Abstract
In recent years, the interest in wireless networks has seemingly increasing because of the extensive growth in wireless communication devices. Mobile ad hoc network (MANET) is proved to be one of the emerging wireless network variants because of its unique characteristics such as decentralized nature and dynamic feature. MANET is a collection of wireless devices that are rapidly deployed on go without any fixed infrastructure forming a multi-hop network with the absence of centralized administration. Down the years, MANETs have posed many challenges to researchers in the fields like routing, scheduling, mobility, energy efficiency, security, and so on. Security is a greater challenge for MANET, due to its dynamic behavior and continuously changing topology. In this paper, an attempt is made to provide an insight into the features of wireless ad hoc network system from the perspective of secure routing protocol. The paper not only presents the various attacks experienced in MANETs but also details various security solutions for routing protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kumar A, Katiyar VK, Kumar K (2016) Secure routing proposals in MANETs: a review. Int J Found Comput Sci Technol 6(1), January
Wu B, Chen J, Wu J, Cardei M (2006) A survey on attacks and countermeasures in mobile ad hoc networks. Springer, Wireless/Mobile Network Security
Tayal S, Gupta V (2013) A survey of attacks on MANET routing protocols. Int J Innovative Res Sci Eng Technol 2(6), June
Sharma R, Saini A (2010) A study of various security attacks and their countermeasures in MANET. Int J Adv Res Comput Sci Softw Eng 1(1), December
Garg N, Mahapatra RP (2009) MANET security issues. Int J Comput Sci Netw Secur 9(8), August
Lou W, Fang Y (2003) A survey of wireless security in mobile ad hoc networks: challenges and available solutions. Ad Hoc Wireless Networks, Academic Publishers, pp 319–364
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding Royer EM (2002) Secure routing protocol for ad hoc networks. In: Proceeding of 10th IEEE international conference on network protocols, Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA. 12-15, pp 78–87, Nov
Yi P, Zhong YP, Zhang SY, Dai ZL (2006) Flodding attack and defence in ad hoc network. J Syst Engineer Electro 17(2):410–416
Hu Y, Perrig A, Johnson D (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: proc. of the ACM workshop on wireless security (WiSe), pp 30–40
Yi S, Naldurg P, Kravets R (2002) Security-aware ad-hoc routing for wireless networks. Report No.UIUCDCS-R-2002–2290, UIUC
Papadimitratos P, Haas ZJ (2016) Secure message transmission in mobile ad hoc networks. Int J Found Comput Sci Technol 6(1), January
El Defrawy K, Tsudik G (2011) ALARM: anonymous location-aided routing in suspicious MANETs. IEEE Trans Mob Comput 10(9):1345–1358
Wei L, Yu M (2011) AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans Veh Technol 63(9):4585–4593
Sinha D, Bhattacharya U, Chaki R (2014) RSRP: a robust secure routing protocol in MANET. Found Comput Decis Sci 39(2):129–154
Lo NW, Chiang MC, Hsu CY (2015) Hash-based anonymous secure routing protocol in mobile ad hoc networks. In: IEEE 10th Asia joint conference on information security (Asia JCIS), pp 5–62
Lupia A, De Rango F (2015) Performance evaluation of secure AODV with trust management under an energy aware perspective. In: IEEE international symposium on performance evaluation of computer and telecommunication systems (SPECTS 2014), Monterey, pp 599–06
Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: proceedings of the 1st ACM workshop on wireless security, NY, pp 1–10
Cerri D, Ghioni A (2008) Securing AODV: the A-SAODV secure routing prototype. IEEE Commun Mag 46(2):120–125
Tan S, Li X, Dong Q (2015) Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw 30:84–98
