Secure Routing Protocol for MANET: A Survey

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 614)


In recent years, the interest in wireless networks has seemingly increasing because of the extensive growth in wireless communication devices. Mobile ad hoc network (MANET) is proved to be one of the emerging wireless network variants because of its unique characteristics such as decentralized nature and dynamic feature. MANET is a collection of wireless devices that are rapidly deployed on go without any fixed infrastructure forming a multi-hop network with the absence of centralized administration. Down the years, MANETs have posed many challenges to researchers in the fields like routing, scheduling, mobility, energy efficiency, security, and so on. Security is a greater challenge for MANET, due to its dynamic behavior and continuously changing topology. In this paper, an attempt is made to provide an insight into the features of wireless ad hoc network system from the perspective of secure routing protocol. The paper not only presents the various attacks experienced in MANETs but also details various security solutions for routing protocols.


MANET Routing protocols Security Attacks 


  1. 1.
    Kumar A, Katiyar VK, Kumar K (2016) Secure routing proposals in MANETs: a review. Int J Found Comput Sci Technol 6(1), JanuaryGoogle Scholar
  2. 2.
    Wu B, Chen J, Wu J, Cardei M (2006) A survey on attacks and countermeasures in mobile ad hoc networks. Springer, Wireless/Mobile Network SecurityGoogle Scholar
  3. 3.
    Tayal S, Gupta V (2013) A survey of attacks on MANET routing protocols. Int J Innovative Res Sci Eng Technol 2(6), JuneGoogle Scholar
  4. 4.
    Sharma R, Saini A (2010) A study of various security attacks and their countermeasures in MANET. Int J Adv Res Comput Sci Softw Eng 1(1), DecemberGoogle Scholar
  5. 5.
    Garg N, Mahapatra RP (2009) MANET security issues. Int J Comput Sci Netw Secur 9(8), AugustGoogle Scholar
  6. 6.
    Lou W, Fang Y (2003) A survey of wireless security in mobile ad hoc networks: challenges and available solutions. Ad Hoc Wireless Networks, Academic Publishers, pp 319–364Google Scholar
  7. 7.
    Sanzgiri K, Dahill B, Levine BN, Shields C, Belding Royer EM (2002) Secure routing protocol for ad hoc networks. In: Proceeding of 10th IEEE international conference on network protocols, Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA. 12-15, pp 78–87, NovGoogle Scholar
  8. 8.
    Yi P, Zhong YP, Zhang SY, Dai ZL (2006) Flodding attack and defence in ad hoc network. J Syst Engineer Electro 17(2):410–416zbMATHCrossRefGoogle Scholar
  9. 9.
    Hu Y, Perrig A, Johnson D (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: proc. of the ACM workshop on wireless security (WiSe), pp 30–40Google Scholar
  10. 10.
    Yi S, Naldurg P, Kravets R (2002) Security-aware ad-hoc routing for wireless networks. Report No.UIUCDCS-R-2002–2290, UIUCGoogle Scholar
  11. 11.
    Papadimitratos P, Haas ZJ (2016) Secure message transmission in mobile ad hoc networks. Int J Found Comput Sci Technol 6(1), JanuaryGoogle Scholar
  12. 12.
    El Defrawy K, Tsudik G (2011) ALARM: anonymous location-aided routing in suspicious MANETs. IEEE Trans Mob Comput 10(9):1345–1358CrossRefGoogle Scholar
  13. 13.
    Wei L, Yu M (2011) AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans Veh Technol 63(9):4585–4593Google Scholar
  14. 14.
    Sinha D, Bhattacharya U, Chaki R (2014) RSRP: a robust secure routing protocol in MANET. Found Comput Decis Sci 39(2):129–154CrossRefGoogle Scholar
  15. 15.
    Lo NW, Chiang MC, Hsu CY (2015) Hash-based anonymous secure routing protocol in mobile ad hoc networks. In: IEEE 10th Asia joint conference on information security (Asia JCIS), pp 5–62Google Scholar
  16. 16.
    Lupia A, De Rango F (2015) Performance evaluation of secure AODV with trust management under an energy aware perspective. In: IEEE international symposium on performance evaluation of computer and telecommunication systems (SPECTS 2014), Monterey, pp 599–06Google Scholar
  17. 17.
    Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: proceedings of the 1st ACM workshop on wireless security, NY, pp 1–10Google Scholar
  18. 18.
    Cerri D, Ghioni A (2008) Securing AODV: the A-SAODV secure routing prototype. IEEE Commun Mag 46(2):120–125CrossRefGoogle Scholar
