ArticlePDF Available

A Survey on Secure Routing Protocols for Mobile Ad-hoc Network

Authors:
  • Bharati Vidyapeeth College of Engineering Kolhapur
DOI: https://dx.doi.org/10.26808/rs.ca.i8v1.02
International Journal of Computer Application (2250-1797)
Issue 8 Volume 1, January- February 2018
13
A Survey on Secure Routing Protocols for Mobile Ad-hoc
Network
Zalte S.S.#1,Ghorpade V.R.#2
#1 Shivaji University,Kolhaur,9422785209
#2 Bharati Vidyapeeth,College of Engineering
ABSTRACT
Mobile Ad-hoc network is instant ,autonomous and easily assembled in havoc terrain,
where pre-deployment of infrastructure is impossible. On other hand, it is sometimes
notorious because of its unique characteristics such as imprudent topology, promiscuous
mode, frequent link breakage and resource constraints. There is extraordinary gap between
MANET's nature and security in applications. Secure routing in MANET becomes excellent
topic now a day. If security not properly impose consequences will be resource consumption
and degradation of network performance. This paper gives survey on secure routing protocols
for MANET.
Key words: Mobile Ad-hoc Network, resource constraint, security, routing protocols,
network performance.
Corresponding Author: Zalte S.S.
INTRODUCTION
Mobile Ad-hoc Network is collection of mobile devices which are easily assembled in havoc
terrain temporarily, where pre-deployment of infrastructure impossible. It is cheap, instant and
wireless network as shown in Fig 1.[1]
Fig 1:Mobile Ad-hoc Network
MANET has some unique characteristics like imprudent topology, promiscuous mode, frequent
link breakage and resource constraints, so routing in MANET is different from traditional
routing. To build intrinsic mutual trust between nodes are difficult because nodes are not at fixed
position, they are movable. This type of volatile topology leads to detecting malicious nodes
troublesome. Security applied for wired network is not worked for MANET.
DOI: https://dx.doi.org/10.26808/rs.ca.i8v1.02
International Journal of Computer Application (2250-1797)
Issue 8 Volume 1, January- February 2018
14
Attacks on MANET
MANET is suffering from various attacks such as active attacks and passive attacks.[2]
Passive Attacks
Passive attacks are difficult to detect because they does not disrupt routine operations of
network. passive attackers only monitor data traffic and snoop the data without modifying. Here
Confidentiality to data is violated. There are some passive attacks.
Traffic Monitoring: There are so many networks like satellite, WLAN and cellular are
also suffering from such attacks. By monitoring data traffic attackers capture sensitive
information for its personnel use.
Eavesdropping: malicious node can overhear the data transmission. Transmitted message
can be eavesdropped and fraud message can be injected into network.
Traffic Analysis: Traffic analysis is a passive attack used to gain information on which
nodes communicate with each other and how much data is processed.
Syn flooding: By sending repeatedly RREQ, it floods network and make unavailability of
resources such as bandwidth, memory and energy.
Active attacks
Active attacks are easy to detect than prevent. Active attacks disturb whole network routine.
passive attacks are difficult to detect because it does not disturb network routine. Active attacks
can be imposed by internal attackers or external attackers.
External attacks are carried out by the nodes which are not part of network. Internal
attackers are one of the attacker among the participant which are compromised ,so hard to
detect.
Black hole Attack: In this attack, an attacker advertises it has shortest path to destination
or he is a destination. Attacker also send a zero metric for all destination which causes it
attract all traffic.
Wormhole Attack: - In a wormhole attack, with the help of co-ordination between
malicious nodes attackers forcefully tunnel the packet from one end to another. This
tunnel between two colluding attacks.[5]
Replay attack: An attacker captures previous session and resend it again repeatedly to
consume network resources.
Sinkhole: In a sinkhole attack, a malicious node advertise it has greatest sequence number
and smallest hop count path to attract traffic from all neighboring nodes.
Spoofing Attack:-In spoofing attack, the attacker uses valid identity of another node;
hence it receives messages meant for that node.
