The document reviews different secured routing protocols for mobile ad hoc networks and their vulnerabilities. It discusses three main categories of secured routing protocols:
1. Trust oriented protocols which use node trust values to determine routing, but are still vulnerable to malicious nodes gaining control.
2. Incentive oriented protocols which aim to discourage attacks through incentives like credits, but require online access or tamper-proof hardware.
3. Detection and isolation protocols which identify misbehaving nodes but have issues like high overhead, inability to detect certain attacks, and vulnerability to false accusations.
In conclusion, while existing protocols address some attacks, they remain vulnerable or impractical in many cases. A robust, lightweight approach is still needed to
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
A swarm intelligence-based unicast routing protocol for hybrid ad hoc networksMarc Manthey
We present a hybrid routing protocol for both pure and hybrid ad hoc networks which uses the mechanisms of swarm
intelligence to select next hops. Our protocol, Ad hoc Networking with Swarm Intelligence (ANSI), is a congestion-aware
routing protocol, which, owing to the self-organizing mechanisms of swarm intelligence, is able to collect more information
about the local network and make more effective routing decisions than traditional MANET protocols.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper we focus on the MAC layer modifications to meet the real time requirements of different priority data.Bandwidth partitioning among different priority transmissions is implemented through MAC layer modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower
priority packets and higher transfer rate for real
time packets with higher priority, minimizing the end to
end delay. The performance of the algorithm is evaluated with varying node distribution
.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying
on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and
communication is implicit to be wireless. Ad-hoc networks are collaborative in the sense that each node is
assumed to relay packets for other nodes that will in return relay their packets. Thus all nodes in an ad-hoc
network form part of the network’s routing infrastructure. The mobility of nodes in an ad-hoc network
denotes that both the public and the topology of the network are extremely active. It is very difficult to
design a once-for-all target detection system. Instead, an incremental enrichment strategy may be more
feasible. A safe and sound protocol should at least include mechanisms against known assault types. In
addition, it should provide a system to easily add new security features in the future. Due to the
significance of MANET routing protocols, we focus on the recognition of attacks targeted at MANET
routing protocols.
Intrusion detection techniques for cooperation of node in MANET have been chosen as the security
parameter. This includes Watchdog and Path rater approach. It also nearby Reputation Based Schemes in
which Reputation concerning every node is measured and will be move to every node in network.
Reputation is defined as Someone’s donation to network operation. CONFIDANT [23], CORE [25],
OCEAN [24] schemes are analyzed and will be here also compared based on various parameters.
A swarm intelligence-based unicast routing protocol for hybrid ad hoc networksMarc Manthey
We present a hybrid routing protocol for both pure and hybrid ad hoc networks which uses the mechanisms of swarm
intelligence to select next hops. Our protocol, Ad hoc Networking with Swarm Intelligence (ANSI), is a congestion-aware
routing protocol, which, owing to the self-organizing mechanisms of swarm intelligence, is able to collect more information
about the local network and make more effective routing decisions than traditional MANET protocols.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
Most of the sensor network applications need real time communication and the need for deadline aware real time communication is becoming eminent in these applications. These applications have different dead line requirements also. The real time applications of wireless sensor networks are bandwidth sensitive and need higher share of bandwidth for higher priority data to meet the dead line requirements. In this paper we focus on the MAC layer modifications to meet the real time requirements of different priority data.Bandwidth partitioning among different priority transmissions is implemented through MAC layer modifications. The MAC layer implements a queuing model that supports lower transfer rate for lower
priority packets and higher transfer rate for real
time packets with higher priority, minimizing the end to
end delay. The performance of the algorithm is evaluated with varying node distribution
.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Design and development of anonymous location based routing for mobile ad-hoc...IJECEIAES
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it’s open
nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of
decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide
their security and also has become an indivisible part for communication for mobile device. In this phase of
dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from
Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing
algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route
Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks.
This type of attacker comes in the network and they start creating multiple identities. From that multiple
identities they are disrupting the network by participating in communication with line breaking nodes. This
cause’s huge loss in network resources. These networks can be protected using network failure and firewall
detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure
TORA through the implementation. Performance factor of network would be taken into consideration in order
to verify the efficiency of modified TORA in MANET environment.
