Article Details

An Evaluation of Various Routing Security For Mobile Ad-Hoc Networks: a Case Study of Robust Ubiquitous Security Support System |

Dr. Shailendra Singh Sikarwar, Mahesh Bansal, in International Journal of Information Technology and Management | IT & Management


Mobile ad hoc networks are infrastructure-free, pervasive, andubiquitous and without any centralized authority. These unique characteristics,combined with security threats, demand solutions in securing ad hoc networksprior to their deployment in commercial and military applications. So far, theresearch in mobile ad hoc network has been primarily focused on routing andmobility aspects rather than securing the ad hoc network itself. Due to theever-increasing security threats, there is a need to develop algorithms andprotocols for a secured ad hoc network infrastructure. This paper surveys theprevailing mobile ad hoc network security threats and the existing solutionschemes. Current technologies andsecurity advances have made networked systems and applications very popular andwidely used. The pen asive and practical aspects of wireless Mobile Ad HocNetworks (MANET) made them very popular as well. This created the need forsecuring MANETs to provide users with authentic communications, secure androbust information exchange, and efficient security mechanisms. However, manyof the security solutions devised for regular networks are not as efficient noras effective on MANETs. This paper investigates the security issues of a commontype of MANETs (open/dynamic VIANET) at the network layer -where routingprotocols and forwarding mechanisms are used. In this paper, we identify thedifferent security requirements specific to MANETs and sun ey some of theavailable secure routing techniques. The study has rep ealed some problems withthe current routing protocols and identified the most important issue thatneeds to be resolved to ensure a secure network layer. In our design, we distribute the functions of the certificationauthority through a threshold secret sharing and scalable multi-signaturemechanism, in which each node holds a secret share and multiple nodes in alocal neighborhood jointly provide complete services. Localized certificationschemes are devised to realize ubiquitous service availability. We also updatethe secret shares to further enhance robustness against break-ins.