Browse > Article
http://dx.doi.org/10.7840/kics.2012.37C.12.1256

Secure Routing Protocol in Cluster-Based Ad Hoc Networks  

Min, Sung-Geun (경북대학교 전자전기컴퓨터학부)
Park, Yo-Han (경북대학교 전자공학과)
Park, Young-Ho (경북대학교 산업전자공학과)
Moon, Sang-Jae (경북대학교 전자전기컴퓨터학부)
Abstract
Mobile ad hoc networks (MANETs) are infrastructure-less, autonomous, and stand-alone wireless networks with dynamic topologies. Recently, cluster-based ad hoc networks which enhance the security and efficiency of ad hoc networks are being actively researched. And routing protocols for cluster-based ad hoc networks are also studied. However, there are few studies about secure routing protocols in cluster-based ad hoc networks. In this paper, we propose secure routing protocol for cluster-based ad hoc networks. We use Diffie-Hellman key agreement, HMAC, and digital signature to support integrity of routing messages, and finally can perform secure routing.
Keywords
Ad hoc Network; Cluster Based; Secure Routing Protocol; Diffie-Hellman; HMAC; Digital Signature; Certification;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proc. IEEE Int. Conf. Network Protocols, pp. 78-87, CA, USA, Nov. 2002.
2 D. Benetti, M. Merro, and L. Vigano', "Model checking ad hoc network routing protocols: ARAN vs. Endaira," in Proc. IEEE Int. Conf. Software Engineering and Formal Methods (SEFM), pp. 191-202, Verona, Italy, Sep. 2010.
3 A. F. A. Abidin, N. S. M. Usop, and N. H. N. Zulkifli, "An analysis on Endaira," Int. J. Comput. Sci. and Eng., vol. 2, no. 3, pp. 437-442, Mar. 2010.
4 M. G. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. WISE, pp. 1-10, NY, USA, Sep. 2002.
5 R. Poosarla, H. Deng, A. Ojha, and D. P. Agrawal, "A cluster Based Secure Routing Scheme for Wireless Ad Hoc Networks," in Proc. IEEE, Int. Conf. Perform., Comput., and Commun., pp. 171-175, OH, USA, April 2004.
6 M. H. Guo, H. T. Liaw, D. J. Deng, and H. C. Chao, "Cluster-based secure communication mechanism in wireless ad hoc networks," Institution of Engineering and Technology Information Security, vol. 4, no. 4, pp. 352-360, Dec. 2010.
7 M. J Kim and Y. I Eom, "Efficient route maintenance scheme for wireless ad-hoc network environments," J. The Korean Institute of communications and Information Sciences(KICS), vol. 30, no. 8A, pp. 639-648, Aug. 2005.   과학기술학회마을
8 C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers," Newslett. ACM SIGCOMM Comput. Commun. Rev., vol. 24, no. 4, pp. 234-244, Oct. 1994.
9 C. E. Perkins, "Ad hoc on demand distance vector (AODV) routing," IETF Internet Draft, July 2003.
10 C. E. Perkins, "Ad hoc on demand distance vector (AODV) routing," in Proc. IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90-100, LA, USA, Feb. 1999.
11 Z. J. Hass and M. R. Pearlman, "The Zone Routing Protocol(ZRP) for Ad Hoc Networks," draft-Ietf-manet-zone-zrp-02.txt, June 1999.
12 M. Rezaee and M. Yaghmaee, "Cluster based Routing for Mobile Ad Hoc networks," J. comput. sci., vol. 8, no. 2, pp. 30-36, June 2009.
13 S. Gupte and M. Singhal, "Secure routing in mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 151-174, Jan. 2003.   DOI   ScienceOn
14 Y. C. Hu and A. Perring, "A survey of secure wireless ad hoc routing," IEEE, Security & Privacy, vol. 2, no. 3, pp. 28-39, June 2004.
15 A. Burak and M. Ufuk, "A formal security analysis of secure AODV using model checking," in Proc. ISCN, pp. 38-44, Istanbul, June 2008.
16 L. Tamilselvan and V. Sankaranarayanan, "Prevention of Blackhole Attack in MANET," in Proc. IEEE Int. Conf. Wireless Broadband and Ultra Wideband Commun., pp. 21-26, Sydney, NSW, Aug. 2007.
17 B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 85-91, Oct. 2007.   DOI   ScienceOn
18 R. H. Khokhar, M. A. Ngadi, and S. Mandala "A review of current routing attacks in mobile ad hoc networks," Int. J. Comput. Sci. and Secur. (IJCSS), vol. 2, no. 3, pp. 18-29, June 2008.
19 M. S. Corson and J. Macker, "Mobile ad hoc networking(MANET): routing protocol performance issues and evaluation considerations," RFC 250, Internet Engineering Task Force, Jan. 1999.
20 M. Abolhasan, T. Wysocki, and E. Dutkiewicz, "A review of routing protocols for mobile ad hoc networks," Ad Hoc Networks, vol. 2, no. 1, pp. 1-22, Jan. 2004.   DOI   ScienceOn
21 B. Swetha and S. A. Kummar & TVS P. Gupta, "Flaws in Endair-A secure routing protocol for manets," Special Issue of Int. J. Comput. Sci. & Inform. (IJCSI), vol. 2, no. 1, pp. 127-132, Jan. 2012.
22 Y. C. Hu, A. Perring, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," J. Wireless Networks, vol. 11, no. 1-2, pp. 21-38, Jan. 2005.   DOI