communication and Computing Technologies (ICECCT), Pauls Nagar, 12–13 September 2011 (pp. 8–12). IEEE

  17. Singh, Parul, & Singh, Gopal. (2014). Security issues and link expiration in secure routing protocols in MANET: A review. International Journal of Advanced Research in Computer and Communication Engineering, 3(7), 7559–7565.

    Google Scholar 

  18. Zhang, Y., Li, X., & Wang, X. (2008). A cooperative secure routing protocol based on reputation system for ad hoc networks. Journal of Communications, 3(6), 43–50.

    Article  Google Scholar 

  19. Mahmoud, A., Sameh, A., EI-Kassas, S. (2005). Reputed authenticated routing for ad hoc networks protocols (reputed- ARAN). In Proceeding PE-WASUN’05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (pp. 258–259).

  20. Djenouril, D., Mahmoudil, O., Bouamamal, M., Llewellyn-Jones, D., & Merabti, M. (2007) On securing MANET routing protocol against control packet dropping. In IEEE international conference on pervasive services (pp. 100–108). IEEE Computer Society.

  21. Ghazizadeh, S., Ilghami, O., Sirin, E., Yaman, F. (2002). Security aware adaptive dynamic source routing protocol. In Proceedings of the 27th annual IEEE conference on local computer networks (LCN. 02) 0742-1303/02 $17. 00 © 2002 IEEE.

  22. Garg, A., & Beniwal, V. (2012). A review on security issues of routing protocols in mobile ad-hoc networks. International Journal of Advanced Research in Computer Science and Software Engineering, 2(9).

  23. Gowda, S. R., & Hiremath, P. (2013). Review of security approaches in routing protocol in mobile adhoc network. International Journal of Computer Science Issues (IJCSI), 10(1).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Annadurai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Annadurai, P., Vijayalakshmi, S. Highly Reputed Authenticated Routing in MANET (HRARAN). Wireless Pers Commun 83, 455–472 (2015). https://doi.org/10.1007/s11277-015-2403-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2403-5

Keywords

Navigation