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring infrastructure less network of
mobile devices conducted by wireless. Each device in a MANET is free to move independently in any
direction and its change the link to other devices frequently. MANET includes both challenges and
opportunities in achieving security goals such as confidentiality, integrity and non repudiation. Key
management is a central component in MANAET security, the purpose of key management is to provide
secure procedures for handling cryptography key materials. Distributed key management is proposed
and deduces the condition under which the key sets distributed to the network nodes to provide MANET
security. Various key management schemes are discussed for secure wireless sensor network
communication. Peer Intermediaries for Key Establishment (PIKE), a class of key establishment
protocols that involves using one or more sensor nodes as a trusted intermediary to facilitate key
establishment. Pike protocols scale sub linearity with the number of nodes in the network and achieving
higher security against node compromise than other protocols. Authenticated Routing for Ad-hoc
Networks (ARAN) is proposed to detect and protect against malicious actions by third parties. ARAN
has minimal Performance costs for the increased security in terms of processing and networking
overhead. Self-organized Key Management is to propose cryptography procedures to make secure
transactions.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
2. Now, we are hereby to review the different types of routing
protocols with their advantages &disadvantages.
suggest a way so that source node will stop the node to carry
forward the details inspite of having low trust value, making it
a part of routing path from source todestination.
A. TRUST ORIENTED SECURED ROUTING
PROTOCOLS
Saha et al have proposed another scheme “FBOD” (Fidelity
Index Based On-Demand Secure Routing) for routing in
mobile Ad Hoc network [10] which totally varies from other
existing routing protocols. Here packets routed on the basis of
specific criteria of nodes known as “fidelity”. Through this
scheme the complex computation in transmission of data gets
lowered a lot. This scheme shows the network activity for
routing purpose of packets gets decreased for each of the
nodes. This scheme also stops the attacks of malicious nodes in
MANET.
Yi et al have proposed security aware Ad Hoc routing also
termed as SAR [5]. In his proposition, SAR has classified the
nodes on basis of their trust values. On the basis of this
classification, the similar nodes with same trust level share a
secret group key. In determining route, the source node agrees
to have minimum number of security requirements, which a
node generally requires in order to complete its routing path
from source to destination. Source node can also agree to make
path by encryption of route request packets with certain
specified keys for specific levels. In it keys become the main
defect for the scheme, which can create problems when
malicious nodes will control the keys inspite of having high
security while controlling the secret groupkeys.
Boukerche et al have proposed a protocol “SADAR:
Secure Distributed Anonymous Routing Protocol” [11]. The
main function of the above stated protocol is to permit nodes to
take part in the routing system without granting their individual
participation in routing system. The author suggests that this
protocol will able to stop malicious activities of dropping down
of packets by operating within system interface through
promiscuous mode and will detect discrepancies regarding the
unnatural packet transmission through nodes. This protocol
operates same as that of Marti et al [12] “Watchdog”
operation.
Nekkauti and Lee have given birth to a certain trust based
adaptive routing protocol [6]. This protocol uses the
mechanism of conversion of the codes into order while
covering the route path between the source and destination
through all other nodes. This scheme supports greater degree of
individualism of nodes to operate in routing path but the
greatest disadvantage is it can’t protect network system from
malicious activities where there is the selective dropping and
modification of packets which are agreed to be forwarded,
under malicious nodes.
Pirzada and McDonald also have given a model which
shows trust based communication in Ad Hoc network [13].
This model depends upon the facts suchas:
a)
b)
Passive and Active recognition of packets.
Recommendation from other nodes regarding possible short
route replies.
Information regarding routing errors.
This scheme is also threatened by the malicious nodes
Lee and Singhal have stated the secured routing protocol
[7] which operates using pre-observed behavioral pattern along
with reference to other nodes nearby the operating one and thus
gives the quantitative value of trust to operating nodes in
MANET. This protocol gives the basis of anonymity but is not
at all protected from the malicious nodes which can grasp well
behaving nodes in order to drop trust messages, thus makes the
protocol ineffective.
c)
present here who can discharge the packets selectively and will
accuse nodes which are working with nodiscrepancies.
