A DIGITAL CERTIFICATION MANAGEMENT MECHANISMS AND SECURITY ROUTING PROTOCOL IN MOBILE AD HOC NETWORK

Luong Thai Ngoc, Vo Thanh Tu
Author affiliations

Authors

DOI:

https://doi.org/10.15625/1813-9663/34/3/12259

Keywords:

AODV, CA, DCMM, MANET, TAMAN, ad hoc network, security protocol

Abstract

Routing services in Mobile Ad hoc Network (MANET) are the goal of denial of service (DoS) attack forms, such as: Blackhole, Sinkhole, Grayhole, Wormhole, Flooding and Whirlwind. There are some related researches to improve of security performance of routing services, such as H(AODV), OTP_AODV, SAODV and ARAN. They require hypothetical conditions that public key infrastructure (PKI) is available.  TAMAN routing protocol supported a digital certificate verification service adaptively and quickly to the dynamic topology of the network without relying on any certification authorities (CA). However, node's digital certificate is installed manually and TAMAN has not digital certificate provision and revocation mechanisms. Hence, it is restricted to operate on MANET  where nodes move randomly. In this article, we propose a Digital Certification Management Mechanisms (DCMM) based on X.509 standard which supports storing digital certificate, provision and revocation without any PKI. We have implemented DCMM on TAMAN protocol and simulated with NS2 using static and mobility scenarios with speed 30m/s. Simulation results show that digital certificates providing process completely after 70 seconds for 100 member nodes using static scenario and 270 seconds using mobility scenario, and TAMAN performance using DCMM is reduced slightly in terms of packet delivery ratio, end-to-end delay and routing load.

Metrics

Metrics Loading ...

References

DARPA. The Network Simulator NS2. [Online]. Available: http://www.isi.edu/nsnam/ns/ http://www.isi.edu/nsnam/ns/">

W. Diffie and M. E. Hellman, “New Directions in Cryptography,” in IEEE Transactions on Information Theory, vol. 22, no. 6, 1976, pp. 644 – 654.

Y. Dong, A.-F. Sui, S. Yiu, V. O. Li, and L. C. Hui, “Providing distributed certificate authority service in cluster-based mobile ad hoc networks,” Computer Communications, vol. 30, no. 11, pp. 2442 – 2452, 2007.

A. B. C. Douss, R. Abassi, and S. G. E. Fatmi, “A Novel Secure Ad hoc Routing Protocol Using One Time Password,” in International Conference on Advanced Logistics and Transport, 2014, pp. 41–46.

A. Eiman and M. Biswanath, “A survey on routing algorithms for Wireless Ad-Hoc and Mesh Networks,” Computer Networks, vol. 56, no. 2, pp. 940 – 965, 2012.

S. Gurung and S. Chauhan, “A novel approach for mitigating gray hole attack in MANET,” Wireless Networks, vol. 24, no. 2, pp. 565 – 579, 2018.

S. Holtmanns and I. Oliver, “SMS and one-time-password interception in LTE networks,” in IEEE International Conference on Communications, vol. 45, 2017, pp. 1–6.

C. Imrich, C. Marco, and J. Jennifer, “Mobile ad hoc networking: imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13 – 64, 2003.

T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2. Springer, 2009.

V. M. Jan, W. Ian, and K. S. Winston, “Security threats and solutions in MANETs: A case study using AODV and SAODV,” Journal of Network and Computer Applications, vol. 35, no. 4, pp. 1249 – 1259, 2012.

D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks. Boston, MA: Springer US, 1996, pp. 153–181.

P. Jones. US secure hash algorithm 1 (SHA1). [Online]. Available: https://tools.ietf.org/html/rfc3174 https://tools.ietf.org/html/rfc3174">

J. Karlsson, L. S. Dooley, and G. Pulkkis, “A New MANET Wormhole Detection Algorithm Based on Traversal Time and Hop Count Analysis,” Sensors, vol. 11, no. 12, pp. 11 122 – 11 140, 2011.

M. Karovaliya, S. O. S. Karedia, and D. R. Kalbande, “Enhanced security for ATM machine with OTP and facial recognition features,” in Procedia Computer Science, vol. 45, 2015, pp. 390–396.

Y. Kitada, A. Watanabe, I. Sasase, and K. Takemori, “On demand distributed public key management for wireless ad hoc networks,” in PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005., 2005, pp. 454–457.