  19. 19.
    Tan S, Li X, Dong Q (2015) Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw 30:84–98CrossRefGoogle Scholar
  20. 20.
    Ben-Othman J, Benitez YIS (2012) A new method to secure RA-OLSR using IBE. In: IEEE global communications conference (GLOBECOM), Anaheim, CA, pp 354–58Google Scholar
  21. 21.
    Robert JM, Otrok H, Chriqi A (2012) RBC-OLSR: reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput Commun 35(4):487–499CrossRefGoogle Scholar
  22. 22.
    Xia H, Jia Z, Li X, Ju L, Sha EHM (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114CrossRefGoogle Scholar
  23. 23.
    Morshed MM, Islam MR (2013) CBSRP: cluster based secure routing protocol. In: IEEE 3rd international advance computing conference (IACC), Ghaziabad, pp 571–76Google Scholar
  24. 24.
    Safa H, Artail H, Tabet D (2010) A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Netw 16(4):969–984CrossRefGoogle Scholar
  25. 25.
    Pan NK, Mishra S (2014) Secure hybrid routing for MANET resilient to internal and external attacks. In: ICT and critical infrastructure: proceedings of the 48th annual convention of computer society of India, vol 1. Springer International Publishing, pp 449–58Google Scholar
  26. 26.
    ElRefaie Y, Nassef L, Saroit IA (2012) Enhancing security of zone-based routing protocol using trust. In: IEEE 8th international conference on informatics and systems (INFOS), Cairo, pp 32–39Google Scholar
  27. 27.
    Rahman MT, Mahi N, Julkar M (2014) Proposal for SZRP protocol with the establishment of the salted SHA-256 bit HMAC PBKDF2 advance security system in a MANET In: IEEE international conference on electrical engineering and information & communication technology (ICEEICT), Dhaka, pp 1–5Google Scholar
  28. 28.
    Adnane A, Bidan C, de Sousa Júnior R T (2013) Trust-based security for the OLSR routing protocol. Comput Commun 36(10):1159–1171CrossRefGoogle Scholar
  29. 29.
    Zhang Z (2011) A novel secure routing protocol for MANETs. InTech, pp 455–66Google Scholar
  30. 30.
    VijayaKumar A, Jeyapal A (2014) Self-adaptive trust based ABR protocol for MANETs using q-learning. Sci World J pp 120–25Google Scholar
  31. 31.
    Wei WJ, Chen HC, Lin YP (2013) A secure DSDV routing protocol for ad hoc mobile networks. In: IEEE 5th international joint conference on INC, IMS and IDC, Seoul, pp 2079–2084Google Scholar
  32. 32.
    Huang JW, Woungang I, Chao HC, Obaidat MS, Chi T Y Dhurandher SK (2011) Multi-path trust-based secure AOMDV routing in ad hoc networks. In: IEEE global telecommunications conference (GLOBECOM 2011), Houston, Tx, USA, pp 1–5Google Scholar
  33. 33.
    Sumaiya V, Patel R, Patel N (2015) Rank base data routing (RBDR) scheme using AOMDV: a proposed scheme for packet drop attack detection and prevention in MANET. In: IEEE international conference on electrical, computer and communication technologies (ICECCT), Coimbatore, pp 1–5Google Scholar
  34. 34.
    Zhang Y, Yan T, Tian J, Hu Q, Wang G, Li Z (2014) TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. Ad Hoc Netw 21:109–122CrossRefGoogle Scholar
  35. 35.
    Khan S, Loo KK, Din ZU (2010) Framework for intrusion detection in IEEE 802.11 wireless mesh networks. Int Arab J Inf Technol 7(4):435–440Google Scholar
  36. 36.
    Rafsanjani MK, Movaghar A, Koroupi F (2008) Investigating intrusion detection systems in MANET and comparing IDSs for detecting misbehaving nodes. World Acad Sci Eng Technol 20:351–355Google Scholar
  37. 37.
    Salmanian M, Li M (2012) Enabling secure and reliable policy-based routing in MANETs. In: IEEE military communications conference, Orlando, FL, pp 1–7Google Scholar
  38. 38.
    Ramanujan R, Ahamad A, Bonney J, Hagelstrom R, Thurber K (2000) Techniques for intrusion-resistant ad hoc routing algorithms (TIARA). In: MILCOM 2000. 21st century military communications conference proceedings, Vol. 2. pp 660–664Google Scholar
  39. 39.
    Patel R, Kamboj P (2017) A survey on contemporary MANET security: approaches for securing the MANET. Int J Eng Technol, FebruaryGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department E & CEBahubali College of EngineeringShravanabelagolaIndia
  2. 2.Department E & CENMAM Institute of TechnologyNitteIndia

Personalised recommendations