Davis et al have proposed secured on demand routing
scheme in MANET known as Robust source Routing (RSR)
[14] in which protocols has the capacity to mitigate against the
high profile malicious nodes, in addition to providing data,
authenticity and integrity checking of network. RSR prevents
the selfish activities where it stops the selective dropping of
packets which are agreed to be put forward by nodes. Also with
study, it is known that RSR possess capacity to maintain high
delivery even when almost all nodes in MANET become
malicious in nature.
Mangrulkar and Atique have proposed the scheme [8] in
which the routing will add an extra field to store the trust value
levels of node. This shows how much a node can be trusted by
neighboring. Considering all trust values of nodes, information
of the router will be transmitted through nodes which have
highest level of trust value. The utility of this scheme lies in the
fact that it saves the power of unwanted transmission of
information through the nodes having low trust value, also
saves the band width which is very important in MANET
system. Here the trusted path will be used irrespective of range
of distances, which can be safely used in communication
purpose of network. The trust value can be calculated
depending upon complete reply path that can be need by source
node for further communication.
B. INCENTIVE ORIENTED SECURED ROUTING
PROTOCOLS
Zhong, Chen and Yang have presented a new scheme
“SPRITE”, which is simple working, credit based and cheat
proof system in MANET [15]. In MANET nodes, this protocol
provides the initiative to co-operate and to collect actions
Yan, Zhang and Virtanen have developed a model which
gives trust values to nodes depending upon observation of
node’s behavior [9]. Application of this trust evolution is
similar to that of SAR [5] where other than it, Yan fails to
2
3. honestly. The utility of this protocol is that it doesn’t go for all
tamper resistant modules rather supports to have on-line access
to the central system called Credit Clearance Service (CCS).
This CCS considers the charge of sending message through
nodes. But the basis of this scheme depends on the assumption
that there is the availability of on-line access to a CCS, which
doesn’t go for real Ad Hoc networks and can’t able to confirm
on-line entity access directly.
the attacks by stealing and altering information, a type of
which is known as “Wormhole Attack”. In this attack, the
existing nodes are not disturbed and malicious agents interfere
in route development process. Wormhole attacks damage the
routing path in AODV, DSR and OLSR. This attack can
damage the entire MANET system by its two modes of attack,
hidden mode and participation mode, where attackers damage
network system totally. This attack can be prevented by using
extra hardware, which though increases cost protects network.
Also, to reduce cost, there can be the use of algorithm, showing
good performance using lowoverhead.
Buttyan and Hubaux have suggested the scheme where the
protocol incentive towards stimulating co-operation in the
MANET [16]. In this scheme, the network nodes must have
hardware module which is resistant towards tampering. This
scheme never allows the selfish activities of nodes operating in
this structure. But this scheme fails to achieve the wide spread
usage due to requirement of the hardware which is tamper
resistant.
Choi et al [20] have presented a protocol, “WAP:
Wormhole Attack Prevention” which detects fake routes. It
also prevents wormhole nodes to appear in route discovery
phase which can be achieved utilizing the method of neighbor
node monitoring of each node. The mechanism of this protocol
came from the basis lead by DSR protocol. The main
advantage is that WAP can prevent the wormhole invasion in
networking system with no utilization of any extra hardware.
But the protocol gets restricted from its work when there
occurs the attack of other foreign malicious nodes and they
have their high overheads. Also this secure routing protocol
does not address energy constraints of node for routing.
C. DETECTION AND ISOLATION ORIENTED SECURED
ROUTING PROTOCOLS
Marti et al [12] have proposed a scheme in which they
stated that those MANET nodes will be mitigated which fails
to forward the packets through nodes. In order to identify
misbehaving nodes, scheme uses “Watchdog” and to avoid
them, protocol uses “Pathrater”. Watchdog is an essential
operation in MANET which guides node is work in
promiscuous mode. It is based on assumption that when packet
is moving from one node to other, then there should have
transmission between them. While transmission is going on,
neighboring node should hear transmission which is carried out
by operating nodes, and if it fails to do so, then if will likely, be
called as malicious node having low rating. This scheme thus
shows several weaknesses. So, author stated that the main
weakness of “Watchdog” operation is that it fails to recognize
the misbehaving nodes within the network when they are under
the presence of ambiguous collision, collusion, collision of
receiver, limited power of transmitter and partialdropping.
