Addressing Security Concerns of Data Exchange in AODV Protocol

The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.





References:
[1] IEEE Computer Society, "IEEE 802.11 Standard, IEEE Standard for
Information Technology", 1999.
http://standards.ieee.org/catalog/olis/lanman.html.
[2] S Corson and J. Macker. Mobile Ad hoc Networking (MANET):
Routing Protocol Performance Issues and Evaluation Considerations.
Internet Request for comment RFC 2501, Jan 1999.
[3] Michael Jarrett, Paul Ward, "Trusted Computing for Protecting Ad-hoc
Routing," cnsr, pp. 61-68, 4th Annual Communication Networks and
Services Research Conference (CNSR'06), 2006.
[4] Muhammad O Pervaiz, Mihaela Cardei and Jei Wu: Routing security in
ad hoc wireless networks, Department of Computer Science and Engg,
Florida Atlantic University, Boca Raton, FL 33431.
[5] C. Perkins and P Bhagwat, "Highly Dynamic Destination Sequenced
Distance Vector Routing DSDV for mobile computers". In ACM
SIGCOMM-94 Conference on Communication Architectures, protocols
and applications, 1994, pp. 234-244.
[6] C.E. Perkins, E. Belding Royer, and S.R. Das, "Ad hoc On demand
distance vector (AODV) routing", IETF RFC 3561, July 2003.
[7] Hao Yang, Haiyun Loo, Fan Ye, Sogwu Lu and Lixia Zhog: Security in
mobile ad hoc networks, challenges solution, Wireless Communication,
IEEE Volume I, issue I publication date Feb 2004.
[8] Bingwen He, Joakin Hagglund, QingGu: Security in Ad hoc Network.
http://www.cse.fau.edu/~jie/research/publications/Publication_files/Sec
ureRouting.pdf
[9] T Friiso, T Brekne, P Haaland, M Radziwill. Security challenges in self
organizing wireless networks. Telenor No ISBN 82-423-0581-1, ISSN
1500-2616, project No TFPFAN programme peer to peer computing
security Gr, Dec 2003.09.08.
[10] Gustav J. Simmons. Symmetric and Assymetric encryption. ACM
Computing surveys (CSUR). Volume 11, Issue 4 pp 305-330, Dec 1979.
[11] Bruce Schneir: Applied Cryptography. John Wiley and sons inc, 1996.
[12] M. G. Zapata, `Secure Ad hoc On-Demand Distance Vector (SAODV)
Routing', INERNET DRAFT, draft-guerrero-manet-saodv-00.txt, Aug.
2001.
[13] [13] Seung Yi, Prasad Naldrug, Robin kravets: A security aware
routing protocol for wireless ad hoc networks, In the proceedings of 3rd
ACM international of mobile ad hoc networking and computing pp 226-
236, 2002.
[14] [14] T. Dierks and C. Allen. The TLS protocol version 1.0 , RFC 2246,
Jan 1999.
[15] Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei: A survey of attacks
and counter measures in mobile ad hoc networks, Department of
Computer Science and Engg, Florida, Atlanta university.
http://student.fau.edu/jchen8/web/papers/SurveyBookchapter.pdf
[16] S. Kent and R. Atkinson. Security architecture for the Internet Protocol.
Internet Request for comment RFC 2401, Internet Engineering Task
Force, Nov.1998.
[17] C. R. Davis. IPSec: Securing VPNs. McGraw-Hill, New York, 2000.
[18] "Advanced Encryption Standard (AES) (FIPS PUB 197). "National
Institute of Standards and Technology (NIST)". Nov 2001.
[19] Project No: IST-507102, Project full title: My Personal Adaptive Global
NET (MAGNET).http://www.istmagnet.org/GetAsset.action?contentId=
942902&assetId=943011