DOI: https://dx.doi.org/10.26808/rs.ca.i8v1.02
International Journal of Computer Application (2250-1797)
Issue 8 Volume 1, January- February 2018
15
Sybil attack: The Sybil attack aims at distributed system environments. The attacker tries
to act as several different identities/nodes rather than one.
Man-in-the-middle attack: An attacker situated middle between the sender and receiver
and captures data packet which being sent to destination.
Byzantine attack: A attacker with the help of other neighboring node carry out attacks
such as routing loops, forwarding packets through non-optimal paths or selectively
dropping packets which results in disruption or degradation network performance.
Flooding-Malicious nodes may flood the network by injecting false packets. Due to
flooding legitimate nodes may starved network resources like bandwidth, battery and
energy [3],[4] etc.
Rushing-In rushing attack, attacker captures route request packet and transmit to its
neighboring node with high speed. When destination node received route request packet
it discards other route request packets which are coming from legitimate nodes.[6]
LITERATURE SURVEY
In this paper, we explore some of the existing security mechanism against malicious attacks in
MANETs and also the intrusion detection techniques to detect them. First, we have provided the
taxonomy of attacks against MANETs. Then, we primarily focused on how the network layer
attacks are carried out against MANET.
Author proposed a secure routing protocol (SRP) in [7]. This protocol is based on a pre-shared
key between source and destination nodes. A source node produces RREQ message and
broadcasts it among its neighbors. When destination node receives RREQ message it verifies the
source node and establish the route.
Drawback of SRP is that it does not authenticate intermediate nodes, it is vulnerable to
attacks such as fabricated route error messages.
In[8] author secured on demand routing protocol ,Dynamic Source Routing. In this
protocol not only source and destination but also intermediate nodes are authenticated. The main
task of this protocol is to allow intermediate nodes to authenticate its predecessor node and also
detect attacks like modification, fabrication and fake RREQ. Finally, destination node
authenticate all nodes in the route. This protocol provides security against reply attack, rushing
attack, IP spoofing and man in the middle attack. Protocol is based on asymmetric
cryptography, so it consumes more battery due to lot of calculation.
Same author proposed key management in[9] which combines symmetric cryptography
for secure communication as well as a asymmetric cryptography for authenticate other nodes and
share session keys. In this proposed method a group leader can generate, distribute, update and
revoke keys in its group and a provable secure routing protocol. The main objective is that it
authenticate source, destination and intermediate nodes in the list of RREQ message. This
protocol provides security against various attacks such as rushing, replay and man-in-middle
attack
DOI: https://dx.doi.org/10.26808/rs.ca.i8v1.02
International Journal of Computer Application (2250-1797)
Issue 8 Volume 1, January- February 2018
16
In this protocol malicious node is detected by detecting its malicious behavior in [10]
such as packet dropping, fake advertising, misrouting, violating security rules. This can be
detected and defended by using key management mechanism. Here packet is sent by secrete key
and it is done with encryption and decryption. In this author used two scheme public key. In the
dynamic key management scheme, each node has a pair of private/public key issued by public
Key Infrastructure or certificate authority (CA) and RSA to generate session keys. It is used to
authenticate nodes.
Author proposed DSR protocol in [11] which is based on aggregate signatures (merge
several signatures in one). For public key cryptography author has been used elliptic curve
cryptography.
Drawback is unable to detect node who has not signed in case of negative result.
Author used reputation based system which is based on node reputation and route reputation to
detect malicious and selfish nodes in [12]. Author calculate these using contribution, Capability
of Forwarding (CoF) To implement this scheme author have used dsr protocol. Author also
handle hot point issue where one node carry lot traffic load, it distribute load to alternative path
and avoid hot points. It fight against passive attacks. Advantage of COSR is that it is capable of
avoiding hot points.
To improve performance and security author have used in [13].The security of AODV
will be based on one-way hash, two-way hash and digital signature. Here author generates two
signatures . Intermediate nodes verify only first signature and accept packet and destination
node verify second signature to check authenticity and integrity.
Advantages no certificate and key management scheme, less overhead of calculation, less battery
consumption.
Author proposed modified form of AODV in [14] that is secured routing protocol
(SecAODV), All nodes within MANET are distributed a certain IPv6 address value. In this
scheme, the secured communication channel is established in between source and destination
node depending upon the idea of Statistically Unique and Cryptographically Verifiable (SUCV)
who confirms secured and secret binding between IPv6 address and key node.
STAND protocol proposed in [16]. It finds out wormhole attack in static and mobile
environment. It also finds out correct and incorrect neighbors in the network. To verify the
neighbors of a given node, our protocol reconstructs the topology of its neighborhood by
applying Multidimensional Scaling (MDS) to the available pair wise distances. MDS
(multidimensional scaling) is visualization technique used to visualize set of typically high
dimensional object in lower dimensional node.
In [17] advanced encryption (AES) and elliptical curve cryptography (ECC) are
combined for encryption of node. XORDUALRSA algorithm is considered for authentication
and its robustness, (MD5) for integrity. The splitting of text increases protocol’s strength. Plain
text is encrypted by AES and secret key encrypted by ECC. The proposed work is suitable for
time reduction and power saving.
DOI: https://dx.doi.org/10.26808/rs.ca.i8v1.02
International Journal of Computer Application (2250-1797)
Issue 8 Volume 1, January- February 2018
17
In[18] Here author proposed S-DSR protocol which is based on trusted information of
neighboring nodes. By collecting locality information and trust information about nodes
,probability of the packets which are repeatedly sent along the same path can be reduced. Author
also have peer to peer based approach .To check peers trustworthiness. nodes collect
recommendation from all other peers and calculate reputation value. The peer having higher
reputation value selected as best peer.
This protocol reduces collision and low overhead during the route discovery. It also
increases pdr and throughput.
In [19] author provided double shielded security to routing message and data packets in AODV.
Data packets are secured by generating unique secret key by using sha1 algorithm. It provides a
unique session key by using diffi-helman signature for each route to secure the data
communication. SWR protocol used to encrypt route message by using symmetric cryptography
sha1 and asymmetric cryptography by using node’s public key. Some Attacks are resolved like
route cache poisoning, no participation in discovery process, modification, packet drop.
Author proposed Secure Optimal Reactive Routing Protocol (SORRP) in [20] for mobile
ad-hoc networks. The proposed protocol clubs the pros of both asymmetric and symmetric key
cryptography and provides end-to-end authentication, message integrity, non-repudiation and
confidentiality. While sharing secrete key it is protected with asymmetric cryptography. It also
clubs the best characteristics of both reactive and proactive routing protocol. Like any other
reactive routing protocol it determines the route on demand, thus eliminating the overhead
involved in identifying all possible routes beforehand. SORRP maintain a list containing all the
neighbors, and their connecting cost. This is used in determining the shortest route. This cost
calculated by taking the difference between timestamp of sending and receiving hello messages.
This thesis[21] is based on historical information about node stored in small table.
History based route selection increases packet delivery ratio and improved stability. Packet
forwarding done through only with qualitative nodes this quality judge by monitoring how many
packets are forwarded and how many packets are dropped.
CONCLUSION
Indeed, security is vital concern in variety of applications which are based on MANET. There
are lots of threats and vulnerabilities already present in existing literature. So many researchers
proposed various types of security mechanisms which are included in this survey paper but no
one provide enough security and privacy from the start. Future research should be focused on
designing components of secure routing protocol provisioning so that they would be more
suitable for MANET.
Furthermore, in case of cross-layer attacks combination of different security mechanism
need to enforced. This is worth exploring in future to make MANETs more secure and reliable.
In future there is need to study various security mechanism with its pros and cons and to
develop security routing protocol which able to provide security to route as well as to data
packets.
REFERENCE
[1] A.Aarti, Dr. S. S. Tyagi, 2013. Study of MANET: Characteristics, Challenges, Application
and Security Attacks, IJARCSSE.
DOI: https://dx.doi.org/10.26808/rs.ca.i8v1.02
International Journal of Computer Application (2250-1797)
Issue 8 Volume 1, January- February 2018
18
[2] Mohammad Wazid, Rajesh Kumar Singh, R. H. Goudar, 2011. A Survey of Attacks
Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection
Techniques, (IJCA).
[3] http://www.slideshare.net/sunitasahu101/attacks-in-manet
[4] Gagandeep, Aashima, Pawan Kumar,June 2012.Analysis of Different Security Attacks in
MANETs on Protocol Stack A-Review International Journal of Engineering and
Advanced Technology (IJEAT) ISSN: 2249 8958, Vol.1, No.5
[5] Jyoti Raju and J.J. Garcia-Luna-Aceves," A comparison of On-Demand and Table-
Driven Routing for Ad Hoc Wireless Networks", in Proceeding of IEEE ICC, June 2000
[6] Satyam Shrivastava," Rushing Attack and its Prevention Techniques", IJAIEM, Volume
2, Issue4, April 2013,pp-453-456
[7] P. Papadimitratos, and Z. Haas, "Secure Routing for Mobile Ad hoc Networks",
Proceeding of SCS Communication Networks and Distributed Systems Modeling and
Simulation, January, 2002
[8] Kamal Kumar Chauhan1, Amit Kumar Singh Sanger2, Virendra Singh Kushwah3,
"Securing On-Demand Source Routing in MANETs", 2010 IEEE,pp-294-297
[9] Kamal Kumar Chauhan1 and Amit Kumar Singh Sanger2, "Securing Mobile Ad hoc
Networks: Key Management and Routing", International Journal on AdHoc
Networking Systems (IJANS) Vol. 2, No. 2, April 2012,pp-65-75
[10] Bhuvaneswari M, Dinesh naik, "Secure optimal routing protocol in Manets", 2014
International Conference on Control, Instrumentation,Communication and Computational
Technologies (ICCICCT) IEEE,pp-1320-1323
[11] José Luis Tornos, Joan Josep Piles and José Luis Salazar, "ADSR: Authenticated
DSR",2011 6th International Conference on Risks and Security of Internet and
Systems (CRiSIS), 2011 IEEE,pp-1-8
[12] Fei Wang, Yijun Mo, Benxiong Huang, "COSR: Cooperative On-Demand Secure Route
Protocol in MANET", ISCIT 2006,2006 IEEE,pp-890-893
[13] Morli Pandya,Ashish Kr. Shrivastava.(2013)," Improvising Performance with Security of
AODV Routing Protocol for MANETs", International Journal of Computer Applications.
78 , p1- 1-7.
[14] A. Patwardhan, J. Parker, A. Joshi, M. Iorga and T. Karygiannis, "Secure Routing and
Intrusion Detection in Ad Hoc Networks, " in Proc. of the 3rd IEEE International
conference on Pervasive Computing and Communications, March, 2005, pp. 191-199.
[15] Jihye Kim, Gene Tsudik , "SRDP: Secure route discovery for dynamic source routing in
MANETs", elsevier,Ad Hoc Networks 7 (2009) 10971109.
[16] Somayeh Taheri, Radu Stoleru,Dieter Hogrefe, " Secure Neighbor Discovery in Mobile
Ad Hoc Networks through ...local topology visualization", 2016 IEEE 30th International
Conference on Advanced Information Networking and Applications (AINA),pp- 933-
940.
DOI: https://dx.doi.org/10.26808/rs.ca.i8v1.02
International Journal of Computer Application (2250-1797)
Issue 8 Volume 1, January- February 2018
19
[17] Yasmin Alkady, Mohmed I. Habib, Rawya Y. Rizk, " A New Security Protocol Using
Hybrid Cryptography Algorithms", 978-1-4799-3370-9/13©2013 IEEE,pp-109-115.
[18] V.Bhargavi, Dr. M.Seetha, S.Viswanadharaju, " A Trust Based Secure Routing Scheme
for MANETS",2016 IEEE, pp-565-570.
