Securing Zone Routing Protocol in Ad-Hoc Networks

Full Text (PDF, 879KB), PP.24-36

Views: 0 Downloads: 0

Author(s)

Ibrahim S. I. Abuhaiba 1,* Hanan M. M. Abu-Thuraia 1

1. P. O. Box 108, Computer Engineering Department, Islamic University, Gaza, Palestine

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.10.03

Received: 1 Feb. 2012 / Revised: 16 May 2012 / Accepted: 20 Jul. 2012 / Published: 8 Sep. 2012

Index Terms

Ad-hoc networks, secure routing, secure neighbor discovery, digital signature, zone routing protocol, secure zone routing protocol

Abstract

This paper is a contribution in the field of security analysis on mobile ad-hoc networks, and security requirements of applications. Limitations of the mobile nodes have been studied in order to design a secure routing protocol that thwarts different kinds of attacks. Our approach is based on the Zone Routing Protocol (ZRP); the most popular hybrid routing protocol. The importance of the proposed solution lies in the fact that it ensures security as needed by providing a comprehensive architecture of Secure Zone Routing Protocol (SZRP) based on efficient key management, secure neighbor discovery, secure routing packets, detection of malicious nodes, and preventing these nodes from destroying the network. In order to fulfill these objectives, both efficient key management and secure neighbor mechanisms have been designed to be performed prior to the functioning of the protocol.
To validate the proposed solution, we use the network simulator NS-2 to test the performance of secure protocol and compare it with the conventional zone routing protocol over different number of factors that affect the network. Our results evidently show that our secure version paragons the conventional protocol in the packet delivery ratio while it has a tolerable increase in the routing overhead and average delay. Also, security analysis proves in details that the proposed protocol is robust enough to thwart all classes of ad-hoc attacks.

Cite This Paper

Ibrahim S. I. Abuhaiba, Hanan M. M. Abu-Thuraia, "Securing Zone Routing Protocol in Ad-Hoc Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.10, pp.24-36, 2012. DOI:10.5815/ijcnis.2012.10.03

Reference

[1]A. M. Kamal, "Adaptive Secure Routing in Ad Hoc Mobile Network," M.S. Thesis, Dept. Computer and Systems Science, Royal Institute of Technology, Stockholm, Sweden, 2004.
[2]Z. J. Haas, M. R. Pearlman, P. Samer, "The Zone Routing Protocol (ZRP) for Ad Hoc Networks," Internet Draft, 2003, available at: http://tools.ietf.org/id/draft-ietf-MANETs-zone-zrp-04.txt.
[3]M. Poturalski, P. Papadimitratos, J. Hubaux, "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility," in Proc. ACM Symposium on Information, Computer & Communication Security ASIACCS'08, Tokyo, Japan, 2008.
[4]M Poturalski, P. Papadimitratos, J. Hubaux, "Secure Neighbor Discovery in Wireless Networks," In Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, 2008.
[5]R. Pickholtz, D. Schilling, L.B. Milstein, "Theory of spread spectrum communications –– a tutorial," IEEE Transactions on Communications, v.5, no. 30, pp. 855–884, 1982.
[6]Y.-C. Hu, D.B. Johnson, A. Perrig, "SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, 2003, v. 1, pp. 175–192.
[7]Hu, Yih-Chun, Adrian Perrig, Dave Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," In Proc. ACM Workshop on Wireless Security, San Diego, WiSe, California, September 2003.
[8]M. G. Zapata, N. Asokan, "Securing Ad Hoc Routing Protocols," in Proc. ACM Workshop on Wireless Security, Grand Hyatt, WiSe, Singapore, ACM Press, 2002, pp. 1–10.
[9]P. Papadimitratos, Z. J. Haas, "Secure Link State Routing for Mobile Ad Hoc Networks," in Proc. IEEE Workshop on Security and Assurance in Ad Hoc Networks, IEEE Press, 2003, pp. 27–31.
[10]K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. Belding- Royer, "A Secure Routing Protocol for Ad hoc Networks," in Proc. 10th Ann. Int'l Conf. Network Protocols, Paris, ICNP, France, Nov., 2002, pp. 78-87.
[11]S. Cheung and K. Levitt, "Protecting routing infrastructures from denial of service using cooperative intrusion detection," In Proceedings of the 1997 New Security Paradigms Workshop (September 1998) pp. 94–106.
[12]Y. -C. Hu, A. Perrig, D. Johnson, "Efficient Security Mechanisms for Routing Protocols," in Proc. Network and Distributed System Security Symp., California, NDPSS, Feb. 2003, pp. 57-73.
[13]Y. -C. Hu, A. Perrig, D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," in Proc. 22nd Ann. Joint Conf. IEEE Computer and communications Societies (INFOCOM 2003), San Francisco, IEEE Press, 2003, pp. 1976–1986.
[14]G. Montenegro, C. Castelluccia, "Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses," presented at Network and Distributed System Security Symposium, NDPSS'02, San Diego, California, February 2002.
[15]M. G. Zapata, "Secure Ad hoc On-Demand Distance Vector (SAODV) Routing," IETF Internet Draft, August 2001, available at: http://www.potaroo.net/ietf/idref/draftguerrero-MANETs-saodv/
[16]J. Schaumann, (2002),"Analysis of the Zone Routing Protocol," available at: http://www.netmeister.org/misc/zrp/zrp.htm
[17]B. Forouzan, "Introduction to cryptography and network security," McGraw-Hill, 1st ed., 2006.
[18]K. Fall, K. Varadhan, "Editors ns Notes and Documentation," The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, November 1997. Available at: http://www-mash.cs.berkeley.edu/ns
[19]Yih-Chun Hu, Adrian Perrig, David B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Wireless Ad Hoc Networks," Wireless Networks, 2005, v. 11, pp. 21–38.
[20]B. Smith, "Securing Distance-Vector Routing Protocols," M.S. thesis, university of California, California, 1997.
[21]Sh. Rahmatizadeh, H. Shah-Hosseiniand, H. Torkaman, "The Ant-Bee Routing Algorithm: A New Agent Based Nature-Inspired Routing Algorithm," Journal of Applied Sciences, 2009, Volume 9, Issue 5, pp. 983–987.