Vous êtes sur la page 1sur 9

Wireless Netw

DOI 10.1007/s11276-015-1191-x

Pair-wise key agreement and hop-by-hop authentication protocol


for MANET
K. Shanthi1 • D. Murugan2

 Springer Science+Business Media New York 2016

Abstract In MANET, the most important issues are relatively low bandwidth wireless links. Each node has its
authentication of data packet in the network. Due to the hostile own area of influence, which is called a cell. Cell in a node
environment, security is major concern while data transmis- is an area within which others can receive its transmissions.
sion. In order to overcome this issue, in this paper, we propose Since the nodes in MANET are not fixed, so there are no
hop by hop group key agreement protocol where each node fixed infrastructures. The nodes are free to ramble, so
generates pairwise key for encryption of data. The session key is network topology may change rapidly and randomly over
generated only between the nodes which is carrying the data time, and nodes automatically made their own accommo-
packet for transmission. The key exchange can be performed dating infrastructures [1–6]. There are various applications
between two nodes before data transmission. Ni constructs of MANET like video conferencing, rescue operations,
Lagrange interpolating polynomial with degree n - 1. Each Ni military applications, Disaster Management and so forth [2,
broadcasts the generated polynomial. After that, group key 7].
agreement protocol is used to provide complete authentication
for those nodes. Simulation result show that the proposed 1.2 Attacks on MANET
algorithm is efficient as it minimizes bandwidth usage, delay,
packet drop, and overhead, as well as fulfills all primary secu- There are some attacks on trust in MANET which are given
rity concern, with improved delivery ratio and throughput. as follows:
• Bad Mouthing Attack A node might purposely provide
Keywords MANET  Encryption  Pairwise key 
a bad recommendation of another node in this attack.
Authentication
Recommendation attacks without aggregation are gen-
erally affected where erroneous recommendations are
not evaluated with numerous observations [8–11].
1 Introduction
• Denial of Service (DoS) Attack In DoS attacks,
1.1 Mobile Ad hoc network (MANET) attackers take benefit of trust propagation by means
of consuming as much resources as possible by flooding
A Mobile Ad hoc Network (MANET) is a combination of and previously resource conscious mobile network with
self-organized mobile nodes which are associated with trust commendation.
• On Off Attack In on–off attack, malevolent entities
perform well and badly, on the other hand, on
& K. Shanthi
shanthik0804@gmail.com tenterhooks that they can stay undetected while causing
damage. This attack develops the dynamic properties of
1
Department of Computer Science and Engineering, Cape trust throughout time-domain inconsistence [8].
Institute of Technology, Thirunelveli, Tamilnadu, India • Conflicting Behavior Attack In this type of attack,
2
Department of Computer Science and Engineering, malevolent entities can damage good nodes’ recom-
Manonmaniam Sundaranar University, Tirunelveli 627012, mendation trust by performing differently to different
India

