SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 98
SECURITY IN AD-HOC NETWORKS
Raja Iswary1
, Rohit Kumar Das2
1
Department of Information Technology, Assam University, Silchar
2
Department of Information Technology, Assam University, Silchar
Abstract
On wireless computer networks, ad-hoc mode is a method for wireless devices to directly communicate with each other. Operating in
ad-hoc mode allows all wireless devices within range of each other to discover and communicated in peer-to-peer fashion. One main
challenge in design of these networks is their vulnerability to security attacks. The growing popularity and widespread applications of
wireless networks are directly proportionate to their propensity for security exploitation. In this paper we have discussed about the
potential attacks and security issues of routing protocols face by ad-hoc network.
Keywords: Ad-hoc network, Network Attacks, Routing Protocols
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
An ad hoc network is made up of multiple “nodes” connected
by “links”. An ad-hoc network is a local area network (LAN)
that is built spontaneously as devices connect. Instead of relying
on a base station to coordinate the flow of messages to each
node in the network, the individual network nodes forward
packets to and from each other. Basically, an ad hoc network is
a temporary network connection created for a specific purpose
(such as transferring data from one computer to another). An ad
hoc network typically refers to any set of networks where all
devices have equal status on a network and are free to associate
with any other ad hoc network devices in link range. As the
medium of transmission is wireless the security aspect for this
type of transmission is very high and is one of the major
concerned issues. In this paper, for the first section we will see
some of the security aspects for the ad-hoc network, the second
section is be consisting of the vulnerable attacks and then the
routing protocols.
2. SECURITY IN AD-HOC NETWORK
2.1 Network Availability
Services should be available whenever required. Availability is
a key concern in wireless network security. It relates to the
survivability and operability of a wireless network.
Fig 1: Topology change in ad hoc networks: nodes A, B, C, D,
E, and F constitute an ad hoc network.
The circle represents the radio range of node A. The network
initially has the topology in (a). When node D moves out of the
radio range of A, the network topology changes to the one in (b)
Availability ensures not only operational efficiency, but also
data delivery. This is usually done by the routing protocol. [2]
2.2 Integrity
Data which are being transmitted over the wireless ad-hoc
network are integrated in such a way that they cannot be
corrupted.
2.3 Authentication
Authentication is the ability of a node to identify the node with
which it is communicating. If authentication process is not
enabling then the attacker could gain unauthorized access to
resource and can get sensitive information of other nodes.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 99
2.4 Confidentiality
It ensures that some sensitive information is never disclosed to
any unauthorized users.
2.5 Non-repudiation
Non-repudiation states that the sender of the message cannot
deny having sent it. Non-repudiation is useful for detection and
isolation of compromised nodes. [4]
3. ATTACK ON AD HOC NETWORK
3.1 Denial of Service Attacks
A denial of service attack is the most common attack to deny
network availability. On the physical and media access control
layers, an adversary could employ jamming to interfere with
communication on physical channels. On the network layer, an
adversary could disrupt the routing protocol and disconnect the
network. On the higher layers, an adversary could bring down
high-level services. As Wireless devices use CSMA/CA
protocol to transmit data. If a user wants to transmit data must
first listen to the channel to check for activity. If the channel is
idle, the user can begin transmission. Otherwise, the user must
wait until the channel is free. By design most wireless devices
share the communication medium. However, it is possible for a
device to constantly transmit energy on the frequency of a
wireless network, making the channel unavailable. This
effectively denies all service (data transmission) on the network.
There is no realistic protection against such an attack. If a node
has the appropriate hardware, a DoS attacked can be mitigated.
If the channel remains unavailable for a predetermined amount
of time, an alternative channel (RF) may be used.
3.2 Passive Attack
The passive attacks only intercept the message transmitted in
the network without disturbing the transmission. The attacker
will be able to analyze the valuable information like network
topology to perform further attacks. Unfortunately, this kind of
attack in wireless network is impossible to detect due to the
nature of wireless network that its medium is air which is
widely open to every user within the domain. Passive attacks
threaten confidentiality of data.
3.3 Active Attack
An active attack attempts to alter or destroy the data being
exchanged in the network there by disrupting the normal
functioning of the network. This threat violates the security of
the system. Some examples of active attacks are data
interruption, interception, modification and fabrication.
3.4 Wormhole Attack
This is a network layer attack where the attacker records packets
at one location in the network and tunnels them to another
location. Routing can be disrupted when routing control
messages are tunneled. This tunnel between two colluding
attackers is referred as a wormhole. There are several variations
to the wormhole attack. Such as Wormhole using Out-of-Band
Channel, Wormhole with High Power Transmission, Wormhole
using Packet Relay, Wormhole using Protocol Deviations. [3]
Fig 2: Wormhole attack
3.5 Blackhole attack
Here a node provides an arbitrary false shortest path route
replies to the route requests it receives. These fake replies can
