Abstract
Open wireless communication medium makes MANETs susceptible to various attacks. Security scheme implementation needs an adequate amount of memory and processing power of networking and communicating devices. But devices’ uses in MANET not satisfying this requirement make implementation of security scheme more challenging. In MANET, absence of networking devices (communicating node works as router as well as host) makes this task more difficult. In this paper, authentication, key distribution center (KDC) along with key pre-distribution techniques-based model has been proposed to secure the AODV routing protocol against most dangerous and frequently happed attacks (black hole, gray hole, rushing attacks, message impersonation, spoofing, fabrication attacks, etc.). In this scheme, two levels of authentication using message authentication code are used. At first level, share key (key table distributed at the time of deployment) is used for authentication, and for second level, second key distributed by KDC at run time is used for generating the authentication code. Key pre-distribution (key table distributed at the time of deployment) is uses for speedup the our algorithm and reduces the overhead of each node to distribute the key during the communication while KDC based second key distribution is uses to enhances attacks prevention capability of our proposed scheme. Simulation results showing in this paper our proposed algorithm working efficiently well in the presence and absence of malicious nodes as compared to state of art AODV protocol and recently published well defined protocols. NS2.35 on Ubuntu 12.04 LTS with 4 GB RAM is used for simulation. PDR, AE2ED, and average TP parameters have been used for testing the performance of our proposed algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Anupam Kumar Sharma, Munesh C. Trivedi, “Performance Comparison of AODV, ZRP and AODVDR Routing Protocols in MANET”, is accepted for publication in 2nd IEEE International Conference CICT 2016, 12–13 Feb 2016.
Munesh C. Trivedi, Anupam Kr. Sharma, “QoS Improvement in MANET using Particle Swarm Optimization Algorithm”, is presented and published in Proceedings of the 2ND Springer’s International Congress on Information and Communication Technology, pp 181–189 (ICICT-2015), Udaipur, Rajasthan, India.
K. V. Arya and S. S. Rajput, “Securing AODV routing protocol in MANET using NMAC with HBKS Technique,” IEEE International Conference on SPIN, pp. 281–285, Feb 2014.
S. S. Rajput and M. C. Trivedi, “Securing ZRP routing protocol in MANET using Authentication Technique,” IEEE International Conference on CICN, pp. 872–877, Nov. 2014.
D. Djenouri et al. “A survey of security issues in mobile ad hoc networks”, IEEE Communications Surveys & Tutorials, Fourth Quarter 2005.
M. Charvalho, “Security in Mobile Ad hoc Networks” Published by the IEEE Computer Society, pp: 72–75, 2008.
Zheng Ming Shen and Johnson P. Thomas, “Security and QoS Self-Optimization in Mobile Ad Hoc Networks” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 7, NO. 9, SEPTEMBER 2008.
M. Guizani et al., “SECURITY IN WIRELESS MOBILE AD HOC AND SENSOR NETWORKS”, IEEE Wireless Communications. October 2007.
S. S. Rajput, V. Kumar and S. K. Paul, “Comparative Analysis of Random Early Detection (RED) and Virtual Output Queue (VOQ) in Differential Service Networks” IEEE International Conference on SPIN, pp. 281–285, Feb 2014.
William Stalling, Cryptography and Network Security, 4th Ed. Pearson Education, India, 2006.
P. Sachan and P. M. Khilar, “Securing AODV routing protocol in MANET based on cryptographic authentication mechanism,” International Journal of Network Security and Its Applications (IJNSA), vol. 3, no. 5, 2011.
D. Djenouri, L Khelladi, N Badache, “A survey of security issues in mobile ad hoc networks”, IEEE communications surveys 7 (4), 2–28, 2005.
R. Sheikh and Mahakal Singh Chande and D. K. Mishra, “Security issues in MANET: A review”, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN), PP: 1–4, 2010.
E. H. T. Issariyakul, “Introduction to Network Simulator NS2,” Springer Science and Business Media, NY, USA, 2009.
C. Perkins, E. Beldingroyer, and S. Das, “AODV RFC 3561,” Internet Engineering Task Force (IETF), 2003. Available at http://datatracker.ietf.org/doc/rfc3561/.
S. S. Rajput, V. Kumar and K. Dubey, “Comparative Analysis of AODV and AODV-DOR routing protocol in MANET” International Journal of Computer Application, vol. 63, no. 22, pp. 19–24, Feb 2013.
N. Sharma, A. Gupta, S.S. Rajput and V. Yadav, “Congestion Control Technique in MANET: A Survey” 2nd IEEE International Conference on CICT, pp. 280–282, Feb. 2016.
B. A. Forouzan, Cryptography and Network Security, 2nd Ed., Tata McGraw-Hill Higher Education, India, 2008.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Malhotra, S., Trivedi, M.C. (2019). Authentication, KDC, and Key Pre-distribution Techniques-Based Model for Securing AODV Routing Protocol in MANET. In: Panigrahi, B., Trivedi, M., Mishra, K., Tiwari, S., Singh, P. (eds) Smart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 669. Springer, Singapore. https://doi.org/10.1007/978-981-10-8968-8_15
Download citation
DOI: https://doi.org/10.1007/978-981-10-8968-8_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8967-1
Online ISBN: 978-981-10-8968-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)