123
Wireless Netw

peers [12]. This node displays incompatible scenery packets at one end in the network and ‘‘tunnels’’ them
where it presents contradictory commendation about a to another end in the network, thereby replaying them
node to different nodes. For the similar reasons as an into the network from that end [23, 28–31].
on–off attack, the presentation of the system should • Colluding Misrelay Attack A number of attackers work
stay same if similar aggregation methods are deployed in collusion to change or crash routing packets to
[13–16]. interrupt routing operation in a MANET in colluding
• Camouflage Attack In camouflage attack, an attacker misrelay attack. This attack is hard to identify by using
will supply recommendations based on the bulk verdict, the conventional methods [23].
and then at times, present fake information to disgrace
the trust scheme. Providing a superior service to
truthful nodes and greatly imprisoning the untruthful
nodes offers shield against this type of attacks. 1.3 Authentication
• Sybil and Newcomer Attacks In this type of attack, a
nasty node can generate bogus IDs that can take the Authentication is a process by which it validate that the
responsibility for malevolent actions. Otherwise, a node client is claimed as an authorized client. Authentication of
is able to create leave and rejoin a network with a new mobile nodes in MANETs can declare authorized clients
ID for malicious attacks as a newcomer to the network. participation. The simplest solution is to make use of an
A trust scheme that has not any centralized adminis- authentication key shared by all nodes in the network.
trative node is defenseless to these types of attacks [17– Authentication is an important security requirement to
21]. avoid attacks against secure communication in MANET
• Collusion Attack Collusion attacks have more than one and to moderate DoS attacks exploiting the restricted
node collaborating to afford fake information concern- resources of sensor nodes [32]. There are some authenti-
ing a normal honest node in recommendation trust cation techniques in MANET: Public Key Infrastructure
schemes. These types of attacks are generally protected (PKI) [33], Timed-Efficient Stream Loss-Tolerant
by neighbor sensing and hybrid approaches [22]. Authentication (TESLA) [33], Elliptic Curve Digital Sig-
Some of the attacks on routing protocol in MANET, nature Algorithm (ECDSA) [33], Lightweight hop-by-hop
which are discussed below. authentication protocol (LHAP) [34], and Digital Signa-
tures Methods [7, 33, 35, 36].
• Flooding Attack In this type of attacks, the attacker In MANET, there is wireless communications linking
wear out the network resources, that is, bandwidth, and mesh clients and mesh routers, as well as surrounded by
to use a node’s resources, that is, computational and mesh routers and gateways that must be secured against
battery power or for disrupting the routing operation to different attacks. So, secure routing in MANET is very
cause harsh degradation in network performance [23– necessary. There are some works on secure routing in
26]. MANET, which are: Partially observed Markov decision
• Black hole Attack A malevolent node sends bogus process (POMDP) [7], Authenticated Routing for Ad hoc
routing information to all nodes showing that it has a Networks (ARAN) [37], Secure Efficient Ad hoc Distance
most advantageous route; hence, it causes other good Vector (SEAD) [38], and A Secure On-Demand Routing
nodes to route data packets through the malicious route. Protocol for Ad Hoc Networks [39, 40].
This information will be received by the node before
the reception of the any other node in the network.
When route is set up, then nasty node is able to drop all
the data or forward it to the unauthenticated nodes [23, 2 Literature review
27].
• Link Spoofing Attack In this type of attack, a malevolent Khaleel et al. [7] have discussed about the problem related
node promotes false links with non-neighbors for to routing security issues of MANETs. The authors pro-
disrupting routing operations. An attacker can publicize posed an algorithm for detecting malicious nodes which is
a false link with a target’s two-hop neighbors, which based on intelligent water drops algorithm and inspecting
seems to be the target node to choose the malevolent routing modification attack problem. In this algorithm, a
node to be its MPR [23]. digital signature is added to the control traffic for pre-
• Wormhole Attack In this type of attack, a couple of venting the injection of incorrect information in the net-
colluding attackers traces packets at one position and work. For authenticating the routing control message, this
then replays them at another position by means of a signature is used by receiving node. The performance
private high speed network. An attacker collects metrics like end-to-end delay and network load are

