Skip to main content

Secure Routing Protocol for MANET: A Survey

  • Conference paper
  • First Online:
Advances in Communication, Signal Processing, VLSI, and Embedded Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 614))

Abstract

In recent years, the interest in wireless networks has seemingly increasing because of the extensive growth in wireless communication devices. Mobile ad hoc network (MANET) is proved to be one of the emerging wireless network variants because of its unique characteristics such as decentralized nature and dynamic feature. MANET is a collection of wireless devices that are rapidly deployed on go without any fixed infrastructure forming a multi-hop network with the absence of centralized administration. Down the years, MANETs have posed many challenges to researchers in the fields like routing, scheduling, mobility, energy efficiency, security, and so on. Security is a greater challenge for MANET, due to its dynamic behavior and continuously changing topology. In this paper, an attempt is made to provide an insight into the features of wireless ad hoc network system from the perspective of secure routing protocol. The paper not only presents the various attacks experienced in MANETs but also details various security solutions for routing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kumar A, Katiyar VK, Kumar K (2016) Secure routing proposals in MANETs: a review. Int J Found Comput Sci Technol 6(1), January

    Google Scholar 

  2. Wu B, Chen J, Wu J, Cardei M (2006) A survey on attacks and countermeasures in mobile ad hoc networks. Springer, Wireless/Mobile Network Security

    Google Scholar 

  3. Tayal S, Gupta V (2013) A survey of attacks on MANET routing protocols. Int J Innovative Res Sci Eng Technol 2(6), June

    Google Scholar 

  4. Sharma R, Saini A (2010) A study of various security attacks and their countermeasures in MANET. Int J Adv Res Comput Sci Softw Eng 1(1), December

    Google Scholar 

  5. Garg N, Mahapatra RP (2009) MANET security issues. Int J Comput Sci Netw Secur 9(8), August

    Google Scholar 

  6. Lou W, Fang Y (2003) A survey of wireless security in mobile ad hoc networks: challenges and available solutions. Ad Hoc Wireless Networks, Academic Publishers, pp 319–364

    Google Scholar 

  7. Sanzgiri K, Dahill B, Levine BN, Shields C, Belding Royer EM (2002) Secure routing protocol for ad hoc networks. In: Proceeding of 10th IEEE international conference on network protocols, Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA. 12-15, pp 78–87, Nov

    Google Scholar 

  8. Yi P, Zhong YP, Zhang SY, Dai ZL (2006) Flodding attack and defence in ad hoc network. J Syst Engineer Electro 17(2):410–416

    Article  MATH  Google Scholar 

  9. Hu Y, Perrig A, Johnson D (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In: proc. of the ACM workshop on wireless security (WiSe), pp 30–40

    Google Scholar 

  10. Yi S, Naldurg P, Kravets R (2002) Security-aware ad-hoc routing for wireless networks. Report No.UIUCDCS-R-2002–2290, UIUC

    Google Scholar 

  11. Papadimitratos P, Haas ZJ (2016) Secure message transmission in mobile ad hoc networks. Int J Found Comput Sci Technol 6(1), January

    Google Scholar 

  12. El Defrawy K, Tsudik G (2011) ALARM: anonymous location-aided routing in suspicious MANETs. IEEE Trans Mob Comput 10(9):1345–1358

    Article  Google Scholar 

  13. Wei L, Yu M (2011) AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans Veh Technol 63(9):4585–4593

    Google Scholar 

  14. Sinha D, Bhattacharya U, Chaki R (2014) RSRP: a robust secure routing protocol in MANET. Found Comput Decis Sci 39(2):129–154

    Article  Google Scholar 

  15. Lo NW, Chiang MC, Hsu CY (2015) Hash-based anonymous secure routing protocol in mobile ad hoc networks. In: IEEE 10th Asia joint conference on information security (Asia JCIS), pp 5–62

    Google Scholar 

  16. Lupia A, De Rango F (2015) Performance evaluation of secure AODV with trust management under an energy aware perspective. In: IEEE international symposium on performance evaluation of computer and telecommunication systems (SPECTS 2014), Monterey, pp 599–06

    Google Scholar 

  17. Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: proceedings of the 1st ACM workshop on wireless security, NY, pp 1–10

    Google Scholar 

  18. Cerri D, Ghioni A (2008) Securing AODV: the A-SAODV secure routing prototype. IEEE Commun Mag 46(2):120–125

    Article  Google Scholar 

  19. Tan S, Li X, Dong Q (2015) Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw 30:84–98

    Article  Google Scholar 

  20. Ben-Othman J, Benitez YIS (2012) A new method to secure RA-OLSR using IBE. In: IEEE global communications conference (GLOBECOM), Anaheim, CA, pp 354–58