[19] Jarupula Rajeshwal, Gugulotu Narsimha, " Secure way routing protocol for mobile ad
hoc network", Wireless Networks,springer,February 2017, Volume23, Issue 2, pp
345354
[20] Soma Saha, Rituparna Chaki, Nabendu Chaki, " A New Reactive Secure Routing
Protocol for Mobile Ad-Hoc Networks",7th Computer Information Systems and
Industrial management Applications,2008 IEEE,PP-103-108.
[21] Peter Michael Cappeto, "History-Based Route Selection for Reactive Adhoc Routing
Protocols", thesis, Washington State University,may 2007
Chapter
Full-text available
A provisional network known as (MANET) Mobile Ad-hoc Network (MANET) that can be set up voluntarily in the event of a disaster to communicate between participants. MANETs are used in various potential applications like communication, search and rescue operations in battlefield, in home and industrial networks, in entertainment, and in sensor networks. Numerous routing protocols of different types are advised for use with mobile ad-hoc networks to get optimal routing performance. Dark side of this technology is that it poses a variety of challenges, including variable topology, resource constraints, and unreliable connectivity. In this paper, significant evaluation analysis has been carried out with four different routing protocols like Ad hoc On Demand Distance Vector Routing protocol (AODV) Dynamic Source Routing protocol (DSR.), Destination Sequenced Distance Vector (DSDV), and Link State Routing Protocol (OLSR). In this study, performance parameter throughput is included and NS3 simulator is used to simulate these routing protocols.KeywordsMANETData transmissionRoutingThroughputNS3 simulator
Article
Full-text available
Mobile ad hoc network (MANET) is an infrastructure‐less network. Every Node act as a sender as well as receiver while sending a packet. Neighbor coverage probabilistic rebroadcasting (NCPR) protocol plays a momentous role in MANET for determining a route by helping the transitional nodes to onward a packet when the mobile nodes are not in the transmission space. This protocol minimizes the interference among node and increases the network capacity. There occurs a delay in the network while sending a packet via failure route or channel. Before sending a packet in the network, all the neighbor nodes have to be verified to avert congestion in the network. Quality of service (QoS) plays an important role in the development of MANET. In this research work, delay and neighbor connectivity‐based constrain is focused. The impact of node mobility during interference and delay is examined using network coding‐based topology control algorithm. By using this algorithm, irrelevant links are identified and detached from the topology. The simulation result shows that neighbor coverage established topology control algorithm for delay (NCTCAD) can reduce the delay and upturn the performance in MANETs. The figure shows the graphical representation of neighbor coverage‐based topology control algorithm, which depends on the network layer. This algorithm is to fine‐tune the diffusion power that minimizes interference and selects a best optimal path for routing with efficient erasure coding to minimize the storage size for effective data delivery and also a contradictory to the requirement of delay constraint. The parameters used for computing the neighbor coverage ratio are energy, delay, link quality, and cost, which were helpful to obtain the best path, and also, topology was controlled, which makes high data delivery.
Article
Full-text available
Mobile adhoc network is dynamic in nature and it operates completely in an infrastructure-less environment. It discovers the way routes dynamically to reach the destination. Securing a dynamic way route, which is not known before establishing communication, is always a challenge in the mobile ad hoc network. Most of the existing secure routing protocols target to evade specific type of attacks or malicious behaviour of the nodes or networks. We propose a novel secure way routing protocol for securing the dynamic way routes in MANET. It provides a unique session key for each route to secure the data communication. Moreover, it authenticates the data packets using asymmetric cryptography and secures the routing field message using two-way asymmetric cryptography. The proposal is implemented and tested for assessing the protocol’s performance. We have also compared the protocol with the other secure routing protocols for evaluating its performance.
Conference Paper
MANET consists of the number of mobile nodes that form a wireless communication. MANETs are self configuring network where the nodes can move freely and randomly. It can dynamically join the network and leave the network at any time. It is widely used in industrial and commercial applications like vehicular communication, agricultural needs and disaster management, etc. There are studies based on routing protocols in MANETs to improve their quality and efficiency of the protocols. However, there may lot of research about routing protocols, always it lacks in security. The proposed algorithm uses public key cryptographic technique to make the protocol more secure. Cryptography provides more secure and optimal transactions.