123
Wireless Netw

discussed. This algorithm is using digital signature, but it is important elements which are ACK, secure ACK (S-ACK),
not discussed how digital signature is generated and how it and misbehavior report authentication (MRA). The per-
is added to the traffic. formance metrics like packet delivery ratio and Routing
Liu et al. [41] have discussed about the problem related overhead have been discussed. DSA and RSA has been
to security in MANETs. The authors have proposed a implemented in this system for signature verification and
combined intrusion detection and continuous authentica- DSA scheme requires more computational power. So, it
tion novel framework in high security MANET. This sys- needs to use another scheme whose computational power is
tem is formulated as a 2-state partially observed Markov low or modify this scheme.
decision process (POMDP). Intrusion detection and con-
tinuous authentication are able to share history information
with each other for achieving more resourceful and cost
efficient mechanisms for both processes. The performance 3 Proposed solution
metrics like error cost has been discussed. It needs to dis-
cuss the main performance metrics like energy, delay, and 3.1 Overview
throughput.
Li et al. [42] have discussed about the problem related to In our first paper, we propose a combined approach named
key management in cluster-based MANETs. The authors as fuzzy-based intrusion detection and swarm-based
have proposed a fully distributed ID-based multiple secrets authenticated routing in MANET. This technique involves
key management scheme (IMKM). This scheme is a the detection of attacker level of the nodes in the network
combination of ID-based multiple secrets and threshold layers such as MAC layer, physical layer and routing layer
cryptography. In this scheme, all cluster heads produce a using fuzzy logic technique. Based on the detected attacker
master secret key and distribute. The author also proposed level, the trust value of each node is updated. When source
an efficient one-round ID-based authenticated group key node wants to transmit a data packet to the destination, the
agreement (ID-AGKA) protocol. This algorithm minimizes route with trustworthy nodes is selected using swarm-based
the number of rounds and bandwidth usage along with ant colony optimization (ACO) technique.
satisfying all primary security concerns. The performance Since the trust messages and routing messages can be
metrics like computational overhead, bandwidth overhead, attacked, security should be provided for these control
latency, and computation time have been discussed. In this packets also. Hence, as an extension to the previous work,
scheme, a pair-wise key agreement is used which is we propose to develop an authentication technique for
applicable only for communication between two parties or protecting these control packets.
point to point communication; hence, it is not suitable for In lightweight hop-by-hop authentication protocol
wide range broadcasting. (LHAP), the authentication is done at each hop. Every node
Bu et al. [43] have discussed about the problem related authenticates the data packet before forwarding it to next
to user-to-device authentication in high security MANETs. node. So, we authenticate the data packet at each node and
The authors proposed distributed scheme combining for authentication between the nodes. We use one-round
authentication and intrusion detection. In this scheme, the ID-based authenticated group key agreement protocol (ID
most appropriate biosensors for authentication or IDSs are AGKA) [42] for each nodes in route. It will be used for
energetically chosen on the basis of recent security posture authentication of packet data along with it. We will use a
and energy states. For IDS and sensor fusion, Dempster– pair-wise key agreement protocol [42] in this protocol.
Shafer theory is used since more than one device is used at After that, session key is generated, and this key will be
each time slot. For moderating computational complexity, used to encrypt the communications between them two
scheduling process can be divided into offline and online nodes. By using (AGKA), pairwise key agreement and
parts. Network lifetime and energy has been discussed as hop-by-hop authentication is performed. The authentica-
performance metrics. It needs to improve the scheduling tion becomes safer than one time authentication and also
decisions for enhancing the performance and reducing the provides security for various attacks.
computational complexity of this system.
Shakshuki et al. [44] have conversed about the problem 3.2 Swarm-based authenticated routing
of packet-dropping attack in MANETs. The authors pro-
posed a novel intrusion-detection system named Enhanced In the previous work, we proposed swarm intelligence-
Adaptive Acknowledgment (EAACK), which is specially based on ant colony optimization (ACO) technique in order
designed for MANETs. The authors also include digital to find authenticated route. In this section, we will give
signature to avoid the attackers from initiating fake brief introduction about our previous authentication
acknowledgment attacks. EAACK having three most method.