    Google Scholar 

  21. Robert JM, Otrok H, Chriqi A (2012) RBC-OLSR: reputation-based clustering OLSR protocol for wireless ad hoc networks. Comput Commun 35(4):487–499

    Article  Google Scholar 

  22. Xia H, Jia Z, Li X, Ju L, Sha EHM (2013) Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw 11(7):2096–2114

    Article  Google Scholar 

  23. Morshed MM, Islam MR (2013) CBSRP: cluster based secure routing protocol. In: IEEE 3rd international advance computing conference (IACC), Ghaziabad, pp 571–76

    Google Scholar 

  24. Safa H, Artail H, Tabet D (2010) A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wireless Netw 16(4):969–984

    Article  Google Scholar 

  25. Pan NK, Mishra S (2014) Secure hybrid routing for MANET resilient to internal and external attacks. In: ICT and critical infrastructure: proceedings of the 48th annual convention of computer society of India, vol 1. Springer International Publishing, pp 449–58

    Google Scholar 

  26. ElRefaie Y, Nassef L, Saroit IA (2012) Enhancing security of zone-based routing protocol using trust. In: IEEE 8th international conference on informatics and systems (INFOS), Cairo, pp 32–39

    Google Scholar 

  27. Rahman MT, Mahi N, Julkar M (2014) Proposal for SZRP protocol with the establishment of the salted SHA-256 bit HMAC PBKDF2 advance security system in a MANET In: IEEE international conference on electrical engineering and information & communication technology (ICEEICT), Dhaka, pp 1–5

    Google Scholar 

  28. Adnane A, Bidan C, de Sousa Júnior R T (2013) Trust-based security for the OLSR routing protocol. Comput Commun 36(10):1159–1171

    Article  Google Scholar 

  29. Zhang Z (2011) A novel secure routing protocol for MANETs. InTech, pp 455–66

    Google Scholar 

  30. VijayaKumar A, Jeyapal A (2014) Self-adaptive trust based ABR protocol for MANETs using q-learning. Sci World J pp 120–25

    Google Scholar 

  31. Wei WJ, Chen HC, Lin YP (2013) A secure DSDV routing protocol for ad hoc mobile networks. In: IEEE 5th international joint conference on INC, IMS and IDC, Seoul, pp 2079–2084

    Google Scholar 

  32. Huang JW, Woungang I, Chao HC, Obaidat MS, Chi T Y Dhurandher SK (2011) Multi-path trust-based secure AOMDV routing in ad hoc networks. In: IEEE global telecommunications conference (GLOBECOM 2011), Houston, Tx, USA, pp 1–5

    Google Scholar 

  33. Sumaiya V, Patel R, Patel N (2015) Rank base data routing (RBDR) scheme using AOMDV: a proposed scheme for packet drop attack detection and prevention in MANET. In: IEEE international conference on electrical, computer and communication technologies (ICECCT), Coimbatore, pp 1–5

    Google Scholar 

  34. Zhang Y, Yan T, Tian J, Hu Q, Wang G, Li Z (2014) TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. Ad Hoc Netw 21:109–122

    Article  Google Scholar 

  35. Khan S, Loo KK, Din ZU (2010) Framework for intrusion detection in IEEE 802.11 wireless mesh networks. Int Arab J Inf Technol 7(4):435–440

    Google Scholar 

  36. Rafsanjani MK, Movaghar A, Koroupi F (2008) Investigating intrusion detection systems in MANET and comparing IDSs for detecting misbehaving nodes. World Acad Sci Eng Technol 20:351–355

    Google Scholar 

  37. Salmanian M, Li M (2012) Enabling secure and reliable policy-based routing in MANETs. In: IEEE military communications conference, Orlando, FL, pp 1–7

    Google Scholar 

  38. Ramanujan R, Ahamad A, Bonney J, Hagelstrom R, Thurber K (2000) Techniques for intrusion-resistant ad hoc routing algorithms (TIARA). In: MILCOM 2000. 21st century military communications conference proceedings, Vol. 2. pp 660–664

    Google Scholar 

  39. Patel R, Kamboj P (2017) A survey on contemporary MANET security: approaches for securing the MANET. Int J Eng Technol, February

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. J. Abhilash .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abhilash, K.J., Shivaprakasha, K.S. (2020). Secure Routing Protocol for MANET: A Survey. In: Kalya, S., Kulkarni, M., Shivaprakasha, K. (eds) Advances in Communication, Signal Processing, VLSI, and Embedded Systems. Lecture Notes in Electrical Engineering, vol 614. Springer, Singapore. https://doi.org/10.1007/978-981-15-0626-0_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0626-0_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0625-3

  • Online ISBN: 978-981-15-0626-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics