Detecting Attacks in MANET using Secure Zone Routing Protocol

Authors

  • Ritu Aggarwal  M. Tech, Computer science & Engineering, Jagadhri, Haryana, India

Keywords:

ad-hoc networks, secure routing, secure neighbor discovery, digital signature, zone routing protocol, secure zone routing protocol

Abstract

MANET is a wireless network of mobile devices that has the ability to self-configure and self organize and it is characterized by an absence of centralized administration and network infrastructure. In this paper, present Zone Routing Protocol (ZRP); the most popular routing protocol. The importance of the proposed solution lies in the fact that it ensures security as needed by providing a comprehensive architecture of Secure Zone Routing Protocol (SZRP) based on efficient secure neighbor discovery, secure routing packets, detection of malicious nodes, and preventing these nodes from destroying the network. In order to fulfill these objectives, both efficient key management and secure neighbor mechanisms have been designed to be performed prior to the functioning of the protocol. Our approach is based on the Zone Routing Protocol (ZRP); the most popular hybrid routing protocol. The importance of the proposed solution lies in the fact that it ensures security as needed by providing a comprehensive architecture of Secure Zone Routing Protocol (SZRP) based on efficient key management, secure neighbor discovery, secure routing packets, detection of malicious nodes, and preventing these nodes from destroying the network. In order to fulfill these objectives, both efficient key management and secure neighbor mechanisms have been designed to be performed prior to the functioning of the protocol.

References

  1. A. M. Kamal, "Adaptive Secure Routing in Ad Hoc Mobile Network," M.S. Thesis, Dept. Computer and Systems Science, Royal Institute of Technology, Stockholm, Sweden, 2004.
  2. Z. J. Haas, M. R. Pearlman, P. Samer, "The Zone Routing Protocol (ZRP) for Ad Hoc Networks," Internet Draft, 2003, available at: http://tools.ietf.org/id/draft-ietf-MANETs-zone-zrp04.txt.
  3. M. Poturalski, P. Papadimitratos, J. Hubaux, "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility," in Proc. ACM Symposium on Information, Computer & Communication Security ASIACCS’08, Tokyo, Japan, 2008.
  4. M Poturalski, P. Papadimitratos, J. Hubaux, "Secure Neighbor Discovery in Wireless Networks," In Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, 2008.
  5. R. Pickholtz, D. Schilling, L.B. Milstein, "Theory of spread spectrum communications –– a tutorial," IEEE Transactions on Communications, v.5, no. 30, pp. 855–884, 1982.
  6. Y.-C. Hu, D.B. Johnson, A. Perrig, "SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, 2003, v. 1, pp. 175–192.
  7. Hu, Yih-Chun, Adrian Perrig, Dave Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," In Proc. ACM Workshop on Wireless Security, San Diego, WiSe, California, September 2003.
  8. M. G. Zapata, N. Asokan, "Securing Ad Hoc Routing Protocols," in Proc. ACM Workshop on Wireless Security, Grand Hyatt, WiSe, Singapore, ACM Press, 2002, pp. 1–10.
  9. P. Papadimitratos, Z. J. Haas, "Secure Link State Routing for Mobile Ad Hoc Networks," in Proc. IEEE Workshop on Security and Assurance in Ad Hoc Networks, IEEE Press, 2003, pp. 27–31.
  10. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. Belding- Royer, "A Secure Routing Protocol for Ad hoc Networks," in Proc. 10th Ann. Int'l Conf. Network Protocols, Paris, ICNP, France, Nov., 2002, pp. 78-87.
  11. S. Cheung and K. Levitt, "Protecting routing infrastructures from denial of service using cooperative intrusion detection," In Proceedings of the 1997 New Security Paradigms Workshop (September 1998) pp. 94–106.
  12. Y. -C. Hu, A. Perrig, D. Johnson, "Efficient Security Mechanisms for Routing Protocols," in Proc. Network and Distributed System Security Symp., California, NDPSS, Feb. 2003, pp. 57-73.
  13. Y. -C. Hu, A. Perrig, D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," in Proc. 22nd Ann. Joint Conf. IEEE Computer and communications Societie
  14. M. Omar, Y. Challal, and A. Bouabdallah, "Reliable and fully distributed trust model for mobile ad hoc networks," Computers & Security, vol. 28, pp. 199 – 214, 2009.
  15. A. Adnane, C. Bidan, and R. T. de Sousa Junior, "Trustbased security for the olsr routing protocol," Computer Communications, vol. 36, no. 10, pp. 1159–1171, 2013
  16. M. Marimuthu and I. Krishnamurthi, "Enhanced olsr for defense against dos attack in ad hoc networks," Communications and Networks, Journal of, vol. 15, no. 1, pp. 31–37, Feb 2013.
  17. Y. Jeon, T.-H. Kim, Y. Kim, and J. Kim, "Lt-olsr: Attacktolerant olsr against link spoofing," in Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012), ser. LCN ’12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 216–219.
  18. D. Malik, K. Mahajan, and M. Rizvi, "Security for node isolation attack on olsr by modifying mpr selection process," in Networks Soft Computing (ICNSC), 2014 First International Conference on, Aug 2014, pp. 102–106.
  19. A. Adnane, C. Bidan, and R. de Sousa, "Trust-based countermeasures for securing olsr protocol," in Computational Science and Engineering, 2009. CSE ’09. International Conference on, vol. 2, Aug 2009, pp. 745– 752
  20. P. Suresh, R. Kaur, M. Gaur, and V. Laxmi, "Collusion attack resistance through forced mpr switching in olsr," in Wireless Days (WD), 2010 IFIP, Oct 2010, pp. 1–5.
  21. G. Zapata, N. Asokan, "Securing Ad Hoc Routing Protocols," in Proc. ACM Workshop on Wireless Security, Grand Hyatt, WiSe, Singapore, ACM Press, 2002, pp. 1–10.
  22. P. Papadimitratos, Z. J. Haas, "Secure Link State Routing for Mobile Ad Hoc Networks," in Proc. IEEE Workshop on Security and Assurance in Ad Hoc Networks, IEEE Press, 2003, pp. 27–31.
  23. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. Belding- Royer, "A Secure Routing Protocol for Ad hoc Networks," in Proc. 10th Ann. Int'l Conf. Network Protocols, Paris, ICNP, France, Nov., 2002, pp. 78-87.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Ritu Aggarwal, " Detecting Attacks in MANET using Secure Zone Routing Protocol, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1397-1416, March-April-2018.