123
Wireless Netw

Our previous work includes ant colony optimization 3.3.1 Introduction to generation of pairing parameter
(ACO) technique for providing authentication which
involves two ant agent namely forward ant (FA) and We have considered ID-based system for authentication of
backward ant (BA). the data packet at each hop. Usually, ID-based system
In order to transmit the data packet, the source launches allows any pair of users to communicate securely without
FA with a threshold trust value which helps to determine exchanging any public key certificates, without keeping
the trustworthiness of the node by comparing the trust public key directory and even without using online services
value of node with the threshold trust value. of a third party taking part in communication.
If the trust value of node i, Ti [ Tth This is possible with the help of trusted Private Key
Then FA updates that node to the routing table until it Generator which issues a user private key to each user’s
reaches destination when it first joins the network. As it is most efficient and
If Ti \Tth convenient method, we have considered the basic opera-
tions in condition where there is an offline PKG center.
Then corresponding node is eliminated from routing These basic operations include system setup and private
table. key extraction.
Once the FA reaches its destination, the BA is gener- In this section, we will define the model which we have
ated, and all the information collected by FA is transferred adapted for authentication of the data packets based on key
to the BA. The information collected by BA is transmitted generation method.
in the same path but in opposite direction of FA. The PKG turns a Bilinear Diffie-Hellman (BDH)
BA then updates the trust information of each node in parameter generator to generate two groups G1 and G2
the pheromone table which was created by FA. Once BA along with bilinear pairing e^ ¼ G1  G2.
reaches the source, it collects all the information from BA R0 is taken as generator for G1, where H1 : f0; 1g !
and chose the most trusted node for data communication Zq which is a cryptographic hash function.
(Fig. 1).
The two other functions can be given as: H2: G1 ? Gq,
H3: G2 ? Gq
3.3 Network model
The function of PKG is to choose a random number
s 2 Zq as its private key.
In this section, we will describe the different steps used in
Rpub = sR0 is considered as the PKG’s public key.
our protocol to establish hop-by-hop authenticated routing.
It predefines the number of key update phase index, U
It mainly consists two phases:
and chooses a set of generators, Rm ð1  m  UÞ, of G1 for
• Establishment of pair wise key regular updates about the keys.
• Lightweight hop-by-hop group key agreement protocol The system parameters of PKG includes \p, q, g, G1,
G2, ê, R0, Rm, H1, H2, H3[The key extraction method is
explained as below:
• Each node submits his identity information IDito PKG
• PKG calculates Ii = H1 (IDi) (1 B i B n) and the
user’s public–private key pair: Q1 = (Ii ? s) R0,
Si = (Ii ? s)-1 P0.
• It then preloads the key pair and system parameters
onto corresponding Ni(1 B i B n) securely.

3.4 Establishment of pairwise keys

In this section, we proposed a pairwise agreement protocol


that allows two communicating node to establish their
session keys which is used to encrypt the communication
between them.
In order to provide security for data packets at each
instant of transmission, pair wise keys are generated for
each node which is selected as trusted node by ACO
Fig. 1 Swarm-based authenticated routing technique and are eligible to carry the data packet.

123
Wireless Netw

The process of encryption of data using pairwise key is 3.5 Hop by hop group key agreement protocol
explained in the following steps:
In this section, we describe an efficient hop by hop group
Step 1 Each node Ni chooses its ephemeral key for
key agreement protocol for MANET which is described in
encryption of data, xi 2 Zq and calculates key according
the following steps:
to following equation:
Xi,j = xi (IjR0 ? Ppub) Step 1: Each node Ni(1 B i B n) chooses an ephemeral
Step 2 The ephemeral value is calculated by Ni, it sends key.
Xi,j to Nj.
Ei 2 Zq
Xi;j
Step 2: Each Ni then constructs a Lagrange interpolating
polynomial with degree n - 1 as follows:
Ni ! Nj
Xn ðx  ki;j ÞðmodqÞ
Step 3 Once the ephemeral values exchanged between Bi ðxÞ ¼ Ei Pnj¼1;j6¼u ð3Þ
u¼1 ðki;u  ki;j Þ
the nodes, then all nodes calculate their pairwise keys in
the following ways (Fig. 2):
n1
¼ axin1 þ    þ axi1 þ ai;0ðmodqÞ ð4Þ
xi xi
Ki; j ¼ e^ðR0 ; R0 Þ e^ðXj;i ; Si Þ þ e^ðXj;i ; Si Þ ð1Þ
where Ki,j is taken as the pairwise session key of Ni and
Nj
¼ e^ðR0 ; R0 Þxi þxj e^ðR0 ; R0 Þxi xj ð1  i; j  n; i 6¼ jÞ ð2Þ Step 3: Each Ni then broadcasts (ai0 þ ai1 þ    ain1 ).
Step 4: If ai0 þ ai1 þ    ain1 is received from Ni to Nj
Then Nj(1 B j B n) uses pair-wise session keys kj,i in
 