be use simply to attract all traffic to it in order to perform a
denial of service attack by dropping the received packets. The
attacker consumes the intercepted packets without any
forwarding. However, the attacker runs the risk that neighboring
nodes will monitor and expose the ongoing attacks. There is a
more subtle form of these attacks when an attacker selectively
forwards packets. An attacker suppresses or modifies packets
originating from some nodes, while leaving the data from the
other nodes unaffected, which limits the suspicion of its
wrongdoing.
Fig 3: Blackhole attack
3.6 Location Disclosure
The actual location of a device needs to be kept hidden for
reasons of privacy of the user. In this approach, an attacker is
able to detect the location of nodes or may even get the entire
structure of the network.
3.7 Packet Replication
This attack fall under the routing attack category where the stale
packets are replicated which require additional bandwidth. This
results in confusion in the routing process as it will be difficult
to identify which of the packet to forward to the other nodes. [4,
5]
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 100
4. EXPLORATION OF SECURITY CONCERN IN
AD-HOC NETWORK USING ROUTING
PROTOCOL
A clear distinction exists between a wired and wireless when it
comes to a routing protocol mechanism. Routing in traditional
wired networks with fixed infrastructure when compared with a
wireless faces certain problems. A limitations imposed by the
Ad-hoc infrastructure as whether or not a routes records need to
be created, whether or not a routing protocol should depend on a
centralized entity or a routing protocol should be energy
efficient imposes a serious concern. Thus, knowing the fact that
this limitation are indeed serious concern so mechanisms that
are operable in a most suitable ways are proposed as most
existing routing protocol follow up two different approaches
that deal with an Ad-hoc networks: the table driven and the
source-initiated on-demand approaches. [6]
4.1 Proactive Routing Protocols (The Table Driven)
A Clear and consistent view of the network topology by
propagating periodic updates and maintaining at all times
routing information regarding the connectivity of every node to
all other nodes that participate in the network follows a
Proactive Mechanism. This provides a quick way to route data
across the network which turns out to be an expensive one in a
small network as minimal of activity involved in it.
Some Classification based on Proactive Routing Protocol:
4.1.1 Dynamic Destination-Sequenced Distance-Vector
Routing Protocol (DSDV)
In this approach each and every nodes that are within the
network maintains a routing table information containing each
destinations and the number of hops required which follows a
Bellman-Ford routing algorithms. Every significant change are
propagated as each node broadcasts its routing table where
updates are sent in either full or incremental dumps i.e. in case
of full dump the entire table is sent and in case of incremental
only the routing data that has changed are sent.
4.1.2 Wireless Routing Protocol (WRP):
WRP uses an enhanced version of the distance-vector routing
protocol, which uses the Bellman-Ford algorithm to calculate
paths. The tables that are maintained by a node are the
following: Distance table (DT), Routing table (RT), link cost
table (LCT), and a message retransmission list (MRL). The
protocol introduces mechanisms which reduce route loops and
ensure reliable message exchange. To overcome the count-to-
infinity problem and to enable faster convergence, it employs a
unique method of maintaining information regarding the
shortest distance to every destination node in the network and
hop node on the path to every destination node.
4.1.3 Global State Routing (GAR):
In Global state routing the entire network is not flooded as is the
case with Dynamic Destination-Sequence Distance-vector
routing. Here three tables are maintained for each node: a
neighbor list, a topology table, a next hop table and a distance
table.
4.2 Reactive Routing Protocols (Source-Initiated on-
Demand):
In this approach a source node initiates a rote discovery function
where a route is created only when the source node requires a
route to specific destinations. Being a less resource intensive as
compared to Proactive routing there is no need of periodic
transmission of updates as information responds are achieved
when demand arises.
Some Classification based on Reactive Routing Protocol:
4.2.1 Ad Hoc on-Demand Distance Vector Routing
(AODV)
DSDV is improved an enhanced by AODV. It is a Reactive
routing protocol, meaning that it establishes a route to a
destination only on demand. AODV is, as the name indicates,
a distance-vector routing protocol. AODV avoids the counting-
to-infinity problem of other distance-vector protocols by using
sequence numbers on route updates, a technique pioneered
by DSDV. AODV is capable of
both unicast and multicast routing. In AODV based on the
demand for route information the Broadcast is minimized. Its
simplicity is that when broadcasting RREQ packet between a
source and destination an immediate node receives and forwards
it to the destination.
4.2.2 Dynamic Source Routing
Dynamic Source Routing' (DSR) is a routing protocol which
forms a route on-demand when a transmitting computer requests
one. However, it uses source routing instead of relying on the
routing table at each intermediate device. This protocol is truly
based on source routing whereby all the routing information is
maintained at mobile nodes. It has only two major phases which
are Route Discovery and Route Maintenance. Route Reply
would only be generated if the message has reached the
intended destination node.
Dynamic source routing protocol (DSR) is an on-demand
protocol designed to restrict the bandwidth consumed by control
packets in ad hoc wireless networks by eliminating the periodic
table-update messages required in the table-driven approach.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 101