Ben-Othman J, Benitez YIS (2012) A new method to secure RA-OLSR using IBE. In: IEEE global communications conference (GLOBECOM), Anaheim, CA, pp 354–58
Robert JM, Otrok H, Chriqi A (2012) RBC-OLSR: reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput Commun 35(4):487–499
Xia H, Jia Z, Li X, Ju L, Sha EHM (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114
Morshed MM, Islam MR (2013) CBSRP: cluster based secure routing protocol. In: IEEE 3rd international advance computing conference (IACC), Ghaziabad, pp 571–76
Safa H, Artail H, Tabet D (2010) A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Netw 16(4):969–984
Pan NK, Mishra S (2014) Secure hybrid routing for MANET resilient to internal and external attacks. In: ICT and critical infrastructure: proceedings of the 48th annual convention of computer society of India, vol 1. Springer International Publishing, pp 449–58
ElRefaie Y, Nassef L, Saroit IA (2012) Enhancing security of zone-based routing protocol using trust. In: IEEE 8th international conference on informatics and systems (INFOS), Cairo, pp 32–39
Rahman MT, Mahi N, Julkar M (2014) Proposal for SZRP protocol with the establishment of the salted SHA-256 bit HMAC PBKDF2 advance security system in a MANET In: IEEE international conference on electrical engineering and information & communication technology (ICEEICT), Dhaka, pp 1–5
Adnane A, Bidan C, de Sousa Júnior R T (2013) Trust-based security for the OLSR routing protocol. Comput Commun 36(10):1159–1171
Zhang Z (2011) A novel secure routing protocol for MANETs. InTech, pp 455–66
VijayaKumar A, Jeyapal A (2014) Self-adaptive trust based ABR protocol for MANETs using q-learning. Sci World J pp 120–25
Wei WJ, Chen HC, Lin YP (2013) A secure DSDV routing protocol for ad hoc mobile networks. In: IEEE 5th international joint conference on INC, IMS and IDC, Seoul, pp 2079–2084
Huang JW, Woungang I, Chao HC, Obaidat MS, Chi T Y Dhurandher SK (2011) Multi-path trust-based secure AOMDV routing in ad hoc networks. In: IEEE global telecommunications conference (GLOBECOM 2011), Houston, Tx, USA, pp 1–5
Sumaiya V, Patel R, Patel N (2015) Rank base data routing (RBDR) scheme using AOMDV: a proposed scheme for packet drop attack detection and prevention in MANET. In: IEEE international conference on electrical, computer and communication technologies (ICECCT), Coimbatore, pp 1–5
Zhang Y, Yan T, Tian J, Hu Q, Wang G, Li Z (2014) TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. Ad Hoc Netw 21:109–122
Khan S, Loo KK, Din ZU (2010) Framework for intrusion detection in IEEE 802.11 wireless mesh networks. Int Arab J Inf Technol 7(4):435–440
Rafsanjani MK, Movaghar A, Koroupi F (2008) Investigating intrusion detection systems in MANET and comparing IDSs for detecting misbehaving nodes. World Acad Sci Eng Technol 20:351–355
Salmanian M, Li M (2012) Enabling secure and reliable policy-based routing in MANETs. In: IEEE military communications conference, Orlando, FL, pp 1–7
Ramanujan R, Ahamad A, Bonney J, Hagelstrom R, Thurber K (2000) Techniques for intrusion-resistant ad hoc routing algorithms (TIARA). In: MILCOM 2000. 21st century military communications conference proceedings, Vol. 2. pp 660–664
Patel R, Kamboj P (2017) A survey on contemporary MANET security: approaches for securing the MANET. Int J Eng Technol, February
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Abhilash, K.J., Shivaprakasha, K.S. (2020). Secure Routing Protocol for MANET: A Survey. In: Kalya, S., Kulkarni, M., Shivaprakasha, K. (eds) Advances in Communication, Signal Processing, VLSI, and Embedded Systems. Lecture Notes in Electrical Engineering, vol 614. Springer, Singapore. https://doi.org/10.1007/978-981-15-0626-0_22
Download citation
DOI: https://doi.org/10.1007/978-981-15-0626-0_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0625-3
Online ISBN: 978-981-15-0626-0
eBook Packages: EngineeringEngineering (R0)