Ki; j ¼ H3 Ki; j order to recover keys.
Step 5: The key Ei(1 B j B n) is recovered using the
Step 4 If Ni wants to transmit data to Nj, it encodes in following equation:
form of pairwise key Ki, j and establishes session key for
communication.  
B Kj;i ¼ ain1 ðkj;i Þn1 þ    þ ai1 ðkj;i Þ þ ai0 ÞðmodqÞ
Step 5 Nj decodes the data based on the pairwise key and
¼ Ei
session key established between Ni and Nj.
ð5Þ
The above defined protocol provides security for each
node which is carrying the data packet for transmission. Step 6: After recovery process, each Nj computes group
The following are the security properties provided by session keys according to the following equation
above mentioned protocol. (Fig. 3).
• It provides implicit key authentication known as
session key security, and hence, there is no key SK ¼ SKj ¼ ðE1 þ E2 þ    þ Em ÞPm ð6Þ
compromise impersonation. Advantage
• It provides complete security while transmitting the
data packet, as it restricts unknown key share.
• The proposed technique provides efficient method
for bandwidth usage and also fulfills primary concern
of security (Fig. 4).

4 Simulation results

4.1 Simulation model and parameters

We use Network Simulator Version-2 (NS2) [45] to sim-


Fig. 2 Establishment of pairwise keys ulate our proposed algorithm. In our simulation, the

123
Wireless Netw

Table 1 Simulation settings


No. of nodes 20, 40, 60, 80 and 100

Area size 1000 9 1000


Mac 802.11
Radio range 250 m
Simulation time 50 s
Traffic source CBR
Packet size 512
Speed 10 m/s
No. of attackers 2
Routing protocol FDSAR

Fig. 3 Representation of hop by hop group key agreement protocol


Nodes Vs Delay
20

Delay(Sec)
15
Establishment of pairwise key PKAHAP
10
LHAP
5
0
Key exchange between nodes for data 20 40 60 80 100
transmission
Nodes

Fig. 5 Nodes versus delay


Ni constructs Lagrange interpolating
polynomial with degree n-1

4.2 Performance metrics


Each Ni broadcasts the generated
polynomial We evaluate mainly the performance according to the
following metrics.
• Average packet delivery ratio It is the ratio of the
Key recovery using pairwise session keys
number of packets received successfully and the total
number of packets transmitted.
Generation of group session key • Average packet drop It is the average number of
packets dropped by the misbehaving nodes.
Fig. 4 Block diagram of proposed algorithm • Throughput It is the number of packets received by the
receiver.
We compare our Pair-wise Key Agreement and Hop-by-
channel capacity of mobile hosts is set to the same value: 2 hop Authentication Protocol(PKAHAP) with the LHAP
Mbps. We use the distributed coordination function (DCF) [42].
of IEEE 802.11 for wireless LANs as the MAC layer
protocol. It has the functionality to notify the network layer 4.3 Results
about link breakage.
In our simulation, mobile nodes move in a 4.3.1 Based on nodes
1000 m 9 1000 m region for 50 s simulation time. We
have varied the number of nodes as 20, 40, 60, 80 and 100. In this experiment, we vary the number of nodes as
We assume each node moves independently with the same 20,40,60,80, and 100.
average speed. All nodes have the same transmission range Figure 5 shows the delay of PKAHAP and LHAP
of 250 m. In our simulation, the node speed is 10 m/s. The techniques for different number of nodes scenario. We can
simulated traffic is Constant Bit Rate (CBR). Our simula- conclude that the delay of our proposed PKAHAP
tion settings and parameters are summarized in Table 1 approach is 73 % less than that of LHAP approach.

123
Wireless Netw

Nodes Vs Delivery Ratio conclude that the overhead of our proposed PKAHAP
Delivery Ratio
1.5
approach is 60 % less than that of LHAP approach.
1 PKAHAP Figure 9 shows the throughput of PKAHAP and LHAP
0.5 LHAP techniques for different number of nodes scenario. We can
0
conclude that the throughput of our proposed PKAHAP
20 40 60 80 100 approach is 48 % higher than that of LHAP approach.
Nodes

Fig. 6 Nodes versus delivery ratio


5 Conclusion

Nodes Vs Drop In this paper, we have proposed hop-by-hop group wise


15000
agreement protocol. Here, we have first generated a pair
10000 PKAHAP wise key between two nodes, which is carrying the data
Pkts