C. Lee, “A Study on Effective Hash Routing in MANET,” Advanced Science and Technology Letters, vol. 95, pp. 47–54, 2015.

G. Z. Manel, “Secure Ad Hoc On-demand Distance Vector Routing,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 3, pp. 106 – 107, 2002.

M. Misagh, M. Ali, and M. S. Seyad, “SEAODV: Secure efficient AODV routing protocol for MANETs networks,” Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS ’09). ACM, New York, NY, USA, pp. 940– 944.

R. Mitchel and I.-R. Chen, “A survey of intrusion detection in wireless network applications,” Computer Communications, vol. 42, pp. 1 – 23, 2014.

M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, “X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP,” in RFC 2560 (Proposed Standard), 1999.

L. T. Ngoc and V. T. Tu, “A novel algorithm based on Trust Authentication Mechanisms to detect and prevent malicious nodes in Mobile Ad hoc Network,” Journal of Computer Science and Cybernetics, vol. 33, no. 4, pp. 357–378, 2017.

——, “A solution to detect and prevent wormhole attacks in Mobile Ad hoc Network,” Journal of Computer Science and Cybernetics, vol. 33, no. 1, pp. 34 – 49, 2017.

——, “Whirlwind: A new method to attack Routing Protocol in Mobile Ad hoc Network,” International Journal of Network Security, vol. 19, no. 5, pp. 832 – 838, 2017.

M. Omar, Y. Challal, and A. Bouabdallah, “Certification-based trust models in mobile ad hoc networks: A survey and taxonomy,” Journal of Network and Computer Applications, vol. 35, no. 1, pp. 268–286, 2012.

C. E. Perkins and E. M. Royer, “Ad-hoc On-Demand Distance Vector Routing,” in Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999, pp. 90 –100.

R. D. Pietro, S. Guarino, N. Verde, and J. Domingo-Ferrer, “Security in Wireless Ad-hoc Networks - A survey,” Computer Communications, vol. 51, pp. 1 – 20, 2014.

R. Rivest, “The MD5 message-digest algorithm,” Internet Request For Comments 1321, April, 1992.

L. Sanchez-Casadoa, G. Macia-Fernandeza, P. Garcia-Teodoroa, and N. Aschenbruckb, “Identification of contamination zones for Sinkhole detection in MANETs,” Journal of Network and Computer Applications, vol. 54, pp. 62 – 77, 2015.

K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “A secure routing protocol for Ad hoc Networks,” in 10th IEEE International Conference on Network Protocols, 2002.

M. Y. Su, “Prevention of selective Black hole attacks on Mobile Ad hoc Networks through Intrusion Detection Systems,” Computer Communications, vol. 34, no. 1, pp. 107 – 117, 2011.

TLS-Library. RSA source code. [Online]. Available: https://tls.mbed.org/rsa-source-code https://tls.mbed.org/rsa-source-code">

V. T. Tu and L. T. Ngoc, “SMA 2AODV: Routing Protocol Reduces the Harm of Flooding Attacks in Mobile Ad Hoc Network,” Journal of Communications, vol. 12, no. 7, pp. 371 – 378, 2017.

Z. Yan, H. Honglin, and F. Masayuki, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications. CRC Press, 2006.

P. Yi, Z. Dai, Y. Zhong, and S. Zhang, “Resisting flooding attacks in ad hoc networks,” International Conference on Information Technology: Coding and Computing (ITCC’ 05), vol. 2, no. 2, pp. 657 – 662, 2005.

S. Yi and R. H. Kravets, “Moca: Mobile certificate authority for wireless ad hoc networks,” in The Second Annual PKI Research Workshop (PKI), 2003.

J. Yoon, M. Liu, and B. Noble, “Random waypoint considered harmful,” in IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), vol. 2, 2003, pp. 1312 – 1321.

Downloads

Published

23-11-2018

How to Cite

[1]
L. T. Ngoc and V. T. Tu, “A DIGITAL CERTIFICATION MANAGEMENT MECHANISMS AND SECURITY ROUTING PROTOCOL IN MOBILE AD HOC NETWORK”, JCC, vol. 34, no. 3, p. 199–217, Nov. 2018.

Issue

Section

Computer Science

Most read articles by the same author(s)