5. ROUTING PROTOCOL SECURITY
The determination of the flow of data from node to node can be
obtained through the routing protocol. As the flow of data from
source to destination passes through many intermediate nodes in
a wireless environment it is prone to be intercepted. So security
aspects need to be improved for secure communication. A
number of security measures are undertaken to limit the risks.
Encryption: Making a data secure follows the mechanism of
Encryption where a data that a sender wants to sent towards its
destination needs to be encrypted such that the data is not easily
broken or known to the outside world. On the other side i.e. at
the destination the data is easily broken down by the decryption
mechanism.
Depending upon the Energy required, Memory and
Computation Power the techniques like RSA and Diffie-
Hellman are use for Encryption-Decryption mechanism.
Authentication: In a wireless environment a node makes itself
authenticated to other available nodes by creating neighborhood
tables where the various identification numbers are include in
the table. The sending node enters its own identification number
and sends towards the destination. Once the identification
number is verified using the neighborhood table by the receiver
the data is forwarded to the destination.
Authentication-Encryption: Combining the features of both
Authentication and Encryption a more secure way of
communication among the nodes can be achieved and prevent
nodes from being intercepted. Using the similar authentication
technique mentioned above, the transmitting node includes its
identification number and that same number encrypted in the
data header. When the receiving node receives the data, it
verifies the sender’s node identification and decrypts the
encrypted identification number. If both identification numbers
match, the data is forwarded.
These are the most basic techniques in securing the data in Ad-
hoc network.
6. SECURE ROUTING PROTOCOLS:
With respect to the performance and security a secure routing
protocol offers additional features in regards to security in Ad-
hoc Mobile network and also their protection from different
types of Attacks. Various Secure routing Protocols that provide
performance and security are as follows:
6.1 Authenticated Routing for Ad Hoc Networks
(ARAN)
The detection and protection against the malicious attackers by
third parties and peers in Ad-hoc environment guarded by
ARAN by performing Authentication, non-repudiation and
Message Integrity. A Digital Signature is being used as it is an
on-demand routing protocol. When communicating between
node A wants and node Z, it broadcasts a route discovery packet
(RDP). The IP field specifies the IP address of Z. The message
includes A’s certificate, a nonce that increases every time A
sends an RDP along with a time stamp. The message is signed
with A’s private key. When intermediate node B receives the
message, it verifies the authenticity by extracting A’s public key
from the certificate within the message. After checking to make
sure the certificate has not expired, node B sets up a (reverse)
route towards the originator A of the RDP. If this is the first
time that node B has seen this message, it attaches its own
certificate, signs the message with its private key and
rebroadcasts the RDP. Once node Z finally receives the
message, it signs the message with its private key, IP address
and certificate and sends a route reply (RREP) message. Nodes
unicast the RREP message to the originator A through the
discovered path. As the REP traverses the path, the intermediate
nodes remove the certificate and signature of the previous node.
Finally, node A receives the RREP and verifies the authenticity
of the response.
6.2 Secure Ad Hoc On-Demand Distance Vector
(SAODV)
Source authentication, import authorization, integrity and data
authentication services are provided by SAODV in which it
assumes that there is a key management system (KMS) that
assigns keys to the nodes, verifying the association of the public
keys and the node identities. Hash chains are used to secure the
hop count and digital signatures authenticate the message fields.
Applying a one-way hash function to a random seed value a
hash chain provides integrity for hop count.
6.3 Secure Efficient Ad Hoc Distance Vector (SEAD)
Taking into account the various limited resources (network
bandwidth, processing capabilities, and memory and battery
power) of the nodes SEAD provides secure distance vector
routing. It uses a one-way Hash function and follows the way as
DSDV performs. [1]
7. CONCLUSIONS
In today’s world the wireless technology is growing in a repaid
fashion because of their easy implementation and use. A
technology with advantage also comes with certain
disadvantages. As the medium of transmission in wireless
technology is not secure so, in this paper, we have analyzed the
security for an ad hoc network faces and presented the operation
of routing protocol based on security prospective. Various
attacks for the ad-hoc networks is been declared.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 102
REFERENCES
[1]. Barbeau, M. and Kranakis, E. Principles of Ad Hoc
Networking. John Wiley and Sons Publication . 2007.
[2]. Zhang, H., Olariu, S., Cao, J. Mobile Ad-hoc Sensor
Networks: Third International Conference. Springer, 2007.
MSN 2007. Beijing, China. December 12-14, 2007.
[3]. Das, V. and Vijaykumar, R. Information and
Communication Technologies. International Conference, ICT
2010. Kochi, Kerala, India. September 2010.
[4]. Science Academy Transactions on Computer and
Communication Networks, Vol. 1, No. 1, March 2011
[5]. Securing Ad Hoc Networks, Lidong Zhou Department of
Computer Science, Cornell University Ithaca, NY 14853
[6]. Kejun Liu, Jing Deng, Member, IEEE, Pramod K.
Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member,
IEEE, “An Acknowledgment-Based Approach for the Detection
of Routing Misbehavior in MANETs” IEEE Transaction on
Mobile Computing, VOL. 6, NO. 5, May 2007

