JIS  Vol.5 No.4 , October 2014
Security Enhanced Adaptive TCP for Wireless Ad Hoc Networks
ABSTRACT
TCP is a reliable transport protocol designed to perform well in wired networks where packet losses are due congestion. However in wireless ad hoc networks, where packet losses are due to channel errors or link failures between mobile nodes, TCP degrades its performance. Further, it lacks certain protection mechanisms from internal and external malicious nodes. In this paper, a security enhanced and adaptive TCP, namely SA-TCP, has been proposed for wireless ad hoc networks. SA-TCP uses network layer information to detect various types of packet losses and adjusts the value of congestion window dynamically according to the conditions of the dynamic network. It works normally to collect the samples of congestion window and calculates the mean from these samples to set the value of future congestion window. SA-TCP also adjusts the value of congestion window limit according to network conditions. In order to make SA-TCP suitable in highly vulnerable wireless ad hoc networks, a less complex identity-based public key cryptography has been integrated with the proposed protocol. The three-way handshaking process of SA-TCP is made secure by generating a secret session key on-fly between source-destination. Simulation results show that SA-TCP gives higher throughput compared to the popular New Reno and ATCP in different wireless ad hoc network scenarios.

Cite this paper
Alnumay, W. (2014) Security Enhanced Adaptive TCP for Wireless Ad Hoc Networks. Journal of Information Security, 5, 207-217. doi: 10.4236/jis.2014.54019.
References
[1]   Holland, G. and Vaidya, N. (1999) Analysis of TCP Performance over Mobile AD Hoc Networks. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, 15-19 August 1999, 219-230.

[2]   Hoe, J.C. (1996) Improving the Start-Up Behavior of a Congestion Control Scheme for TCP. ACM SIGCOMM Computer Communication Review, 26, 270-280. http://dx.doi.org/10.1145/248157.248180

[3]   Xu, S. and Saadawi, T. (2002) Performance Evaluation of TCP Algorithms in Multi-Hop Wireless Packet Networks. Journal of Wireless Communication and Mobile Computing, 2, 85-100.
http://dx.doi.org/10.1002/wcm.35

[4]   Chandran, K., Ragbunathan, S., Venkatesan, S. and Prakash, R. (1998) A Feedback Based Scheme for Improving TCP Performance in Ad-Hoc Wireless Networks. Proceedings of 18th International Conference on Distributed Computing Systems, 472-479.

[5]   Sundaresan, K., Anantharaman, V., Hsieh, H.Y. and Sivakumar, R. (2005) ATP: A Reliable Transport Protocol for Ad Hoc Networks. IEEE Transactions on Mobile Computing, 4, 588-603.
http://dx.doi.org/10.1109/TMC.2005.81

[6]   Singh, H., Saxena, S. and Singh, S. (2004) Energy Consumption of TCP in ad hoc Networks. Wireless Network, 10, 531-542. http://dx.doi.org/10.1023/B:WINE.0000036456.85213.45

[7]   Kopparty, S., Krishnamurthy, S.V., Faloutsos, M. and Tripathi, S.K. (2002) Split TCP for Mobile Ad Hoc Networks. Proceedings of the IEEE Global Communications Conference (GLOBECOM 2002), Taipei, 17-21 November 2002, 138-142.

[8]   Liu, J. and Singh, S. (2001) ATCP: TCP for Mobile ad Hoc Networks. IEEE JSAC, 19, 1300-1315.

[9]   Kim, D., Toh, C.K. and Choi, Y. (2000) TCP-BuS: Improving TCP Performance in Wireless Ad Hoc Networks. Proceedings of IEEE International Conference on Communications (ICC), 3, 1707-1713.

[10]   Wu, B., Chen, J., Wu, J. and Cardei, M. (2007) A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. Wireless Network Security. Springer, New York.

