Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network

Published: 22 January 2021 Publication History

Abstract

Mobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.

References

[1]
Internet Engineering Task Force, MANET Working Group Charter, Available from: IETF MANET Group Character Sector (2013). https://tools.ietf.org/html/draft-ietf-manet-term [Last Access: 13 January 2020].
[2]
B. Wu, J. Chen, J. Wu, M. Cardei, A survey of attacks and countermeasures in MANET, in Wireless Network Security, Signals and Communication Technology, Springer, Boston, MA, 103–135 (2007).
[3]
Tanwar S, Vora J, Tyagi S, Kumar N, and Obaidat MS A systematic review on security issues in vehicular ad hoc network Secur Privacy 2018 1 5
[4]
Singh J and Singh K Congestion control in vehicular ad hoc network: a review Next-Gener Netw 2018 2018 489-496
[5]
Kumar K, Kumar S, Kaiwartya O, Kashyap PK, Lloret J, and Song H Drone assisted flying ad-hoc networks: mobility and service-oriented modeling using neuro-fuzzy Ad Hoc Netw. 2020 106 102242
[6]
H. Miranda, L. Rodrigues, Preventing selfishness in open mobile ad-hoc networks, in IEEE Proceeding Seventh CaberNet Radicals Workshop, 1–6 (October 2002).
[7]
M. Faisal, S. Abbasa, and H. U. Rahman, "Identity attack detection system for 802.11-based ad hoc networks", EURASIP Journal on Wireless Communications and Networking, 128, (2018).
[8]
L. M. Feeney, M. Nilsson, Investigating the energy consumption of a wireless network interface in an ad-hoc networking environment, in IEEE INFOCOM, Conference on Computer Communications, Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), Anchorage, AK, USA, 1548–1557 (2001).
[9]
A. U Makarfi, K. M Rabie, O. Kaiwartya, X. Li, R. Kharel, Physical layer security in vehicular networks with reconfigurable intelligent surfaces (2019). arXiv preprint arXiv:1912.12183.
[10]
Buttyan L and Hubaux JP Security and Cooperation in Wireless Networks. A Graduate Text Book 2007 Cambridge. Cambridge University Press
[11]
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad-hoc networks, in 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 255–265 (August 2000).
[12]
Qureshi KN, Abdullah AH, Kaiwartya O, Iqbal S, Butt RA, and Bashir F A Dynamic congestion control scheme for safety applications in vehicular ad hoc networks Comput. Electr. Eng. 2018 72 774-788
[13]
L. Buttyan, J. P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, IEEE First Annual Workshop on Mobile and Ad-hoc Networking and Computing (Cat. No.00EX444), Boston, MA, USA, USA, 87–96 (August 2000).
[14]
Hubaux JP, Gross T, LeBoudec JY, and Vetterli M Toward self-organized mobile ad-hoc networks: the terminodes project IEEE Commun. Mag. 2001 39 1 118-124
[15]
Kaiwartya O, Kumar S, Lobiyal DK, Abdullah AH, and Hassan AN Performance improvement in geographic routing for vehicular ad hoc networks Sens. MDPI AG, Basel, Switzerland 2014 14 12 22342-22371
[16]
Alotaibi M Security to wireless sensor networks against malicious attacks using Hamming residue method EURASIP J. Wirel. Commun. Network. 2019 2019 8
[17]
S. Buchegger, J. Y. Le Boudec, Performance analysis of the CONFIDANT protocol: cooperation of nodes, fairness in dynamic ad-hoc networks, in 3rd ACM International Symposium on Mobile Ad-hoc Networking and Computing, Switzerland, 226–236, June 2002.
[18]
Zhong S, Chen J, and Yang YR “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks”, IEEE INFOCOM 2003 USA San Francisco 1-11
[19]
Kaiwartya O and Kumar S Guaranteed geocast routing protocol for vehicular adhoc networks in highway traffic environment Wireless Pers. Commun. 2015 83 4 2657-2682
[20]
Jakobsson M, Hubaux JP, and Buttyan L A micropayment scheme encouraging collaboration in multi-hop cellular networks Financial Cryptography, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg 2003 2742 15-33
[21]
Chaudhary B and Singh K Pseudonym generation using genetic algorithm in vehicular ad hoc networks J. Discrete Math. Sci. Cryptograp. 2019 22 4 661-677
[22]
A. U Makarfi, K. M Rabie, O. Kaiwartya, K. Adhikari, X. Li, M. Quiroz-Castellanos, R. Kharel, Reconfigurable intelligent surfaces-enabled vehicular networks: a physical layer security perspective (2020). arXiv preprint arXiv:2004.11288
[23]
Liu K, Deng J, Varshney PK, and Balakrishnan K An acknowledgment-based approach for the detection of routing misbehavior in MANETs IEEE Trans. Mobile Comput. 2007 6 5 536-550
[24]
Abusalah L, Khokhar A, and Guizani M “Trust Aware Routing in Mobile Ad-hoc Networks”, IEEE GLOBECOM, Communications Society, San Francisco 2006 USA CA 1-5
[25]
N. Soganile, T. Baletlwa, B. Moyo, Hybrid Watchdog and Pathrater Algorithm for Improved Security in Mobile Ad-hoc Networks, in International Conference on Wireless Networks, ICWN'15, 162–167 (July 2015).
[26]