More Related Content

What's hot

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2IAEME Publication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksIRJET Journal
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 

What's hot (15)

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
 
1705 1708
1705 17081705 1708
1705 1708
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 

Viewers also liked

Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualeSAT Publishing House
 
Load frequency control of a two area hybrid system consisting of a grid conne...
Load frequency control of a two area hybrid system consisting of a grid conne...Load frequency control of a two area hybrid system consisting of a grid conne...
Load frequency control of a two area hybrid system consisting of a grid conne...eSAT Publishing House
 
Comparative studies on formability analysis in metal
Comparative studies on formability analysis in metalComparative studies on formability analysis in metal
Comparative studies on formability analysis in metaleSAT Publishing House
 
Umts femto access point for higher data rate and better quality of service to...
Umts femto access point for higher data rate and better quality of service to...Umts femto access point for higher data rate and better quality of service to...
Umts femto access point for higher data rate and better quality of service to...eSAT Publishing House
 
A new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages fromA new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages fromeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Self checking approach for reducing soft errors in states of fsm
Self checking approach for reducing soft errors in states of fsmSelf checking approach for reducing soft errors in states of fsm
Self checking approach for reducing soft errors in states of fsmeSAT Publishing House
 
Analysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach inAnalysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach ineSAT Publishing House
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
 
Transition for regular to mach reflection hysteresis
Transition for regular to mach reflection hysteresisTransition for regular to mach reflection hysteresis
Transition for regular to mach reflection hysteresiseSAT Publishing House
 
Conceptual design of injection mould tool for inlet
Conceptual design of injection mould tool for inletConceptual design of injection mould tool for inlet
Conceptual design of injection mould tool for inleteSAT Publishing House
 
Growth and characterization of cd s doped kdp single
Growth and characterization of cd s doped kdp singleGrowth and characterization of cd s doped kdp single
Growth and characterization of cd s doped kdp singleeSAT Publishing House
 
Fpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converterFpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp convertereSAT Publishing House
 

Viewers also liked (20)

Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Load frequency control of a two area hybrid system consisting of a grid conne...
Load frequency control of a two area hybrid system consisting of a grid conne...Load frequency control of a two area hybrid system consisting of a grid conne...
Load frequency control of a two area hybrid system consisting of a grid conne...
 
Comparative studies on formability analysis in metal
Comparative studies on formability analysis in metalComparative studies on formability analysis in metal
Comparative studies on formability analysis in metal
 
Umts femto access point for higher data rate and better quality of service to...
Umts femto access point for higher data rate and better quality of service to...Umts femto access point for higher data rate and better quality of service to...
Umts femto access point for higher data rate and better quality of service to...
 