Conference Paper
A group of sensor nodes deployed in particular environment constitutes a wireless sensor network (WSN). At times the WSN can be even deployed in a very sensitive area where the security becomes a great problem. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. A hybrid encryption method that combines both symmetric and asymmetric key can provide high security with minimized key maintenance. In this paper, a new security protocol using combination of both symmetric and asymmetric cryptographic techniques is proposed. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. XOR-DUAL RSA algorithm is considered for authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.
Conference Paper
MANETs have two characteristics that make traditional routing protocols cannot be applied in a straightforward manner to achieve their objectives: firstly, the lack of a default infrastructure; secondly, the variability of this infrastructure once the nodes forming the network move themselves and vary their relative position to the other nodes. Owing to this, specific routing protocols are developed for MANETs. Bearing in mind that the characteristics of these networks limit the available resources (power consumption, bandwidth), incorporating security to routing protocols in an optimal way is not easy. In this paper we present a secure routing protocol based on DSR that employs elliptic curve cryptography to sign the route discovery packets. It also uses the aggregate signature scheme which allows us to compact M signatures of M different messages, even if the signatures are from M different signers, in one single signature.
Article
Networks are used in various fields. Network's popularity has motivated the development of mobile ad-hoc networks (MANETs). A mobile Ad-hoc network is a kind of decentralized wireless system which creates a fast changing network. Due to the dynamic nature and changing topology, MANET is a growing dynamic network, also called mobile mesh network. Mobile ad-hoc network has various kinds of security concern problems, which are caused by their nature of collaborative and open systems and by limited availability of assets. Any central coordinator's absence makes the routing a complex one compared to traditional networks. There are various Routing protocols in Mobile Ad-hoc network but the ad hoc on demand distance vector (AODV) is most popular widely used as it has many attributes. The performance will downgrade when particular host or nodes fails as it sends message regarding this to particular source. This paper observes the performance of AODV Reactive routing protocol and Analyzes different attacks that can be possible on AODV. The paper also explained two layer signature schemes with security which includes secure hash algorithm which further aimed at improving normal AODV's performance. The paper also going to propose an extended version to the secure AODV protocol that includes secure hash algorithm aimed at further improving its security with network performance. Thus, this proposed approach improved by using NS2 simulator, a event-driven simulator which helps to improve various factors like performance factor and security factor.
Article
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network's topology causes weak trust relationship among the nodes in the network. In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs is divided into groups having a group leader in each group. Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. In proposed key management system, both a new node and group leader authenticates each other mutually before joining the network. While proposed secure routing protocol allows both communicating parties as well as intermediate nodes to authenticate other nodes and maintains message integrity
Conference Paper
Now, an ad hoc network works well rely on other nodes in the network for discovering route and forwarding data packets. Most routing protocols are based on the assumption of cooperation and no cheat. If there are malicious nodes to attack network, these protocols would be broken down. In this paper, we propose the cooperative on-demand secure route (COSR) protocol to against the main passive route attacks. COSR measures node-reputation (NR) and route-reputation (RR) by contribution, capability of forwarding (CoF) and recommendation to detect malicious nodes. Furthermore, COSR uses reputation to balance load to avoid hot-point in the network. In this paper, we provide definition and formula of NR and RR. Moreover, we present improvement of DSR by reputation model to discover optimum route
Article
Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered both the simplest and the most effective. At the same time, security in MANETs – especially, routing security – presents a number of new and interesting challenges. Many security techniques geared for MANETs have been developed, among which Ariadne is the flagship protocol for securing DSR.The focus of this work is on securing the route discovery process in DSR. Our goal is to explore a range of suitable cryptographic techniques with varying flavors of security, efficiency and robustness. The Ariadne approach (with TESLA), while very efficient, assumes loose time synchronization among MANET nodes and does not offer non-repudiation. If the former is not possible or the latter is desired, an alternative approach is necessary. To this end, we construct a secure route discovery protocol (SRDP) which allows the source to securely discover an authenticated route to the destination using either aggregated message authentication codes (MACs) or multi-signatures. Several concrete techniques are presented and their efficiency and security are compared and evaluated.