Awerbuch et al have presented routing security protocol [21]
which has its main focus to withstand the byzantine failure of
MANET nodes, working individually in system. In this
scheme, the nodes used to maintain a weight list of them
considering the track of their performances within network, on
the basis of which it becomes easier in route discovery phase to
avoid path containing faulty nodes. After detecting the faults in
the established path, adaptive probing techniques is used to
capture the faulty links, hence gets low rating and are avoided
in the system. Through these probing technique, we can able to
identity the faulty zones in the network which results due to
non-malicious agents. But main barrier of this protocol is that
they are ineffective in presence of malicious agents only
because nodes can able to recognize the probing packets from
others. Thus an opponent node will behave good and well
when it is probed state and otherwise it will show malicious
activities in the node intervals. This scheme doesn’t address
energy constraints.
Buchegger and Le Boudec have presented a new type of
protocol called “CONFIDANT” [17] (Co-Operation of Nodes:
Fairness in Dynamic Ad Hoc Network). This protocol is used
for the detection and isolation of misbehaving nodes, where
“CONFIDANT” carries out work by reputation system [18]
where the trust and routing values are calculated by experience,
observation and behavior of other nodes, present in network.
Here the nodes by judgment blacklisted those which are found
to be misbehaving and hence gets isolated within the system.
The main drawback is that the reputation system associated
with this protocol fails to give any protection against false
accusation and thus protocol is influenced towards
blackmailing. The merit of this scheme is that it can detect
selfish nodes, wormhole nodes and isolate them from system
which causes dropping ofpackets.
Patwardhan and Iorga [22] have proposed the secured
routing protocol model called SecAODV, which is modified
form of AODV, where all the nodes are provided with a certain
IPv6 address value within the MANET. In this scheme, the
secured communication channel is established in between
source and destination node depending upon the idea of
Statistically Unique and Cryptographically Verifiable (SUCV)
who confirms secured and secret binding between IPv6 address
and key node. [23] In this scheme, there is no requirement of
trust certificate (CA). Still this protocol is restricted in working
zone since here it is necessary for all the MANET nodes to
contain a certain IPv6 address. It fails to stop or prevent the
selective dropping of packets, as the probing packets can be
easily recognized from others. Along with this, scheme does
not have address for energyconstrains.
Nagrath and Gupta have presented a scheme [19] where
they stated that nodes operating in MANET are sometimes
threatened by the attackers to get into system and will carryout
3
4. Saha et al [24] have proposed semi centralized multi
authenticated RSSI based solution to Sybil attack. It provides a
hybrid solution where the entire network is subdivided into
small subgroups under the supervision of each node, acting as
the central authority. Here each of the subgroups has RSSI
detector nodes. The advantage is that even when false reading
is sent, the problem will be restricted in the group only and this
false detail will not affect the entire network. The demerit is
that if any of detectors in the group can be compromised then
there will be trouble, also the scheme does not address any
energy constraints and can’t tackle other attacks other than
Sybil.
Secondly, Incentive Oriented Secured Routing Scheme tries
to decrease the attacks on the network through hardware and
incentives but can’t able to eliminate them totally, also there is
no improvement in QoS.
Finally, Detection and Isolation Oriented Secured Routing
Scheme effectively mitigate the attacks of malicious nodes, but
done at the cost of QoS of the system. Also they are attack
specific to malicious nodes and are not able to detect the other
attacks.
From these studies, it has been observed that there is the
necessity of much more secured routing protocols for MANET
which will be energy efficient, and have the capacity to
mitigate all malicious attacks considering all other QoS
parameters that are required for thenetwork.
Just et al [25] and Kargl et al [26] also have come up with
a scheme where there is mechanism of identifying the selfish
and malicious nodes in Ad Hoc network system. This protocol
goes through probing mechanism as stated by Awerbuch et al
[21] where they can be recognized from others. The problem
regarding this protocol is that the end to end delay is high, and
does not address energyconstraints.
IV. ACKNOWLEDGEMENT
Sincere thanks to Prof. Himadri Nath Saha for providing
inputs and useful comments and suggestions in order to
improve the quality of this paper. Also thanks to anonymous
reviewers who gave many valuable details and inputs to enrich
this paper.
Saha et al [27] have proposed Priority Based Protocol
which has capacity to detect malicious nodes with no
notification to central authority. Here the nodes will maintain
priority list of neighbors and when the value will go below the
threshold level, the node will be disconnected from the system.