A new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages fromA new approach “ring” for restricting web pages from
A new approach “ring” for restricting web pages from
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Self checking approach for reducing soft errors in states of fsm
Self checking approach for reducing soft errors in states of fsmSelf checking approach for reducing soft errors in states of fsm
Self checking approach for reducing soft errors in states of fsm
 
Analysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach inAnalysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach in
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...
 
Transition for regular to mach reflection hysteresis
Transition for regular to mach reflection hysteresisTransition for regular to mach reflection hysteresis
Transition for regular to mach reflection hysteresis
 
Conceptual design of injection mould tool for inlet
Conceptual design of injection mould tool for inletConceptual design of injection mould tool for inlet
Conceptual design of injection mould tool for inlet
 
Growth and characterization of cd s doped kdp single
Growth and characterization of cd s doped kdp singleGrowth and characterization of cd s doped kdp single
Growth and characterization of cd s doped kdp single
 
Fpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converterFpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converter
 

Similar to Security in ad hoc networks

PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETsIOSR Journals
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networkseSAT Journals
 
A survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networksA survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networkseSAT Journals
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Similar to Security in ad hoc networks (20)

1705 1708
1705 17081705 1708
1705 1708
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETs
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networks
 
A survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networksA survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networks
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Md ux mza5mtg=14
Md ux mza5mtg=14Md ux mza5mtg=14
Md ux mza5mtg=14
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Recently uploaded

College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...perfect solution
 
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...anamikaraghav4
 
Call Girls in Najafgarh Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Najafgarh Delhi 💯Call Us 🔝8264348440🔝Call Girls in Najafgarh Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Najafgarh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Cash Payment Contact:- 7028418221 Goa Call Girls Service North Goa Escorts
Cash Payment Contact:- 7028418221 Goa Call Girls Service North Goa EscortsCash Payment Contact:- 7028418221 Goa Call Girls Service North Goa Escorts
Cash Payment Contact:- 7028418221 Goa Call Girls Service North Goa EscortsApsara Of India
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEApsara Of India
 
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...anamikaraghav4
 
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service AsansolVIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service AsansolRiya Pathan
 
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Riya Pathan
 
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...Riya Pathan
 
VIP Call Girls Pune Sanjana 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Sanjana 8617697112 Independent Escort Service PuneVIP Call Girls Pune Sanjana 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Sanjana 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...Neha Kaur
 
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...Riya Pathan
 
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal EscortsCall Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal EscortsApsara Of India
 
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts ServiceVIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts ServiceApsara Of India
 
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment BookingCall Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Bookingnoor ahmed
 
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...Apsara Of India
 
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur EscortsCall Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdf1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdfTanjirokamado769606
 

Recently uploaded (20)

College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
 
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
College Call Girls New Alipore - For 7001035870 Cheap & Best with original Ph...
 
Call Girls in Najafgarh Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Najafgarh Delhi 💯Call Us 🔝8264348440🔝Call Girls in Najafgarh Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Najafgarh Delhi 💯Call Us 🔝8264348440🔝
 
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(DIVYA) Dhanori Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Cash Payment Contact:- 7028418221 Goa Call Girls Service North Goa Escorts
Cash Payment Contact:- 7028418221 Goa Call Girls Service North Goa EscortsCash Payment Contact:- 7028418221 Goa Call Girls Service North Goa Escorts
Cash Payment Contact:- 7028418221 Goa Call Girls Service North Goa Escorts
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
 
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
 
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service AsansolVIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
 
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
 
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
 
VIP Call Girls Pune Sanjana 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Sanjana 8617697112 Independent Escort Service PuneVIP Call Girls Pune Sanjana 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Sanjana 8617697112 Independent Escort Service Pune
 
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
 
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
 
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal EscortsCall Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
Call Girls In Karnal O8860008073 Sector 6 7 8 9 Karnal Escorts
 
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
 
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts ServiceVIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
 
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment BookingCall Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
 
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
 
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur EscortsCall Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
 
1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdf1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdf
 

