Software – defined networking based secure rout-ing in mobile ad hoc network

  • Authors

    • B. V. V. S. Prasad
    • Sd. Salman Ali
    2017-12-28
    https://doi.org/10.14419/ijet.v7i1.2.9288
  • Id-Based Cryptography, Software-Defined Networking, Secure Routing, Manet Colon.
  • Traditional communication networks can be leveraged by separating controlling functions from forwarding functions using emerging technology known as Software Defined Networking (SDN). Though SDN has been around for some years, it was mostly limited to wired networks. Of late, it is being adapted to wireless networks. The programmable interface with decoupled controller can be used with MANET to integrate with other networks besides controlling it well. Both control and security are inevitable for the successful implementation of SDN in wireless networks. Towards this end, in this paper we implemented SDN based MANET for secure routing. Open Flow is used for implementing SDN controller while IDC is used for securing communications. Our framework is evaluated with NS3 simulations that reveal significant performance improvement when compared with traditional ad hoc networks that do not use SDN. This is achieved as SDN controller can quickly adapt to changed topologies due to node mobility.

  • References

    1. [1] Marc Mendonca, Bruno Nunes Astuto, Katia Obraczka, Thierry Turletti. (2013). Software Dened Networking for Heterogeneous Networks. HAL, p.12-17.

      [2] Jun-Zhao Sun. (2001). Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing. IEEE, p.859–876. https://doi.org/10.1109/ICII.2001.983076.

      [3] Mateus A. S. Santos. (2013). Software-Defined Networking Based Capacity Sharing in Hybrid Networks. IEEE, p.25-34. https://doi.org/10.1109/ICNP.2013.6733664.

      [4] Ian Ku, You Lu, Mario Gerla. (2014). Towards Software-Defined VANET: Architecture and. IEEE, p.12-17. https://doi.org/10.1109/MedHocNet.2014.6849111.

      [5] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “Openflow: enabling innovation in campus networks,†SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69–74, 2008. https://doi.org/10.1145/1355734.1355746.

      [6] OpenFlow Switch Specification, Version 1.4.0 (Wire Protocol 0x05). [Online]. Available: https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/openflow/openflow-specv1.4.0.pdf.

      [7] Zhijing Qin, Grit Denker§, Carlo Giannelli, Paolo Bellavista, Nalini Venkatasubramanian. (2014). A Software Defined Networking Architecture for the Internet-of-Things. IEEE, p.213-313. https://doi.org/10.1109/NOMS.2014.6838365.

      [8] Murad Kaplan, Chenyu Zheng, Matthew Monaco, Eric Keller, and Douglas Sicker. (2014). WASP: A Software-Defined Communication Layer for Hybrid Wireless Networks. ACM, p.23-33. https://doi.org/10.1145/2658260.2658263.

      [9] Marc Mendonca,Katia Obraczka,Thierry Turletti. (2012). the Case for Software–Defined Networking in Heterogeneous Networked Environments. ACM, p.56-60. https://doi.org/10.1145/2413247.2413283.

      [10] Sritrusta Sukaridhoto. (2013). A Study of Performance Improvement Methods for Real-time Applications in Wireless Mesh Networks. A Solutions, p.12-17.

      [11] Rahul Dasharath Gavas,R. H. Vijaylaxmi2. (2014). A Review on the Acceleration in Networking Fostered by Software Defined Networking.International Journal of Advance Research in Computer Science and Management Studies. 2 (3), p.213-313.

      [12] Usama Mehboob, Junaid Qadir, Salman Ali, and Athanasios Vasilakos. (2014). Genetic Algorithms in Wireless Networking: Techniques, Applications, and Issues. A Solutions, p.56-60.

      [13] Pieter Kleer. (2015). Distributed route discovery in communication networks using neighbour information. ACM, p.32-44.

      [14] DAN L. BuRK. (1993). PATENTS IN CYBERSPACE: TERRITORIALITY AND INFRINGEMENT ON GLOBAL COMPUTER NETWORKS. A Solutions. 68 (1), p.23-33.