[11]   Ghosh, U. and Datta, R. (2013) P-TCP: A Prediction Based Secure Transmission Control Protocol for Wireless Ad Hoc Networks. IETE Journal of Research, 59, 364-375. http://dx.doi.org/10.4103/0377-2063.118029

[12]   Al Hanbali, A., Altman, E. and Nain, P. (2005) A Survey of TCP over Ad Hoc Networks. IEEE Communications Surveys Tutorials, 7, 22-36. http://dx.doi.org/10.1109/COMST.2005.1610548

[13]   Wang, F. and Zhang, Y. (2002) Improving TCP Performance over Mobile Ad Hoc Networks with Out-of-Order Detection and Response. Proceedings of ACM MOBIHOC, 217-225.

[14]   Dyer, T. and Boppana, R. (2001) A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks. Proceedings of ACM MOBIHOC, 56-66.

[15]   Leung, K.C. and Li, V.O.K. (2006) Transmission Control Protocol (TCP) in Wireless Networks: Issues, Approaches, and Challenges. IEEE Communications Surveys Tutorials, 8, 64-79.
http://dx.doi.org/10.1109/COMST.2006.283822

[16]   Zheng, Q., Hong, X., Liu, J. and Tang, L. (2007) A Secure Data Transmission Scheme for Mobile Ad Hoc Networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), Washington, 26-30 November 2007, 1006-1010.

[17]   Papadimitratos, P. and Haas, Z.J. (2006) Secure Data Communication in Mobile Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 24, 343-356.
http://dx.doi.org/10.1109/JSAC.2005.861392

[18]   Ghosh, U. and Datta, R. (2011) Identity Based Secure AODV and TCP for Mobile Ad Hoc Networks. Proceedings of ACM ACWR, 339-346.

[19]   Diffie, W. and Hellman, M.E. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory, 22, 644-654. http://dx.doi.org/10.1109/TIT.1976.1055638

[20]   IP Security Protocol (IPSEC). http://www.ietf.org/html.charters/ipsp-charter.html

[21]   Ramakrishnan, K.K., Floyd, S., Black, D. and Ramakrishnan, G.K. (2001) The Addition of Explicit Congestion Notification (ECN) to IP.

[22]   de Oliveira, R. and Braun, T. (2002) TCP in Wireless Mobile Ad Hoc Networks. Technical Report.

[23]   Kaufman, C., Perlman, R. and Speciner, M. (2002) Network Security Private Communication in a Public World. Prentice Hall PTR, Upper Saddle River.

[24]   Ghosh, U. and Datta, R. (2013) SDRP: A Secure and Dynamic Routing Protocol for Mobile Ad Hoc Networks. IET Networks.

[25]   Ghosh, U. and Datta, R. (2012) A Novel Signature Scheme to Secure Distributed Dynamic Address Configuration Protocol in Mobile Ad Hoc Networks. IEEE WCNC, 2700-2705.

[26]   Ghosh, U. and Datta, R. (2011) A Secure Dynamic IP Configuration Scheme for Mobile Ad Hoc Networks. Ad Hoc Networks, 9, 1327-1342. http://dx.doi.org/10.1016/j.adhoc.2011.02.008

[27]   Sakai, R., Ohgishi, K. and Kasahara, M. (2000) Cryptosystems Based on Pairings. The 2000 Symposium on Cryptography and Information Security, 26-28.

[28]   Alnumay, W.S., Ghosh, U. and Chatterjee, P. (2014) SA-TCP: A Secure and Adaptive TCP for Wireless Ad Hoc Networks. Frontier and Innovation in Future Computing and Communications, 1-9.

[29]   Stoica, P., Friedlander, B. and Soderstrom, T. (1986) Least-Squares, Yule-Walker, and Overdetermined Yule-Walker Estimation of AR Parameters: A Monte Carlo Analysis of Finite-Sample Properties. International Journal of Control, 43, 13-27.
http://dx.doi.org/10.1080/00207178608933446

[30]   Chen, K., Xue, Y. and Nahrstedt, K. (2003) On Setting TCP’s Congestion Window Limit in Mobile Ad Hoc Networks. Proceedings of IEEE International Conference on Communications, Alaska.

 
 
Top