Security in ad hoc networks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 98 SECURITY IN AD-HOC NETWORKS Raja Iswary1 , Rohit Kumar Das2 1 Department of Information Technology, Assam University, Silchar 2 Department of Information Technology, Assam University, Silchar Abstract On wireless computer networks, ad-hoc mode is a method for wireless devices to directly communicate with each other. Operating in ad-hoc mode allows all wireless devices within range of each other to discover and communicated in peer-to-peer fashion. One main challenge in design of these networks is their vulnerability to security attacks. The growing popularity and widespread applications of wireless networks are directly proportionate to their propensity for security exploitation. In this paper we have discussed about the potential attacks and security issues of routing protocols face by ad-hoc network. Keywords: Ad-hoc network, Network Attacks, Routing Protocols ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION An ad hoc network is made up of multiple “nodes” connected by “links”. An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. Basically, an ad hoc network is a temporary network connection created for a specific purpose (such as transferring data from one computer to another). An ad hoc network typically refers to any set of networks where all devices have equal status on a network and are free to associate with any other ad hoc network devices in link range. As the medium of transmission is wireless the security aspect for this type of transmission is very high and is one of the major concerned issues. In this paper, for the first section we will see some of the security aspects for the ad-hoc network, the second section is be consisting of the vulnerable attacks and then the routing protocols. 2. SECURITY IN AD-HOC NETWORK 2.1 Network Availability Services should be available whenever required. Availability is a key concern in wireless network security. It relates to the survivability and operability of a wireless network. Fig 1: Topology change in ad hoc networks: nodes A, B, C, D, E, and F constitute an ad hoc network. The circle represents the radio range of node A. The network initially has the topology in (a). When node D moves out of the radio range of A, the network topology changes to the one in (b) Availability ensures not only operational efficiency, but also data delivery. This is usually done by the routing protocol. [2] 2.2 Integrity Data which are being transmitted over the wireless ad-hoc network are integrated in such a way that they cannot be corrupted. 2.3 Authentication Authentication is the ability of a node to identify the node with which it is communicating. If authentication process is not enabling then the attacker could gain unauthorized access to resource and can get sensitive information of other nodes.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 99 2.4 Confidentiality It ensures that some sensitive information is never disclosed to any unauthorized users. 2.5 Non-repudiation Non-repudiation states that the sender of the message cannot deny having sent it. Non-repudiation is useful for detection and isolation of compromised nodes. [4] 3. ATTACK ON AD HOC NETWORK 3.1 Denial of Service Attacks A denial of service attack is the most common attack to deny network availability. On the physical and media access control layers, an adversary could employ jamming to interfere with communication on physical channels. On the network layer, an adversary could disrupt the routing protocol and disconnect the network. On the higher layers, an adversary could bring down high-level services. As Wireless devices use CSMA/CA protocol to transmit data. If a user wants to transmit data must first listen to the channel to check for activity. If the channel is idle, the user can begin transmission. Otherwise, the user must wait until the channel is free. By design most wireless devices share the communication medium. However, it is possible for a device to constantly transmit energy on the frequency of a wireless network, making the channel unavailable. This effectively denies all service (data transmission) on the network. There is no realistic protection against such an attack. If a node has the appropriate hardware, a DoS attacked can be mitigated. If the channel remains unavailable for a predetermined amount of time, an alternative channel (RF) may be used. 3.2 Passive Attack The passive attacks only intercept the message transmitted in the network without disturbing the transmission. The attacker will be able to analyze the valuable information like network topology to perform further attacks. Unfortunately, this kind of attack in wireless network is impossible to detect due to the nature of wireless network that its medium is air which is widely open to every user within the domain. Passive attacks threaten confidentiality of data. 3.3 Active Attack An active attack attempts to alter or destroy the data being exchanged in the network there by disrupting the normal functioning of the network. This threat violates the security of the system. Some examples of active attacks are data interruption, interception, modification and fabrication. 