      [15] Rahul Dasharath Gavas,R. H. Vijaylaxmi2. (2014). A Review on the Acceleration in Networking Fostered by Software Defined Networking.International Journal of Advance Research in Computer Science and Management Studies. 2 (3), p.213-313.

      [16] Stefano Salsano, Giuseppe Siracusano, Andrea Detti, Claudio Pisa, Pier Luigi Ventre, Nicola Blefari-Melazzi. (2014). Controller selection in a Wireless Mesh SDN under network partitioning and merging scenarios.Software Defined Networking, p.25-34.

      [17] Depeng Li. (2015). Poster: A Time-Saving Scheme for Ambulance Transportation with Support of Software-Defined Networking.Department of Information and Computer Sciences, p.213-313.

      [18] Massimiliano Albanese, Alessandra De Benedictisy, Sushil Jajodia, and Kun Sun. (2013). A Moving Target Defense Mechanism for MANETs Based on Identity Virtualization. A Solutions, p.56-60. https://doi.org/10.1109/CNS.2013.6682717.

      [19] Nate Foster, Michael. Freedmany, Arjun Guha, Rob Harrisonz, Naga Praveen Kattay, Christopher Monsantoy, Joshua Reichy, Mark Reitblatt, Jennifer Rexfordy, Cole Schlesingery, Alec Story, and David. (2013). Languages for Software-Defined Networks. ACM, p.12-17. https://doi.org/10.1109/MCOM.2013.6461197.

      [20] Bruno Astuto A. Nunes, Marc Mendonca, Xuan-Nam Nguyen, Katia Obraczka, and Thierry Turletti. (2014). A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks.ACM, p.23-33.

      [21] Muhammad Afaq, Shafqat Rehma, Wang-Cheol Song. (2015). Large Flows Detection, Marking, and Mitigation based on sFlow Standard in SDN. Journal of Korea Multimedia Society. 181 (2), p.12-17. https://doi.org/10.9717/kmms.2015.18.2.189.

      [22] Mark “Mitch†Mitchiner,Reema Prasad. (2014). Software-Defined Networking and Network Programmability: Use Cases for Defense and Intelligence Communities. Cisco, p.56-60.

      [23] Ahyoung Lee1 • Ilkyeun Ra2. (2015). Network resource efficient routing in mobile ad hoc wireless networks. Springer-Verlag Berlin Heidelberg, p.23-33.

      [24] Haidong Wang, Brian Crilly, and Wei Zhao. (2007). Implementing Mobile Ad Hoc Networking (Manet) Over Legacy Tactical Radio Links. Ieee, P.56-60. https://doi.org/10.1109/MILCOM.2007.4455103.

      [25] Hanno Wirtz, Tobias Heer, Robert Backhaus, Klaus Wehrle. (2011). Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode.ACM, p.213-313.

      [26] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “Openflow: enabling innovation in campus networks,†SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69–74, Mar. 2008. [Online]. Available: http://doi.acm.org/10.1145/1355734.1355746

      [27] A. Shamir, “Identity-based cryptosystems and signature schemes,†in CRYPTO, ser. LNCS, G. Blakley and D. Chaum, Eds. Springer Berlin Heidelberg, 1985, vol. 196, pp. 47–53.

      [28] J. Broch, D. Maltz, D. Johnson, Y.-c. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of the Fourth Annual ACMIIEEE International Conference on Mobile Computing and Networking (MobiCom'98), pages 85-97, Dallas, TX, October 1998. ACM. https://doi.org/10.1145/288235.288256.

  • Downloads

  • How to Cite

    Prasad, B. V. V. S., & Salman Ali, S. (2017). Software – defined networking based secure rout-ing in mobile ad hoc network. International Journal of Engineering & Technology, 7(1.2), 229-234. https://doi.org/10.14419/ijet.v7i1.2.9288