Secure Internet Connectivity for Dynamic Source Routing (DSR) based Mobile Ad hoc Networks

'Secure routing in Mobile Ad hoc networks' and 'Internet connectivity to Mobile Ad hoc networks' have been dealt separately in the past research. This paper proposes a light weight solution for secure routing in integrated Mobile Ad hoc Network (MANET)-Internet. The proposed framework ensures mutual authentication of Mobile Node (MN), Foreign Agent (FA) and Home Agent (HA) to avoid various attacks on global connectivity and employs light weight hop-by-hop authentication and end-to-end integrity to protect the network from most of the potential security attacks. The framework also uses dynamic security monitoring mechanism to monitor the misbehavior of internal nodes. Security and performance analysis show that our proposed framework achieves good security while keeping the overhead and latency minimal.




References:
[1] Y. Sun, E.M. Belding-Royer, and C.E. Perkins: "Internet Connectivity
for Ad hoc Mobile Networks," International Journal of Wireless
Information Networks special issue on Mobile Ad Hoc Networks
(MANETs): Standards, Research, Applications, 9(2), April 2002.
[2] P. Ratanchandani and R. Kravets: "A hybrid Approach to Internet
Connectivity for Mobile Ad Hoc Networks", Proceedings of IEEE
WCNC, 2003.
[3] Panagiotis Papadimitratos and Zygmunt J. Haas: "Secure Routing for
Mobile Ad Hoc Networks" In SCS Communication Networks and
Distributed Systems Modeling and Simulation Conference (CNDS
2002).
[4] Tingyao Jiang, Qinghua Li, Youlin Ruan: "Secure Dynamic Source
Routing Protocol" Proceedings of the Fourth International Conference
on Computer and Information Technology (CIT'04) - Volume 00,
(2004), Pages: 528 - 533.
[5] Bin Xie, and Anup Kumar: "A Framework for Internet and Ad hoc
Network Security", IEEE Symposium on Computers and
Communications (ISCC-2004), June 2004.
[6] Kimaya Sanzgiri, Bridget Dahill, Brian N. Levine, and Elizabeth M.
Belding-Royer: "A secure routing protocol for ad hoc networks",
Proceedings of the 10th IEEE International Conference on Network
protocols (ICNP-02).
[7] D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva: "The Dynamic
Source Routing Protocol for Mobile Ad Hoc Networks (DSR)", http://
www.ietf.org /internet-drafts /draftietf -manet-drIETF draft, 2004.
[8] C. Perkins: "IP Mobility Support for IPv4," IETF RFC 3220, 2002.
[9] F. Kargl, A. Geiß, S. Schlott, M. Weber: "Secure Dynamic Source
Routing", Hawaiian International Conference on System Sciences 38,
Hawaii, USA, January 2005.
[10] Asad Amir Pirzada Chris McDonald, Amitava Datta: "Performance
Comparison of Trust-Based Reactive Routing Protocols" IEEE
Transactions on Mobile Computing, Vol. 5, Issue 6, (June 2006) Pages:
695 - 710.
[11] Leiyuan Li , Chigan C: "Token Routing: A Power Efficient Method for
Securing AODV Routing Protocol", Proceedings of the 2006 IEEE
International Conference on Networking, Sensing and Control, 2006.
ICNSC '06, (April 2006) pages 29- 34.
[12] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M.
Yung: "Perfectly-secure key distribution for dynamic conferences", In
Advances in Cryptology - CRYPTO -92, LNCS 740, (1993)pages 471-
486.
[13] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker: "Mitigating
Routing Misbehaviour in Mobile Ad Hoc Networks". In Proceedings of
the Sixth Annual International Conference on Mobile Computing and
Networking (MobiCom 2000.)
[14] Whitfield Diffie and Martin Hellman: "New directions in cryptography",
IEEE Transactions on information Theory, V olIT-22, no6, (Nov, 1976)
pp. 644-654.