5000 LHAP packet for transmission. The main aim of generating pair-
wise key is to encrypt the data which is transmitted in the
0
20 40 60 80 100 network. Once the session key is established between two
Nodes nodes, all the keys are recovered and are used to determine
the most trusted node for transmission. The group wise
Fig. 7 Nodes versus drop agreement protocol is used to provide authentication for
each node in the network. Hence, we can say that proposed
algorithm fulfill the primary concern of the node partici-
Nodes Vs Overhead
20000 pating during data transmission. Simulation result show
Overhead

15000 that the proposed algorithm is efficient as it minimizes


PKAHAP
10000 delay, packet drop, and overhead with improved delivery
LHAP
5000 ratio and throughput.
0
20 40 60 80 100
Nodes

Fig. 8 Nodes versus overhead


References

1. Xing, Z., & Gruenwald, L. (2007). Issues in designing concur-


Nodes Vs Throughput rency control techniques for mobile ad-hoc network databases.
20000
Throughput

Technical Report, School of Computer Science, University of


15000 Oklahoma, July 2007.
PKAHAP
10000 2. Mukilan, P. & Wahi, A. (2012). EENMDRA: Efficient energy
LHAP and node mobility based data replication algorithm for MANET.
5000
IJCSI International Journal of Computer Science Issues, 9(3),
0 357–364, No 1, May 2012, ISSN (Online): 1694-0814.
20 40 60 80 100
3. Moon, A. & Cho, H. (2004). Energy efficient replication exten-
Nodes ded database state machine in mobile ad-hoc network. IADIS
International Conference on Applied Computing, 224–228.
Fig. 9 Nodes versus throughput 4. Youssef, M., Ibrahim, M., Abdelatif, M., & Chen, L. (2014).
Routing metrics of cognitive radio networks: A survey. IEEE
Communications Surveys and Tutorials, 16(1), 92–109.
Figure 6 shows the delivery ratio of PKAHAP and 5. Attar, A., Tang, H., Vasilakos, A., Yu, F. R., & Leung, V. C. M.
(2012). A survey of security challenges in cognitive radio net-
LHAP techniques for different number of nodes scenario. works: Solutions and future research directions. Proceedings of
We can conclude that the delivery ratio of our proposed the IEEE, 100(12), 3172–3186.
PKAHAP approach is 22 % higher than that of LHAP 6. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2002). CodePipe: An
approach. opportunistic feeding and routing protocol for reliable multicast
with pipelined network coding. In INFOCOM 2012, pp. 100–108.
Figure 7 shows the drop of PKAHAP and LHAP tech- 7. Khaleel, T. A., & Ahmed, M. Y. (2012). The enhancement of
niques for different number of nodes scenario. We can routing security in mobile ad-hoc networks. International Journal
conclude that the drop of our proposed PKAHAP approach of Computer Applications (0975–888), 48(16).
is 75 % less than that of LHAP approach. 8. Sun, Y., Hany, Z., & Liu, K. J. R. (2008). Defense of trust
management vulnerabilities in distributed networks. IEEE Com-
Figure 8 shows the overhead of PKAHAP and LHAP munications Magazine, pp. 112–119, February 2008, 0163-6804/
techniques for different number of nodes scenario. We can 08/$25.00  2008 IEEE.

