Skip to main content

Authentication, KDC, and Key Pre-distribution Techniques-Based Model for Securing AODV Routing Protocol in MANET

  • Conference paper
  • First Online:
Book cover Smart Innovations in Communication and Computational Sciences

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 669))

Abstract

Open wireless communication medium makes MANETs susceptible to various attacks. Security scheme implementation needs an adequate amount of memory and processing power of networking and communicating devices. But devices’ uses in MANET not satisfying this requirement make implementation of security scheme more challenging. In MANET, absence of networking devices (communicating node works as router as well as host) makes this task more difficult. In this paper, authentication, key distribution center (KDC) along with key pre-distribution techniques-based model has been proposed to secure the AODV routing protocol against most dangerous and frequently happed attacks (black hole, gray hole, rushing attacks, message impersonation, spoofing, fabrication attacks, etc.). In this scheme, two levels of authentication using message authentication code are used. At first level, share key (key table distributed at the time of deployment) is used for authentication, and for second level, second key distributed by KDC at run time is used for generating the authentication code. Key pre-distribution (key table distributed at the time of deployment) is uses for speedup the our algorithm and reduces the overhead of each node to distribute the key during the communication while KDC based second key distribution is uses to enhances attacks prevention capability of our proposed scheme. Simulation results showing in this paper our proposed algorithm working efficiently well in the presence and absence of malicious nodes as compared to state of art AODV protocol and recently published well defined protocols. NS2.35 on Ubuntu 12.04 LTS with 4 GB RAM is used for simulation. PDR, AE2ED, and average TP parameters have been used for testing the performance of our proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anupam Kumar Sharma, Munesh C. Trivedi, “Performance Comparison of AODV, ZRP and AODVDR Routing Protocols in MANET”, is accepted for publication in 2nd IEEE International Conference CICT 2016, 12–13 Feb 2016.

    Google Scholar 

  2. Munesh C. Trivedi, Anupam Kr. Sharma, “QoS Improvement in MANET using Particle Swarm Optimization Algorithm”, is presented and published in Proceedings of the 2ND Springer’s International Congress on Information and Communication Technology, pp 181–189 (ICICT-2015), Udaipur, Rajasthan, India.

    Google Scholar 

  3. K. V. Arya and S. S. Rajput, “Securing AODV routing protocol in MANET using NMAC with HBKS Technique,” IEEE International Conference on SPIN, pp. 281–285, Feb 2014.

    Google Scholar 

  4. S. S. Rajput and M. C. Trivedi, “Securing ZRP routing protocol in MANET using Authentication Technique,” IEEE International Conference on CICN, pp. 872–877, Nov. 2014.

    Google Scholar 

  5. D. Djenouri et al. “A survey of security issues in mobile ad hoc networks”, IEEE Communications Surveys & Tutorials, Fourth Quarter 2005.

    Google Scholar 

  6. M. Charvalho, “Security in Mobile Ad hoc Networks” Published by the IEEE Computer Society, pp: 72–75, 2008.

    Google Scholar 

  7. Zheng Ming Shen and Johnson P. Thomas, “Security and QoS Self-Optimization in Mobile Ad Hoc Networks” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 7, NO. 9, SEPTEMBER 2008.

    Google Scholar 

  8. M. Guizani et al., “SECURITY IN WIRELESS MOBILE AD HOC AND SENSOR NETWORKS”, IEEE Wireless Communications. October 2007.

    Google Scholar 

  9. S. S. Rajput, V. Kumar and S. K. Paul, “Comparative Analysis of Random Early Detection (RED) and Virtual Output Queue (VOQ) in Differential Service Networks” IEEE International Conference on SPIN, pp. 281–285, Feb 2014.

    Google Scholar 

  10. William Stalling, Cryptography and Network Security, 4th Ed. Pearson Education, India, 2006.

    Google Scholar 

  11. P. Sachan and P. M. Khilar, “Securing AODV routing protocol in MANET based on cryptographic authentication mechanism,” International Journal of Network Security and Its Applications (IJNSA), vol. 3, no. 5, 2011.

    Google Scholar 

  12. D. Djenouri, L Khelladi, N Badache, “A survey of security issues in mobile ad hoc networks”, IEEE communications surveys 7 (4), 2–28, 2005.

    Google Scholar 

  13. R. Sheikh and Mahakal Singh Chande and D. K. Mishra, “Security issues in MANET: A review”, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN), PP: 1–4, 2010.

    Google Scholar 

  14. E. H. T. Issariyakul, “Introduction to Network Simulator NS2,” Springer Science and Business Media, NY, USA, 2009.

    Google Scholar 

  15. C. Perkins, E. Beldingroyer, and S. Das, “AODV RFC 3561,” Internet Engineering Task Force (IETF), 2003. Available at http://datatracker.ietf.org/doc/rfc3561/.

  16. S. S. Rajput, V. Kumar and K. Dubey, “Comparative Analysis of AODV and AODV-DOR routing protocol in MANET” International Journal of Computer Application, vol. 63, no. 22, pp. 19–24, Feb 2013.

    Google Scholar 

  17. N. Sharma, A. Gupta, S.S. Rajput and V. Yadav, “Congestion Control Technique in MANET: A Survey” 2nd IEEE International Conference on CICT, pp. 280–282, Feb. 2016.

    Google Scholar 

  18. B. A. Forouzan, Cryptography and Network Security, 2nd Ed., Tata McGraw-Hill Higher Education, India, 2008.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Munesh C. Trivedi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Malhotra, S., Trivedi, M.C. (2019). Authentication, KDC, and Key Pre-distribution Techniques-Based Model for Securing AODV Routing Protocol in MANET. In: Panigrahi, B., Trivedi, M., Mishra, K., Tiwari, S., Singh, P. (eds) Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 669. Springer, Singapore. https://doi.org/10.1007/978-981-10-8968-8_15

Download citation

Publish with us

Policies and ethics