RSRP: A Robust Secure Routing Protocol in MANET

2014 ◽  
Vol 39 (2) ◽  
pp. 129-154 ◽  
Author(s):  
Ditipriya Sinha ◽  
Uma Bhattacharya ◽  
Rituparna Chaki

Abstract In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs). This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR), secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.

Author(s):  
Ditipriya Sinha ◽  
Uma Bhattacharya ◽  
Rituparna Chaki

This chapter gives an overview of research works on secure routing protocol and also describes a Novel Secure Routing Protocol RSRP proposed by the authors. The routes, which are free from any malicious node and which belong to the set of disjoint routes between a source destination pair, are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, the most trustworthy and stable route is selected among those secure routes using some criteria of the nodes present in a route (e.g., battery power, mobility, and trust value). In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and highly secure and robust. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR), secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD, depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay, and packet dropping in presence of malicious nodes in the MANET.


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2018 ◽  
Vol 7 (3.3) ◽  
pp. 279
Author(s):  
Ms Divya ◽  
Dr R. Gobinath

The secured routing protocol expresses an underlying elementary unit confide in information interchanging system. Miserably, presently no anatomy remains to supports in the layout and inquiry of secured routing protocols. This work investigates the structured approaches of secured routing and the interrelating attacker standards to contribute a structure for modeling prime protocols. Based on this anatomy, it is detected that the powerful attacks are targeting the data in the control plane. In this paper the strength of attackers are classified with respect to the locations under its direct control.  


2013 ◽  
Vol 373-375 ◽  
pp. 1931-1934 ◽  
Author(s):  
Yi Min Zhou ◽  
La Yuan Li

The Wireless Sensor Network applications has widely been used over the last few years. WSN is a novel self-organization wireless network which is made up of randomly distributed sensor Nodes. Due to some resource constraints, the design of security in WSN encounters a great many of new challenges. It is vulnerable to attack, which is harmful for availability of WSN. In this paper we propose a trust-aware and location-based secure routing protocol which protects WSN against routing attacks, and also supports large-scale WSN deployments. The proposed protocol is extended from GPSR protocol, which imports security mechanism that depends on a distributed trust management system. The solution has been shown to efficiently detect and avoid malicious nodes.


Energies ◽  
2019 ◽  
Vol 12 (21) ◽  
pp. 4174 ◽  
Author(s):  
Khalid Haseeb ◽  
Ahmad Almogren ◽  
Naveed Islam ◽  
Ikram Ud Din ◽  
Zahoor Jan

Due to the advancement of information and communication technologies, the use of Internet of Things (IoT) devices has increased exponentially. In the development of IoT, wireless sensor networks (WSNs) perform a vital part and comprises of low-cost smart devices for information gathering. However, such smart devices have constraints in terms of computation, processing, memory and energy resources. Along with such constraints, one of the fundamental challenges for WSN is to achieve reliability with the security of transmitted data in a vulnerable environment against malicious nodes. This paper aims to develop an energy-efficient and secure routing protocol (ESR) for intrusion avoidance in IoT based on WSN to increase the network period and data trustworthiness. Firstly, the proposed protocol creates different energy-efficient clusters based on the intrinsic qualities of nodes. Secondly, based on the (k,n) threshold-based Shamir secret sharing scheme, the reliability and security of the sensory information among the base station (BS) and cluster head are achieved. The proposed security scheme presents a light-weight solution to cope with intrusions generated by malicious nodes. The experimental results using the network simulator (NS-2) demonstrate that the proposed routing protocol achieved improvement in terms of network lifetime as 37%, average end-to-end delay as 24%, packet delivery ratio as 30%, average communication cost as 29%, network overhead as 28% and the frequency of route re-discoveries as 38% when compared with the existing work under dynamic network topologies.


At present, Wireless Sensor Networks (WSNs) is fastest growing technology which extensively adopting for various application services including; weather monitoring, traffic prediction, surveillance, research and academic fields etc. As the sensor nodes are randomly deployed in wireless environment, security metrics becomes most promising challenge where communication wirelesses networks facing today. In WSNs, sensor nodes acquires various security concern i.e. vulnerabilities, threats and malicious attacks. Due to the limited resource constraints like bandwidth demand, limited memory, computational cost and minimum energy consumption of sensor nodes makes the network security protocols unachievable. In this context, this comprehensive study provides extensive review of WSNs, various challenges mainly related to security attacks and their solution strategies to strengthen the network performance. The significant contribution of this survey study is to provide the comprehensive report on standard secure routing schemes introduced in the literature and pertaining them to secure and non-secure routing protocols for strengthening the WSNs lifetime. Furthermore, the study considers the most frequently used security protocols published between 2010 to 2019, and investigates the major issues towards the security provisions in WSN, which may help for designing a futuristic routing protocol for any WSNs.


2010 ◽  
Vol 439-440 ◽  
pp. 799-804
Author(s):  
Lan Yao ◽  
Fu Xiang Gao ◽  
Zhi Bin Zhao

It is a significant challenge to design a secure routing protocol for wireless sensor network (WSN), because a WSN has dynamic topology, limited energy, confined computing ability and small memory size. This study explores the algorithm of ensuring security in routing layer for a WSN. In this paper, a multipath secure routing protocol for flat network--MDMP is proposed. Symmetric encryption and asymmetric encryption are exploited to encrypt and authenticate data in the network. Furthermore, malicious nodes will be detected out and isolates. Experiments show that MDMP provides effective immunity to a variety of attacks in WSN and better network performance.


Sign in / Sign up

Export Citation Format

Share Document