Nodes here can also upgrade themselves and act as per node, as
they are independent of trust certificate (CA). Also if any of the
nodes are found showing their malicious activities within the
network, then their importance level will be decreased. The
merit is that this protocol can able to detect different attacks
like Black hole attack, Gray hole attack, but fails to combat
Jellyfish. This scheme can be used in distributed manner which
provides less network dependence ofnodes.
REFERENCES
[1] P Narayan, and V.R. Syrotiuk, “Evaluation of the AODV and DSR
Routing Protocols Using the MERIT Tool,” in Proc. of Second
International Conference, ADHOC-NOW, Springer, Montreal, Canada,
October 2003, pp. 25-36.
[2] Hong Mei Deng, Wei Li, and Dharma P. Agarwal, “Routing Security in
Wireless Ad Hoc Networks,” IEEE Communications Magazine, Vol. 40
,Issue: 10, pp. 70 -75, October 2002.
[3] Y.Xiao, X. Shen, and D.Z. Du (Eds), “A Survey on Attacks and
Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile
Network Security, Springer, Chapter 12, pp. 1-38,2006.
III. CONCLUSION
From the above discussions, it is clear that existing secure
routing protocols are not sufficient to eliminate the malicious
nodes which causes the dropping or modification of packets in
the network and as a result, there causes severe
communication problems in MANET. Most of the protocols
are more specifically focused on mitigating certain attacks,
while others show a drop in performance, pertaining to packet
delivery fraction, normalized routing load and end to end
delay. Besides we have seen that some of the protocols fail to
judge the energy consumption of the nodes present in
trustworthy route, which is also an important issue in MANET.
Analysis shows that making a protocol more secured; we have
to make other QoS parameters compromised, implying a
requirement of trade off. In the above work, we have classified
the secured routing protocols in different parts with specific
cause and reasons.
[4] G. Theodorakopoulos and J.S. Baras, “Trust Evaluation in Ad Hoc
Networks,” in Proc. of ACM Workshop on Wireless security (WISE’04),
October 2004, pp.1-10.
[5] S. Yi, P. Naldurg and R. Kravets, “Integrating Quality of Protection into
Ad Hoc Routing Protocols,” in Proc. of the 6th
World Multi Conference
on Systematic, Cybernetics and Informatics (SCI 2002), August 2002,
pp. 286-292.
[6] R.K Nekkanti and C.W Lee, “Trust Based Adaptive on Demand Ad Hoc
Routing Protocol,” in Proc. of the Annual Southeast Regional
Conference, April 2004, pp. 88-93.
42nd
[7] H. Li and M. Singhal, “A Secure Routing Protocol for Wireless Ad Hoc
Networks,” in Proc. of the 39th
Hawaii Informational conference on
Systems Science (HICSS-39), January 2006, pp. 225-234.
[8] R.S. Mangrulkar, and Dr. Mohammad Atique “Trust Based Secured Ad
Hoc on Demand Distance Vector Routing Protocol for Mobile Ad Hoc
Network,” in Proc. of Sixth International Conference on Wireless
Communication and Sensor Networks (WCSN), December 2010, pp.1-4.
Firstly, Trust Oriented Secured Routing Scheme is reliable
and trustworthy but is obtained at the loss of quantity of service
of the systems.
[9] Z. Yan, P. Zhang and T. Virtanen, “Trust Evaluation Based Security
Solution in Ad Hoc Networks,” in Proc. of the 7 Nordic Workshop on
Secure IT Systems (NORDSEC 2003), October2003.
th
4
5. [10] Himadri Nath Saha, Debika Bhattacharyya and P. K. Banerjee, “Fidelity
Index Based On Demand (FIBOD) Secure Routing In Mobile Ad hoc
Network,” in Proc. of International Conference on Parallel Distributed
Computing Technologies and Applications (PDCTA), Springer, vol.203,
part-II, September 2011, pp.615-627.
[19] Preeti Nagrath and Bhawna Gupta, “Wormhole Attacks in Wireless Ad
Hoc Networks and their Counter Measurements: A Survey,” in Proc. of
3rd International Conference on Electronics Computer Technology
(ICECT), IEEE, April 2011, pp. 245-250.