Murugan R and Shanmugam A Cluster based trust mechanism for mitigation of internal attacks in mobile ad-hoc networks Int. J. Soft Comput. 2012 7 6 294-301
[27]
Zhou L and Haas Z Securing Ad-hoc Networks IEEE Network Mag. 1999 13 6 24-30
[28]
Singh A, Maheshwari M, and Kumar N “Security and Trust Management in MANET”, Information Technology and Mobile Communication, AIM 2011 Communications in Computer and Information Science, New York: Springer-Verlag. 2011 147 384-387
[29]
Daryabar F, Dehghantanha A, and Broujerdi H Investigation of malware defense and detection techniques Int. J. Digit. Inf. Wirel. Commun. 2011 1 3 645-650
[30]
T. Anantvalee, J. Wu, A survey on intrusion detection in mobile ad-hoc networks, in Wireless Network Security, Springer, Boston, MA, 159–180 (2008).
[31]
Y. Zhang, W. Lee, Y. Huang, Intrusion detection techniques for mobile wireless networks. Mobile Networks and Applications, 1–16 (2003).
[32]
Modi C, Patel D, Borisaniya B, Patel H, Patel A, and Rajarajan M A Survey of intrusion detection techniques in cloud J. Netw. Comput. Appl. 2013 36 1 42-57
[33]
Kumari S, Khan MK, and Atiquzzaman M User authentication schemes for wireless sensor networks: a review Ad-hoc Netw. 2015 27 159-194
[34]
K. Wong, Y. Zheng, J. Cao, S. Wang, A dynamic user authentication scheme for wireless sensor networks, in International Conference on Sensor Networks, Ubiquitous, Trustworthy Computing, IEEE Computer Society, Taichung, Taiwan, 244–251, (June 2006).
[35]
Vaidya B, Makrakis D, and Mouftah H Two-factor mutual authentication with key agreement in wireless sensor networks Secur. Commun. Netw. 2012 9 2 171-183
[36]
Yoo SG, Park KY, and Kim J A security-performance-balanced user authentication scheme for wireless sensor networks Int. J. Distrib. Sens. Netw. 2012 2012 1-11
[37]
Tseng HR, Jan RH, and Yang W An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks, in IEEE Global Communications Conference, Washington 2007 USA DC 985-990
[38]
Khan MK and Alghathbar K Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks Sensors 2010 10 3 2450-2459
[39]
Athmani S, Bilami A, and Boubiche DE EDAK: an efficient dynamic authentication and key management mechanism for heterogeneous WSNs Future Gener. Comput. Syst. 2017 92 789-799
[40]
Ballarini P, Mokdad L, and Monnet Q Modeling tools for detecting DoS attacks in WSNS Secur. Commun. Netw. 2013 6 420-436
[41]
Ferrag MA, Maglaras L, Argyriou A, Kosmanos D, and Janicke H Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes J. Netw. Comput. Appl. 2018 101 55-82
[42]
Sheltami T, Al-Roubaiey A, Shakshuki E, and Mahmoud A Video transmission enhancement in presence of misbehaving nodes in MANETs Int. J. Multimedia Syst. 2009 15 5 273-282
[43]
A. Patwardhan, J. Parker, A. Joshi, M. Iorga, T. Karygiannis, Secure routing and intrusion detection in ad-hoc networks, in 3rd International Conference on Pervasive Computing Communication, 191–199 (August 2005).
[44]
Rivest R, Shamir A, and Adleman L A method for obtaining digital signatures and public-key cryptosystems Commun. ACM 1978 21 2 120-126
[45]
Johnson D and Maltz D Dynamic source routing in ad-hoc wireless networks Mobile Comput. 1996 5 153-181
[46]
Johnson DB, Maltz DA, and Broch J Perkins CE DSR: the dynamic source routing protocol for multi-hop wireless ad-hoc networks Ad-hoc Networking Chapter 5 2001 London Addison-Wesley 139-172
[47]
Om S and Talib M Wireless Ad-hoc network under black-hole attack Int. J. Dig. Inf. Wirel. Commun. Soc. Dig. Inf. Wirel. Commun. 2011 1 3 591-596
[48]
Botan: Crypto and TLS for Modern C++ Library. http://botan.randombit.net/. [Last Access: October 2019].

Cited By

View all
  • (2023)An Efficient and Secure Communication Mechanism for Internet of Things Based Connected DevicesWireless Personal Communications: An International Journal10.1007/s11277-023-10668-x132:2(1401-1422)Online publication date: 7-Aug-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image EURASIP Journal on Wireless Communications and Networking
EURASIP Journal on Wireless Communications and Networking  Volume 2021, Issue 1
Jun 2021
3646 pages
ISSN:1687-1472
EISSN:1687-1499
Issue’s Table of Contents

Publisher

Hindawi Limited

London, United Kingdom

Publication History

Published: 22 January 2021
Accepted: 08 January 2021
Received: 02 July 2020

Author Tags

  1. Mobile ad hoc network
  2. Digital signature
  3. RSA
  4. DSSAM
  5. DSR
  6. 2-ACK
  7. Attacks
  8. PDF
  9. Routing Overhead

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)An Efficient and Secure Communication Mechanism for Internet of Things Based Connected DevicesWireless Personal Communications: An International Journal10.1007/s11277-023-10668-x132:2(1401-1422)Online publication date: 7-Aug-2023

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media