A more secure and scalable routing protocol for mobile ad hoc networks

被引:3
作者
Qabajeh, Liana Khamis [1 ]
Kiah, Miss Laiha Mat [1 ]
Qabajeh, Mohammad Moustafa [2 ]
机构
[1] Univ Malaya, Comp Sci & Informat Technol Fac, Kuala Lumpur, Malaysia
[2] IIUM, Dept Elect & Comp Engn, Kuala Lumpur, Malaysia
关键词
position based; secure; distributed; scalable; routing; routing protocol; mobile; ad hoc; ad hoc networks; wireless networks; location service;
D O I
10.1002/sec.563
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An essential problem in mobile ad hoc networks is finding an efficient and secure route from a source to an intended destination. In this paper, we have proposed a new model of routing protocol named ARANz, which is an extension of the original Authenticated Routing for Ad Hoc Networks (ARAN). ARANz adopts the authentication methods used with ARAN and aims to increase security, achieve robustness and solve the single point of failure and attack problems by introducing multiple local certificate authority servers. Additionally, via dealing with the network as zones and using restricted directional flooding, our new model exhibits better scalability and performance. Through simulation, we evaluated ARANz and compared it with the original ARAN as well as Ad Hoc On-demand Distance Vector. Simulation results show that ARANz is able to effectively discover secure routes within relatively large networks with large number of mobile nodes, while maintaining the minimum packet routing load. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:286 / 308
页数:23
相关论文
共 28 条
[1]  
Abolhasan M., 2004, AD HOC NETW, V2, P1, DOI DOI 10.1016/S1570-8705(03)00043-X
[2]  
[Anonymous], 2002, ACM SIGMOBILE Mob. Comput. Commun. Rev, DOI DOI 10.1145/581291.581312
[3]  
Beijar N., 1998, Zone Routing Protocol (ZRP)?
[4]   Self-organization in mobile ad hoc networks:: The approach of terminodes [J].
Blazevic, L ;
Buttyán, L ;
Capkun, S ;
Giordano, S ;
Hubaux, JP ;
Le Boudec, JY .
IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (06) :166-174
[5]  
Cao YL, 2005, INT C COMMUN CIRCUIT, P303
[6]  
Carter S., 2002, Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), P329
[7]   Securing AODV: The A-SAODV secure routing prototype [J].
Cerri, Davide ;
Ghioni, Alessandro .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (02) :120-125
[8]   A survey of anonymity in wireless communication systems [J].
Chen, Hui ;
Xiao, Yang ;
Hong, Xiaoyan ;
Hu, Fei ;
Xie, Jiang .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (05) :427-444
[9]  
Karp B., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P243, DOI 10.1145/345910.345953
[10]   Location-Aided Routing (LAR) in mobile ad hoc networks [J].
Ko, YB ;
Vaidya, NH .
WIRELESS NETWORKS, 2000, 6 (04) :307-321