3.4 Wormhole Attack This is a network layer attack where the attacker records packets at one location in the network and tunnels them to another location. Routing can be disrupted when routing control messages are tunneled. This tunnel between two colluding attackers is referred as a wormhole. There are several variations to the wormhole attack. Such as Wormhole using Out-of-Band Channel, Wormhole with High Power Transmission, Wormhole using Packet Relay, Wormhole using Protocol Deviations. [3] Fig 2: Wormhole attack 3.5 Blackhole attack Here a node provides an arbitrary false shortest path route replies to the route requests it receives. These fake replies can be use simply to attract all traffic to it in order to perform a denial of service attack by dropping the received packets. The attacker consumes the intercepted packets without any forwarding. However, the attacker runs the risk that neighboring nodes will monitor and expose the ongoing attacks. There is a more subtle form of these attacks when an attacker selectively forwards packets. An attacker suppresses or modifies packets originating from some nodes, while leaving the data from the other nodes unaffected, which limits the suspicion of its wrongdoing. Fig 3: Blackhole attack 3.6 Location Disclosure The actual location of a device needs to be kept hidden for reasons of privacy of the user. In this approach, an attacker is able to detect the location of nodes or may even get the entire structure of the network. 3.7 Packet Replication This attack fall under the routing attack category where the stale packets are replicated which require additional bandwidth. This results in confusion in the routing process as it will be difficult to identify which of the packet to forward to the other nodes. [4, 5]
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 100 4. EXPLORATION OF SECURITY CONCERN IN AD-HOC NETWORK USING ROUTING PROTOCOL A clear distinction exists between a wired and wireless when it comes to a routing protocol mechanism. Routing in traditional wired networks with fixed infrastructure when compared with a wireless faces certain problems. A limitations imposed by the Ad-hoc infrastructure as whether or not a routes records need to be created, whether or not a routing protocol should depend on a centralized entity or a routing protocol should be energy efficient imposes a serious concern. Thus, knowing the fact that this limitation are indeed serious concern so mechanisms that are operable in a most suitable ways are proposed as most existing routing protocol follow up two different approaches that deal with an Ad-hoc networks: the table driven and the source-initiated on-demand approaches. [6] 4.1 Proactive Routing Protocols (The Table Driven) A Clear and consistent view of the network topology by propagating periodic updates and maintaining at all times routing information regarding the connectivity of every node to all other nodes that participate in the network follows a Proactive Mechanism. This provides a quick way to route data across the network which turns out to be an expensive one in a small network as minimal of activity involved in it. Some Classification based on Proactive Routing Protocol: 4.1.1 Dynamic Destination-Sequenced Distance-Vector Routing Protocol (DSDV) In this approach each and every nodes that are within the network maintains a routing table information containing each destinations and the number of hops required which follows a Bellman-Ford routing algorithms. Every significant change are propagated as each node broadcasts its routing table where updates are sent in either full or incremental dumps i.e. in case of full dump the entire table is sent and in case of incremental only the routing data that has changed are sent. 4.1.2 Wireless Routing Protocol (WRP): WRP uses an enhanced version of the distance-vector routing protocol, which uses the Bellman-Ford algorithm to calculate paths. The tables that are maintained by a node are the following: Distance table (DT), Routing table (RT), link cost table (LCT), and a message retransmission list (MRL). The protocol introduces mechanisms which reduce route loops and ensure reliable message exchange. To overcome the count-to- infinity problem and to enable faster convergence, it employs a unique method of maintaining information regarding the shortest distance to every destination node in the network and hop node on the path to every destination node. 4.1.3 Global State Routing (GAR): In Global state routing the entire network is not flooded as is the case with Dynamic Destination-Sequence Distance-vector routing. Here three tables are maintained for each node: a neighbor list, a topology table, a next hop table and a distance table. 4.2 Reactive Routing Protocols (Source-Initiated on- Demand): In this approach a source node initiates a rote discovery function where a route is created only when the source node requires a route to specific destinations. Being a less resource intensive as compared to Proactive routing there is no need of periodic transmission of updates as information responds are achieved when demand arises. Some Classification based on Reactive Routing Protocol: 4.2.1 Ad Hoc on-Demand Distance Vector Routing (AODV) DSDV is improved an enhanced by AODV. It is a Reactive routing protocol, meaning that it establishes a route to a destination only on demand. AODV is, as the name indicates, a distance-vector routing protocol. AODV avoids the counting- to-infinity problem of other distance-vector protocols by using sequence numbers on route updates, a technique pioneered by DSDV. AODV is capable of both unicast and multicast routing. In AODV based on the demand for route information the Broadcast is minimized. Its simplicity is that when broadcasting RREQ packet between a source and destination an immediate node receives and forwards it to the destination. 4.2.2 Dynamic Source Routing Dynamic Source Routing' (DSR) is a routing protocol which forms a route on-demand when a transmitting computer requests one. However, it uses source routing instead of relying on the routing table at each intermediate device. This protocol is truly based on source routing whereby all the routing information is maintained at mobile nodes. It has only two major phases which are Route Discovery and Route Maintenance. Route Reply would only be generated if the message has reached the intended destination node. Dynamic source routing protocol (DSR) is an on-demand protocol designed to restrict the bandwidth consumed by control packets in ad hoc wireless networks by eliminating the periodic table-update messages required in the table-driven approach.