Advertisement

Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)

  • Ravilla DilliEmail author
  • P. Chandra Sekhar Reddy
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 33)

Abstract

Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the original message. Hash functions are used in message authentication. They are also used in routine software upgrades to make sure that the new software has not been tampered with. SHA-3 is a family of functions based on Keccak, some of them can be implemented with minimal additional circuitry on a chip and are very useful alternatives for providing security in small devices. SHA-3 is not a replacement for SHA-2 but it is offered as a backup. So far, there is no procedure that exists to crack the SHA-2 and still remains secure and viable. In this paper, HMAC-SHA-3 standard algorithms were used to address Data Integrity of the message being sent using AODV routing algorithm for MANETs. Message authentication, confidentiality, Integrity were addressed using secure routing. All possible attacks were addressed in AODV using SHA-3 algorithm and the tool used for simulation was Qualnet 7.4.

Keywords

Hash function Secure hash algorithm Digital signatures HMAC-SHA-3 Message authentication code AODV Qualnet 7.4 

References

  1. 1.
    Govindasamy J, Punniakody S (2017) A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. J Electr Syst Inform Technol. Available online 26 Apr 2017Google Scholar
  2. 2.
    Mazhar N, Farooq M (2011) A hybrid artificial immune system (AIS) model for power aware secure Mobile ad hoc networks (MANETs) routing protocols. Appl Soft Comput 11(8):5695–5714CrossRefGoogle Scholar
  3. 3.
    Banoth R, Narsimha G (2016) Trust based certificate revocation for secure routing in MANET. Procedia Comput Sci 92:431–441Google Scholar
  4. 4.
    Murthy CSR, Manoj BS (2004) Ad hoc wireless networks architectures and protocols. Prentice HallGoogle Scholar
  5. 5.
    Kim J, Tsudik G (2009) SRDP: secure route discovery for dynamic source routing in MANETs. Ad Hoc Netw 7(6):1097–1109CrossRefGoogle Scholar
  6. 6.
    Walikar GA, Rajashekar C (2017) A survey on hybrid routing mechanisms in mobile ad hoc networks. J Netw Comput Appl 77:48–63 (1 Jan 2017)Google Scholar
  7. 7.
    Salehi M, Boukerche A, Amir D (2016) Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw 50:88–101 (1 Nov 2016)Google Scholar
  8. 8.
    Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37:209–227, Part 2 (Feb 2016)Google Scholar
  9. 9.
    Al-Shurman M, Yoo SM, Park S (2004) Black hole attack in mobile ad hoc networks. In: ACMSE’04, 2–3 April 2004, Huntsville, AL, USAGoogle Scholar
  10. 10.
    Medadian M, Yektaie MH, Rahmani AM (2009) Combat with black hole attack in AODV routing protocol in MANET. In: 2009 1st Asian Himalayas international conference on internet, 3–5 Nov 2009Google Scholar
  11. 11.
    Lu S, Li L, Lam KY, Jia L (2009) SAODV: a MANET routing protocol that can withstand black hole attack. In: 2009 international conference on computational intelligence and securityGoogle Scholar
  12. 12.
    Tamilselvan L, Sankaranarayanan V (2007) Prevention of blackhole attack in MANET. In: The 2nd international conference on wireless broadband and ultra wideband communications (AusWireless 2007)Google Scholar
  13. 13.
    Stallings W (2012) Cryptography and network security, 5th edn, pp 310–318Google Scholar
  14. 14.
    Dilli R, Chandra Shekar Reddy P (2015) Routing using trust based system with SHA-2 authentication. Procedia Comput Sci 46:1108–1115Google Scholar
  15. 15.
    Dilli R, Chandra Shekar Reddy P (2015) Enhancing the security of MANETs using hash algorithms. Procedia Comput Sci 54:196–206Google Scholar
  16. 16.
    SHA-3 standard: permutation-based hash and extendable-output functions, federal information processing standards publication, FIPS PUB 202. http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf
  17. 17.
    Siavash B, Mehran MK, Arash RM (2014) Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm. IEEE Trans Comput-Aided Des Integr Circ Syst 33(7) (July 2014)Google Scholar
  18. 18.
    Ramaswamy S, Fu H, Manohar S, Dixon J, Nygard K (2003) Prevention of cooperative black hole attack in wireless ad hoc networksGoogle Scholar
  19. 19.
    Perkins CE, Royer EM (2003) Ad hoc on demand distance vector (AODV) routing. https://tools.ietf.org/id/draft-ietf-manet-aodv-02.txt
  20. 20.
    Satoshi K, Hidehisa N, Nei Kato, Abbas J, Yoshiaki N (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int J Netw Secur 5(3):338–346 (Nov 2007)Google Scholar
  21. 21.
    Raj PN, Swadas PB (2009) Dpraodv: a dyanamic learning system against blackhole attack In AODV based MANET. Int J Comput Sci Issues (IJCSI) 1:54–59 (Aug 2009)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of ECEManipal Institute of TechnologyManipalIndia
  2. 2.Department of ECEJNT UniversityHyderabadIndia

Personalised recommendations