[20] S. Choi, D. Y. Kim, D. Y. Lee, and J. I. Jung “WAP: Attack Prevention
Algorithm Mobile Ad Hoc Network,” in Proc. of IEEE International
Conference on Sensor Network, Ubiquitous and Trustworthy
Computing, June 2008, pp. 343-348.
[11] A. Boukerche, K. El-Khatib, L. Xu and L. Korba “An Efficient Secure
Distributed Anonymous Routing Protocol for Mobile and Wireless Ad
Hoc Networks,” Computer Communications, Elsevier, Vol. 28, Issue 10,
pp.1193-1203, July 2004.
[21] B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens, “An On-
Demand Secure Routing Protocol Resilient to Byzantine Failures,” in
Proc. of the ACM workshop on wireless security (WiSE’02), September,
2002, pp. 21-30.
[12] S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigation Routing
Misbehavior in Mobile Ad Hoc Networks,” in Proc. of 6th annual
international conference on Mobile Computing and Networking, August
2000, pp. 255-265.
[22] A. Patwardhan, J. Parker, A. Joshi, M. Iorga and T. Karygiannis,
“Secure Routing and Intrusion Detection in Ad Hoc Networks,” in Proc.
of the 3rd
IEEE – International conference on Pervasive Computing and
Communications, March, 2005, pp. 191-199.
[13] A.A. Pirzada, C. McDonald, “Establishing Trust in Pure Ad Hoc
Networks,” in Proc. of the 27th
Conference on Australasian Computer
Science (CRPIT’04), January 2004, pp. 47-57.
[14] Clude, R. Davis, Maheswaran, “A Secure MANET Routing Protocol
with Resilience Against Byzantine Behaviors of Malicious or Selfish
Nodes,” in Proc. of International Conference on Advanced
Information Networking and Application Workshop, May 2007, pp. 19-
26.
[23] T.S Messerges, J. Cukier, T. A. M. Kevenaar, L.Puhl, R. Struik and E.
Callaway, “A Security Design for a Personal Purpose Self-Organizing
Multihop Ad Hoc wireless network,” in Proc. of the 1st
ACM Workshop
on Security of Ad Hoc and Sensor Networks, pp. 1-11, October 2003.
21st
[24] Himadri Nath Saha, Debika Bhattacharyya, P. K. Banerjee, “Semi-
Centralized Multi-Authenticated RSSI Based Solution to Sybil Attack,”
International Journal of Computer Science & Emerging Technologies
(E-ISSN: 2044-6004), Vol. I, Issue 4, pp. 338-341, December 2010.
[15] S. Zhong, J. Chen, Y. Yang, “Sprite: A Simple, Cheat-Proof, Credit-
Based System for Mobile Ad Hoc Networks,” in Proc. of IEEE
INFOCOM, Volume 3, March 2003, pp.1987-1997.
[16] L. Buttyan and J.P. Hubaux, “Stimulating Co-Operation in Self-
Organizing Mobile Ad Hoc Networks,” ACM Kluwer Mobile Networks
and Applications, Vol. 8 Issue 5, pp.579-592, October2003.
[25] M. Just, E. Kranakis and T. Wan, “Resisting Malicious Packer Dropping
in Wireless Ad Hoc Networks,” in Proc. of ADHOCNOW’03, October
2003, pp. 151-163.
[17] S. Buchegger and J. Le Boudec, “Performance Analysis of the [26] F. Kargl, A. Klenk, S. Schlott and M. Weber, “Advanced Detection of
Selfish or Malicious Nodes in Ad Hoc Networks,” in Proc. of the 1st
European Workshop on Security in Ad Hoc and Sensor Networks (ESAS
2004), August 2004, pp. 152-165.
3rd
CONFIDENT Protocol,” in Proc. of the ACM International
Symposium on Mobile Ad Hoc Networking and Computing
(MobiHoc’02), June, 2002, pp. 226-236.
[18] P. Resnick, K. Kuwabara, R. Zeckhauser and E. Friedman, “Reputation [27] Himadri Nath Saha, Debika Bhattacharyya, P. K. Banerjee, “A Priority
Based Protocol for Mitigating Different Attacks in Mobile Ad hocSystems,” Communications,
December 2000.
ACM. Vol. 43, Issue 12 pp. 45-48,
Networks,” International Journal of Computer Science
Communication, Vol. 1, Issue: 2, pp. 299-302, December2010.
&
5