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 101 5. ROUTING PROTOCOL SECURITY The determination of the flow of data from node to node can be obtained through the routing protocol. As the flow of data from source to destination passes through many intermediate nodes in a wireless environment it is prone to be intercepted. So security aspects need to be improved for secure communication. A number of security measures are undertaken to limit the risks. Encryption: Making a data secure follows the mechanism of Encryption where a data that a sender wants to sent towards its destination needs to be encrypted such that the data is not easily broken or known to the outside world. On the other side i.e. at the destination the data is easily broken down by the decryption mechanism. Depending upon the Energy required, Memory and Computation Power the techniques like RSA and Diffie- Hellman are use for Encryption-Decryption mechanism. Authentication: In a wireless environment a node makes itself authenticated to other available nodes by creating neighborhood tables where the various identification numbers are include in the table. The sending node enters its own identification number and sends towards the destination. Once the identification number is verified using the neighborhood table by the receiver the data is forwarded to the destination. Authentication-Encryption: Combining the features of both Authentication and Encryption a more secure way of communication among the nodes can be achieved and prevent nodes from being intercepted. Using the similar authentication technique mentioned above, the transmitting node includes its identification number and that same number encrypted in the data header. When the receiving node receives the data, it verifies the sender’s node identification and decrypts the encrypted identification number. If both identification numbers match, the data is forwarded. These are the most basic techniques in securing the data in Ad- hoc network. 6. SECURE ROUTING PROTOCOLS: With respect to the performance and security a secure routing protocol offers additional features in regards to security in Ad- hoc Mobile network and also their protection from different types of Attacks. Various Secure routing Protocols that provide performance and security are as follows: 6.1 Authenticated Routing for Ad Hoc Networks (ARAN) The detection and protection against the malicious attackers by third parties and peers in Ad-hoc environment guarded by ARAN by performing Authentication, non-repudiation and Message Integrity. A Digital Signature is being used as it is an on-demand routing protocol. When communicating between node A wants and node Z, it broadcasts a route discovery packet (RDP). The IP field specifies the IP address of Z. The message includes A’s certificate, a nonce that increases every time A sends an RDP along with a time stamp. The message is signed with A’s private key. When intermediate node B receives the message, it verifies the authenticity by extracting A’s public key from the certificate within the message. After checking to make sure the certificate has not expired, node B sets up a (reverse) route towards the originator A of the RDP. If this is the first time that node B has seen this message, it attaches its own certificate, signs the message with its private key and rebroadcasts the RDP. Once node Z finally receives the message, it signs the message with its private key, IP address and certificate and sends a route reply (RREP) message. Nodes unicast the RREP message to the originator A through the discovered path. As the REP traverses the path, the intermediate nodes remove the certificate and signature of the previous node. Finally, node A receives the RREP and verifies the authenticity of the response. 6.2 Secure Ad Hoc On-Demand Distance Vector (SAODV) Source authentication, import authorization, integrity and data authentication services are provided by SAODV in which it assumes that there is a key management system (KMS) that assigns keys to the nodes, verifying the association of the public keys and the node identities. Hash chains are used to secure the hop count and digital signatures authenticate the message fields. Applying a one-way hash function to a random seed value a hash chain provides integrity for hop count. 6.3 Secure Efficient Ad Hoc Distance Vector (SEAD) Taking into account the various limited resources (network bandwidth, processing capabilities, and memory and battery power) of the nodes SEAD provides secure distance vector routing. It uses a one-way Hash function and follows the way as DSDV performs. [1] 7. CONCLUSIONS In today’s world the wireless technology is growing in a repaid fashion because of their easy implementation and use. A technology with advantage also comes with certain disadvantages. As the medium of transmission in wireless technology is not secure so, in this paper, we have analyzed the security for an ad hoc network faces and presented the operation of routing protocol based on security prospective. Various attacks for the ad-hoc networks is been declared.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 102 REFERENCES [1]. Barbeau, M. and Kranakis, E. Principles of Ad Hoc Networking. John Wiley and Sons Publication . 2007. [2]. Zhang, H., Olariu, S., Cao, J. Mobile Ad-hoc Sensor Networks: Third International Conference. Springer, 2007. MSN 2007. Beijing, China. December 12-14, 2007. [3]. Das, V. and Vijaykumar, R. Information and Communication Technologies. International Conference, ICT 2010. Kochi, Kerala, India. September 2010. [4]. Science Academy Transactions on Computer and Communication Networks, Vol. 1, No. 1, March 2011 [5]. Securing Ad Hoc Networks, Lidong Zhou Department of Computer Science, Cornell University Ithaca, NY 14853 [6]. Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member, IEEE, “An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs” IEEE Transaction on Mobile Computing, VOL. 6, NO. 5, May 2007