Open Access Open Access  Restricted Access Subscription or Fee Access

A Unique Light Weight Time Stamp Based Distributed Security Protocol for Wireless Ad hoc Network

Manjunath Gadiparthi, Muralidhar Vejendla, Ramakrishna Paladugu, P.V. Narasimha Rao


A wireless network is one where two or more nodes communicate with each other over a wireless medium like air. Such communications which do not require any specialized central station or base station are known as Mobile Adhoc NETwork (MANET). Security is a major concern in such networks as the wireless data are prone to more vulnerability and eavesdropping. Security in such networks is provided by MAC layer as encryption and authentication. Several encryption and authentication schemes are proposed to strengthen the security of the network. But stronger encryption technique leads to more energy loss due to nodes because of higher processing cycles and also contribute to higher delay due to longer time the packets spends in the queue. In this work a unique timestamp based network security technique is proposed. The technique minimizes the encryption packet overflow which is induced due to public key exchange, and derives the public key directly from the neighbor‘s information which is propagated through routing information exchange. The simulation is performed with omnet++ simulator and the results show that the energy overhead due to encryption or performance compromise are minimum in the proposed system. Further as the protocol is embedded in the network layer it is easily adoptable to any existing architecture without modifying the MAC or Physical layer standard or protocol.


AODV, Cryptography, MANET, Time Stamp, Wireless Security

Full Text:



Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, ―A Survey on Attacks and Counter measures in Mobile Ad Hoc Networks‖, Wireless/Mobile Network Security, Springer 2006.

Keerti Srivastava, Amit K Awasthi and R.C.Mittal, ―An Improved Timestamp-Based Password Remote User Authentication Scheme‖, Preprint submitted to Elsevier December 22, 2009.

Ajay Jangra, Nitin Goel, Priyanka & Komal Bhatia, ―Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture‖, International Journal of Electronics Engineering, pp. 189-196, 2010.

Guangyu Pei, Phillip A. Spagnolo and Fred L. Templin,‖ Enabling OSPFv3 MANET Extensions over IPv4 Encryptors‖, IEEE 2008.

Levente Butty´ana, L´aszl´o D´ora, Fabio Martinelli, Marinella Petrocchi, ―Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks‖, Preprint submitted to Elsevier Computer Communications January 27, 2010.

Tao Ye, Darryl Veitch, Jean Bolot,‖ Improving Wireless Security Through Network Diversity‖, Computer Communication Review, vol. 39, pp. 34-44, 2009.

Cryptomathic Time Stamping Authority Technical White Paper, 2005.

Greg Rose, ―Combining Message Authentication and Encryption‖, Qualcomm Australia, 2003.

Kshitiz Saxena, ―The Analyses of Wireless Encryption Protocol- Proposed Enhancement to Handshake Mechanism in WPA‖, International Journal of Engineering Science and Technology, pp. 3657-3661,Vol. 2(8), 2010.

R. Murugan and A. Shanmugam, ―Key Distribution System for MANET with Minimum Prior Trust Relationship‖, International Journal of Recent Trends in Engineering, Vol. 1, No. 2, May 2009.

Jin-Man Kim, Jong-Wook Jang, "AODV based Energy Efficient Routing Protocol for Maximum Lifetime in MANET," aict-iciw, pp.77, Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT-ICIW'06), 2006.

SHU JIANG, ―Efficient Network Camouflaging In Wireless Networks‖, A dissertation Submitted to the Office of Graduate Studies of Texas A&M University, December 2005.

Rui-dan Su, Xiang-quan Che, Shao-feng Fu, Long-hai Li, Li-hua Zhou, "Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case," nswctc, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, pp.719-723, 2009.

Li Zhao, ―Enhance Communication Security In Wireless Ad Hoc Networks Through Multipath Routing‖, A dissertation submitted for the degree of DOCTOR OF PHILOSOPHY, WASHINGTON STATE UNIVERSITY, School of Electrical Engineering and Computer Science, AUGUST 2007.

Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon, ―Sign timing Scheme based on Aggregate Signatures‖, in ISI, pp. 145-149, IEEEE 2008.

Mohamed Salah Bouassida, Mohamed Bouali, ―On the Performance of Group Key Management Protocols in MANETs‖, Joint Conference on Security in Network Architectures and Information Systems (SAR-SSI‗07), Annecy (2007).

Harald H.-J. Bongartz, Tobias Ginzler, Thomas Bachran, Pere Tuset, ―SEAMAN: A Security-Enabled Anonymous MANET Protocol‖, RTO-MP-IST-083, RTO Information Systems Technology Panel (IST) Symposium, No. 20, pp. 1-14, 2008.

Qian Fang, Ying Liu and Xiaoqun Zhao, ―A Chaos–Based Secure Cluster Protocol For Wireless Sensor Networks‖, pp. 522-533, Vol. 44, No. 4, Kybernetika, 2008.

R.PushpaLakshmi, Dr.A.Vincent Antony Kumar, ―Cluster Based Composite Key Management in Mobile Ad Hoc Networks‖, International Journal of Computer Applications (0975 – 8887) Volume 4 – No.7, July 2010.

C. Perkins and E. Royer,‖ Ad hoc on-demand distance vector routing‖, IEEE WMCSA‘99 (1999).

Sunam Ryu, Kevin Butler, Patrick Traynor, Patrick McDaniel, "Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems," ainaw, vol. 1, pp.519-524, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007.

Anni Matinlauri, ―Fairness and Transmission Opportunity Limit in IEEE 802.11e Enhanced Distributed Channel Access‖, Master‘s Thesis, HELSINKI UNIVERSITY OF TECHNOLOGY Faculty of Electronics, Communications and Automation Networking Laboratory‖, Espoo, 2008.

Jungwook Song, Sunyoung Han, ―Mobile Node Authentication Protocolfor Proxy Mobile‖, International Journal of Computer Science and Applications, pp. 10 – 19, Vol. 6, No. 3, 2009.

Monis Akhlaq, M Noman Jafri, Muzammil A Khan, and Baber Aslam, ―Addressing Security Concerns of Data Exchange in AODV Protocol‖, World Academy of Science, Engineering and Technology, 2006.

Haodong Wang Æ Qun Li, ―Achieving robust message authentication in sensor networks: a public-key based approach‖, Wireless Netw, DOI 10.1007/s11276-009-0184-z, Springer May 2009.

Anil Kapil, Sanjeev Rana, ―Identity-Based Key Management in MANETs using Public Key Cryptography‖, International Journal of Security (IJS), pp 1-8, Vol. 3, Issue 1, 2009.

S. Balfe, K. Boklan, Z. Klagsburn, and K.G. Paterson, ―Key Refreshing in Identity-based Cryptography and its Applications in MANETs‖, In Proceedings of the2007 IEEE Military Communications Conference(Milcom 2007), 2007.

―Wireless Network Security‖, white paper, proxim wireless networks, 2003.

Nishu Garg, R.P.Mahapatra, ―MANET Security Issues‖, IJCSNS International Journal of Computer Science and Network Security, pp.241-246, VOL.9 No.8, August 2009.

S. Nesargi and R. Prakash, ―MANETconf: Configuration of Hosts in a Mobile Ad Hoc Network‖, pp 1-10, INFOCOM, 2002.

Panagiotis Papadimitratos and Zygmunt J. Haas, ―Secure Routing for Mobile Ad hoc Networks‖, In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), pp 1-13, January, 2002.

Manel Guerrero Zapata, ―Secure Ad hoc On-Demand Distance Vector Routing‖, Mobile Computing and Communications Review, pp. 106-107, Vol.6, No.3, 2001.

Manel Guerrero Zapata, ―Securing and Enhancing Routing Protocols for Mobile Ad hoc Networks‖,, Thesis for the degree of Doctor of Philosophy Doctorate in Computer Architecture and Technology Computer Architecture Department (DAC), Technical University of Catalonia Universitat Polit`ecnica de Catalunya, Barcelona, March 2006.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.