123
Wireless Netw

9. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable 27. Gurjar, A. A., & Dande, A. A. (213). Black hole attack in
multicast with pipelined network coding using opportunistic Manet’s: A review study. International Journal of IT, Engi-
feeding and routing. IEEE Transactions on Parallel and Dis- neering and Applied Sciences Research (IJIEASR), 2(3). ISSN:
tributed Systems, 25(12), 3264–3273. 2319-4413, March 2013.
10. Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. (2013). Directional 28. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks
routing and scheduling for green vehicular delay tolerant net- in wireless networks. IEEE Journal on Selected Areas in Com-
works. Wireless Networks, 19(2), 161–173. munications, 24, 370–380.
11. Busch, C., Kannan, R., & Vasilakos, A. (2012). Approximating 29. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014).
congestion ? dilation in networks via ‘quality of routing’ games. Security of the internet of things: Perspectives and challenges.
IEEE Transaction on Computers, 61(9), 1270–1283. Wireless Networks, 20(8), 2481–2501.
12. Sun, Y. L., Hany, Z., Yuy, W., & Liu, K. J. R. (2006). Attacks on 30. Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. (2015).
trust evaluation in distributed networks. In 40th annual confer- 4S: A secure and privacy-preserving key management scheme for
ence on information science and systems, March 22–24, 2006, cloud-assisted wireless body area network in m-healthcare social
pp. 1461–1466. networks. Information Science, 314, 255–276.
13. Yen, Y.-S., Chao, H.-C., Chang, R.-S., & Vasilakos, A. (2011). 31. Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., & Guizani, M.
Flooding-limited and multi-constrained QoS multicast routing (2010). DTRAB: Combating against attacks on encrypted pro-
based on the genetic algorithm for MANETs. Mathematical and tocols through traffic-feature analysis. IEEE/ACM Transaction on
Computer Modelling, 53(11–12), 2238–2250. Network, 18(4), 1234–1247.
14. Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A. V., & Rong, 32. Yasmin, R., Ritter, E., & Wang, G. (2010). An authentication
X. (2015). Data mining for the internet of things: Literature framework for wireless sensor networks using identity-based
review and challenges. International Journal of Distributed signatures. In Computer and information technology (CIT), 2010
Sensor Networks, 2015, 14. doi:10.1155/2015/431047. IEEE 10th international conference on June 29 2010–July 1
15. Meng, T., Wu, F., Yang, Z., & Chen, G. (2015). Spatial 2010, pp. 882–889, Print ISBN: 978-1-4244-7547-6, INSPEC
reusability-aware routing in multi-hop wireless networks. IEEE Accession Number: 11529085. doi:10.1109/CIT.2010.165
TMC. doi:10.1109/TC.2015.2417543. 33. Dahiya, A., & Sharma, V. (2009). A survey on securing user
16. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing authentication in vehicular ad hoc networks. In National con-
protocol for DTNs. ACM SIGCOMM Computer Communication ference on recent drifts, break in applied sciences and its tech-
Review, 41(4), 405–406. nology for innovation management (NCRDBAIM), KIET,
17. Yu, Y., Kaminsky, M., Gibbons, P. B., & Flaxman, A. (2006). Ghaziabad, August 7–9, 2009.
SybilGuard: Defending against Sybil attacks via social networks. 34. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). LHAP: A light-
In ACM SIGCOMM conference on computer communications weight hop-by-hop authentication protocol for ad-hoc networks.
(SIGCOMM 2006), 2006 ACM 1595933085/06/0009, Pisa, Italy, In Distributed computing systems workshops, 2003, 23rd inter-
September 2006. national conference on 19–22 May 2003, pp. 749–755, Print
18. Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). ISBN: 0-7695-1921-0, INSPEC Accession Number: 8071255.
Interference-based topology control algorithm for delay-con- doi:10.1109/ICDCSW.2003.1203642
strained mobile Ad hoc networks. IEEE Transactions on Mobile 35. Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel
Computing, 14(4), 742–754. reciprocity based key establishment techniques for wireless sys-
19. Vasilakos, A., & Zhang, Y. (2012). Thrasyvoulos spyropoulos, tems. Wireless Networks, 21(6), 1835–1846.
delay tolerant networks: Protocols and applications. Boca Raton: 36. He, D., Chen, C., Chan, S., & Bu, J. (2012). ReTrust: Attack-
CRC Press. resistant and lightweight trust management for medical sensor
20. Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Infor- networks. IEEE Transactions on Information Technology in
mation centric network: Research challenges and opportunities. Biomedicine, 16(4), 623–632.
Journal of Network and Computer Applications, 52, 1–10. 37. Sanzgiri, K., Dahilly, B., Leviney, B. N., Shieldsz, C., &
21. Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP Traceback: Belding-Royer, E. M. (20002). A secure routing protocol for
Disclosing the locations of IP spoofers from path backscatter. ad hoc networks. In 10th IEEE international conference on
IEEE Transactions on Information Forensics and Security, 10(3), network protocols (ICNP’02) 1092-1648/02 $17.00  2002
471–484. IEEE.
22. England, P., Shi, Q., Askwith, B., & Bouhafs, F. (2012). A survey 38. Hu, Y.-C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure
of trust management in mobile ad-hoc networks. Liverpool John efficient distance vector routing for mobile wireless ad hoc net-
Moores University, June 2012, ISBN: 978-1-902560-26-7  works. In Ad hoc networks 1, 1570-8705/$—see front matter
2012 PGNet. 2003 Published by Elsevier B.V. doi:10.1016/S1570-
23. Khokhar, R. H., Ngadi, M. A., & Mandala, S. (2008). A review of 8705(03)00019-2, pp. 175–192.
current routing attacks in mobile ad hoc networks. International 39. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure
Journal of Computer Science and Security, 2(3). on-demand routing protocol for ad hoc networks. Wireless Net-
24. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust works, 11, 21–38.
management for internet of things. Journal of Network and 40. Zhou, J., Dong, X., Cao, Z., & Vasilakos, A. V. (2015). Secure
Computer Applications, 42, 120–134. and privacy preserving protocol for cloud-based vehicular DTNs.
25. Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. IEEE Transactions on Information Forensics and Security, 10(6),
V. (2014). Provably secure three-party authenticated key agree- 1299–1314.
ment protocol using smart cards. Computer Networks, 58, 29–38. 41. Liu, J., Yu, F. R., Lung, C.-H., & Tang, H. (2009). Optimal
26. Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing combined intrusion detection and biometric-based continuous
anti-spoofing deployment. IEEE Transactions on Information authentication in high security mobile ad hoc networks. IEEE
Forensics and Security, 9(3), 436–450. Transactions on Wireless Communications, 8(2), 806–815.

