Implementation of a personal area network for secure routing in MANETs by using low-cost hardware

Implementation of a personal area network for secure routing in MANETs by using low-cost hardware

Presently, mobile ad hoc networks (MANETs) are being used extensively in the defense, private, domestic, etc. fields and each of these emulates a personal area network (PAN). A MANET does not require any infrastructure; moreover, it can behave as a mobile network. These features have boosted the popularity of MANETs in the community. As more and more fields become dependent on MANETs, the system needs to be more energy aware and low cost. To commercialize MANETs, the routing protocols need to be lightweight, secure, and energy efficient, and the hardware on which it is to be implemented should be low cost at the same time. In this paper, we have proposed a lightweight, energy aware, secure routing model for MANETs, which has been implemented on low-cost hardware. Our model uses fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that secure neighbor or not. It also uses packets like Report and Recommendation that help the protocol to detect and eliminate the malicious nodes from the network. To make the protocol energy aware we have formulated new battery thresholds, so that the battery can be monitored and losses can be minimized. To observe the results we implement this protocol in hardware, on the Arduino platform, which is a scalable, reliable, cheap, and open source. We observe that our protocol exhibits high packet delivery fraction, low normalize routing load, and low end to end delay, compared to existing secure routing protocols.

___

  • [1] Corson S, Macker J. Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. RFC: Network Working Group 1999.
  • [2] Frodigh M, Johansson P, Larsson P. Wireless ad hoc networking: the art of networking without a network. Ericsson Review 2000; 4: 248-263.
  • [3] Komali K, Mahesh V, Kumar RY. A novel secured protocol for data transmission in ad hoc networks using clustering, International Journal of Computer Science and Information Technologies (IJCSIT) 2014; 5: 6567-6571.
  • [4] Saha HN, Bhattacharyya D, Banerjee B, Mukherjee S, Singh R, Ghosh D. A review on attacks and secure routing protocols in MANET. International Journal of Innovative Research and Review (JIRR) 2013; 1: 12-31.
  • [5] Abdrabou A, Zhuang W. Statistical qos routing for IEEE 802.11 multihop ad hoc networks, IEEE T Wirel Comm 2009, 8: 1542-1552.
  • [6] Sharmila S, Umamaheshwari G, Ruckshana M. Hardware implementation of secure AODV for wireless sensor networks. ICTACT Journal on Communication Technology 2010; 1: 218-229.
  • [7] Dalu S, Naskar MK, Sarkar CK. Implementation of a topology control algorithm for MANETs using nomadic community mobility model. Industrial and Information Systems 2008; 1-5.
  • [8] Passarella A, Delmastro F. Group communication applications for MANETs: requirements and real implementations. CNR, IIT Institute; 1-22.
  • [9] Sanzgiri K, Dahill B, Levine B, Belding-Royer E. A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols (ICNP); 12-15 Nov. 2002, pp. 78-87.
  • [10] Defrawy K. E, Tsudik G. ALARM: anonymous location-aided routing in suspicious MANETs. IEEE T Mobile Comput 2011, 10: 1345-1358.
  • [11] Wan Z, Ren K, Gu M. USOR: an unobservable secure on-demand routing protocol for mobile ad hoc networks. IEEE T Wirel Comm 2012, 11:1922-1332.
  • [12] Zapata M, Asokan N. Securing ad hoc routing protocols. In: Proceedings of the 1st ACM Workshop on Wireless Security, WiSe; Sept 2002, Atlanta GA. pp. 1-10.
  • [13] Guha RK, Zeeshan F, Shahabuddin M. Discovering man-in-the-middle attacks in authentication protocols. Military Communications Conference, MILCOM 2007. IEEE; Oct. 2007; Orlando, FL, USA. pp 29-31.
  • [14] Nekkanti RK, Lee CW. Trust based adaptive on demand ad hoc routing protocol. In: Proceedings of the 42nd Annual Southeast Regional Conference; 2004; pp. 88-93.
  • [15] Wang X, Liu L, Su J. RLM: a general model for trust representation and aggregation. IEEE T Services Comput 2010, 99: 1-14.
  • [16] Cheng N, Govindan K, Mohapatra P. Rendezvous based trust propagation to enhance distributed network security. In INFOCOM 2011, Workshops SCNC, 2011. pp. 1066-1070.
  • [17] Saha HN, Bhattacharyya D, Banerjee PK. Fidelity based on demand secure (FBOD) routing in mobile adhoc network. In: Nagamalai D, Renault E, Dhanuskodi M, editors. Advances in Parallel Distributed Computing. Berlin, Germany: Springer, 2011. Pp. 615-627.
  • [18] Choi S, Kim DY, Lee D, Jung J. WAP: attack prevention algorithm in mobile ad hoc networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing SUTC’08, 11-13 June 2008. pp. 343-348.
  • [19] Chhabra M, Gupta B, Almomani A. A novel solution to handle DDOS attack in MANET. Journal of Information Security 2013, 4: 165-179.
  • [20] Saha HN, Bhattacharyya D, Banerjee B, Mukherjee S, Singh R, Ghosh D. Self-organized key management based on fidelity relationship list and dynamic path. International Journal of Application or Innovation in Engineering & Management July 2014; 3: 97-100.
  • [21] Cano JC, Manzoni P. Evaluating the energy-consumption reduction in a MANET by dynamically switching-off network interfaces. In Proceedings of the 6th IEEE Symposium on Computers and Communications; 3–5 July 2001. pp 186-191.
  • [22] Tarique M, Islam R. Minimum energy dynamic source routing protocol for mobile ad hoc networks. International Journal of Computer Science and Network Security 2007; 7: 304-311.