123
Wireless Netw

42. Li, L.-C., & Liu, R.-S. (2010). Securing cluster-based ad hoc is currently a research scholar in the area of Adhoc Network. She is
networks with distributed authorities. IEEE Transactions on member of CSI.
Wireless Communications, 9(10), 3072–3081.
43. Bu, S., Yu, F. R., Liu, X. P., Mason, P., & Tang, H. (2011). Dr. D. Murugan received the
Distributed combined authentication and intrusion detection with B.E. degree in Electronic and
data fusion in high-security mobile ad hoc networks. IEEE Communication in Madurai
Transactions on Vehicular Technology, 60(3), 1025–1036. Kamaraj University, Tamilnadu,
44. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK— India. The M.E. degree in
A secure intrusion-detection system for MANETs. IEEE Trans- Computer Science and Engi-
actions on Industrial Electronics, 60(3), 1089–1098. neering in Madurai Kamaraj
45. Network Simulator. http://www.isi.edu/nsnam/ns University, Tamilnadu, India.
The Ph.D. in Computer Science
and Engineering M.S. Univer-
K. Shanthi received the B.Sc. sity, Tirunelveli, Tamilnadu,
degree in computer science in India. Currently he has worked
Manonmaniam Sundaranar as Associate Professor in
University, Tamilnadu, India, in Department of Computer Sci-
2000. The MCA degree in ence and Engineering in
Manonmaniam Sundaranar Manonmaniam Sundaranar University, Tirunelveli, Tamilnadu, India.
University, Tamilnadu, India, in He has published 12 papers in journals and more than 20 papers in
2003. The M.Tech. Degree in Conferences both at National and International level and also he has
Dr. M.G.R. Educational and Published 3 Books in Springer publication. His areas of interest
Research Institute University, include Software Engineering and Digital Image Processing. He is
Chennai, Tamilnadu, India, in head of Thamirabarani Educational Society, Nominee for Inspection
2005. She has worked as lec- commission for Department of Mathematics S.T.Hindu College in
turer of Computer science and Nagercoil, Member of SC/ST Welfare police committee in Tir-
Engineering Department in The unelveli District jurisdiction area, Coordinator of ICTACT in
Indian Engineering College, Government of Tamilnadu, Member of the Indian Society for Tech-
Tirunelveli District for 3 years. Now she is working as a Assistant nical Education, Selection Committee member of lecturer history in
Professor in Computer Science and Engineering Department of Cape the college of Tiruvalluvar, Pabanasam, University syndicate mem-
Institute of Technology, Tamilnadu, India for more than 5 years. She ber(December 2008–December 2011).

123

Vous aimerez peut-être aussi