The document discusses using Bayesian inference and Dempster-Shafer theory to establish trust relationships and achieve security in mobile ad hoc networks (MANETs). It proposes combining direct observation using Bayesian inference with indirect observation using Dempster-Shafer theory to calculate trust values for nodes. The approach is tested in simulations using the AODV routing protocol, showing improved packet delivery ratio, throughput, and end-to-end delay compared to existing systems.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
This paper modifies the DYMO protocol and develops the AIS-DYMO protocol that is
capable to handle the network layer attack. It means the performance of the network doesn’t get
degraded under the attack. Various immune algorithms can be used to enhance the performance of
the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the
performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network
layer attacks by using the clonal selection immune algorithm.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
A mobile ad-hoc network (MANET) is very receptive to security attacks due to its open medium, dynamically changing network topology, lack of centralized monitoring. These vulnerabilities are nature of MANET structure that cannot be removed. As a consequence, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. One of the well known attack on the MANET is the Black Hole attack which is most common in the ondemand routing protocols such as AODV. A black hole attack refers to an attack by a malicious node, which forcibly gains the route from a source to a destination by the falsification of sequence number and hop count of the routing message. This paper represents an enhanced AOMDV routing protocol for avoiding black hole attack in MANET. This routing protocol uses Ad hoc On-demand Multipath Distance Vector (AOMDV) to form link disjoint multi-path during path discovery to provide better path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. Nonmalicious nodes steadily isolate the black hole nodes based on the values collected in their legitimacy table and avoid them while making path between source and destination. The effectiveness of our approach is illustrated by simulations conducted using network simulator ns-2.34.
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
An Efficient Mechanism of Handling MANET Routing Attacks using Risk Aware Mit...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
This paper modifies the DYMO protocol and develops the AIS-DYMO protocol that is
capable to handle the network layer attack. It means the performance of the network doesn’t get
degraded under the attack. Various immune algorithms can be used to enhance the performance of
the DYMO protocol, but the clonal selection algorithm is used in this work to enhance the
performance of the DYMO protocol. Overall the DYMO protocol is modified to handle the network
layer attacks by using the clonal selection immune algorithm.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring infrastructure less network of
mobile devices conducted by wireless. Each device in a MANET is free to move independently in any
direction and its change the link to other devices frequently. MANET includes both challenges and
opportunities in achieving security goals such as confidentiality, integrity and non repudiation. Key
management is a central component in MANAET security, the purpose of key management is to provide
secure procedures for handling cryptography key materials. Distributed key management is proposed
and deduces the condition under which the key sets distributed to the network nodes to provide MANET
security. Various key management schemes are discussed for secure wireless sensor network
communication. Peer Intermediaries for Key Establishment (PIKE), a class of key establishment
protocols that involves using one or more sensor nodes as a trusted intermediary to facilitate key
establishment. Pike protocols scale sub linearity with the number of nodes in the network and achieving
higher security against node compromise than other protocols. Authenticated Routing for Ad-hoc
Networks (ARAN) is proposed to detect and protect against malicious actions by third parties. ARAN
has minimal Performance costs for the increased security in terms of processing and networking
overhead. Self-organized Key Management is to propose cryptography procedures to make secure
transactions.
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
Centralized System in MANET with GRP Protocolijceronline
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes.. In this paper routing protocols GRP for mobile ad hoc network with centralized system is checked to know the performance of the network. We will see that, is their any change in the performance of the network if will deploy centralized system in MANET.
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
1. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1170 www.ijariie.com 252
Trust Based Bayesian Inference and
Dempster-Shafer Theory to Achieve Security
in MANET
Bhumika Shah1
, Juhi Kaneria2
1
Student, Information Technology, Parul Institute of Engineering & Technology, Gujrate,India
2
Assistant. Professor, Computer Science and Engineering, Parul Institute of Engineering & Technology,
Gujrate,India
ABSTRACT
MANET consist of many small devices communicating spontaneously over the air (wireless).The topology of the
network is changing frequently because of the mobile nature of its nodes. Ad hoc finally induces that there are no
such things as fixed routers, therefore every node has to act as a router for its neighbors. Trust-based schemes are
considered as effective mechanisms associated with cryptographic techniques for thwarting a variety of attacks.
Because of the properties of MANET, trust establishment needs an intelligent approach to identify attackers’
misbehavior. A routing protocol for MANET should give incentives for acting correctly and it should be able to
detect misbehaving nodes and punish them. In MANET no priori trust relationships and no central trustworthy
authorities exist. The goal is to establish trust relationships by using a reputation-based trust management scheme.
This can be done by getting reputation for a node and combining this with personal observations about its behavior.
Bayesian interface is used for direct observation and Dempster-Shafer theory is used to calculate trust value based
on indirect observation.
Keyword: - Trust ,Reputation, Dempster-Shafer theory, Bayesian interface.
1. INTRODUCTION
MANETs are a kind of temporal and self-organized networks, that are unit appropriate for military science
environments and disaster recovery situations. as a result of its characteristics, e.g., no needs of infrastructure,
MANETs are attracting plenty of attention. during this sort of networks, nodes will type a distributed network and
communicate with one another via wireless medium. Every node has join forces with different nodes so as to deliver
traffic from supply nodes to destination nodes. Security being the prime concern to supply protected communication
between mobile nodes in a very hostile surroundings. As compared to wireline networks, the distinctive property of
mobile impromptu networks cause variety of nontrivial challenges to security way, like open peer-to-peer spec,
shared wireless medium, strict resource constraints, and extremely dynamic constellation. These problems clearly
build a situation for building multifence security solutions that deliver the goods each broad protection and
fascinating network performance.
Fig 1- Example of a simple network with four participating nodes [5]
2. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1170 www.ijariie.com 253
1.1 Problem Statement
• Our motive is to design a secure routing protocol without introducing huge overhead or destroying the self-
organization nature of MANET.
• Trust calculation of the nodes dosnt consume much time.
• No need to sign and verify digital signature at every routing message.
1.2 Motivation
The main motivation of this project has emerged with the deliberate amount of work still in detecting the malicious
and selfish node in MANET. Selfishness that causes lack of node activity cannot be solved by classical security
means that aim at verifying the correctness and integrity of an operation.
Misbehaviour of nodes network operations (routing, packet forwarding) could vary from easy stinginess or lack of
collaboration as a result of the necessity for power saving to active attacks.
Selfish nodes use the network, saving battery power for own communications: no injury to other nodes. Malicious
and selfish nodes aim at damaging different nodes by inflicting network outage by partitioning whereas saving
battery life isn't a priority.
Decision making mechanism for different applications are:
• Intrusion detection
• Key management
• Access management
• Authentication
2. Routing Protocols in MANET
This section discuss regarding differing types of protocols employed in mobile spontaneous network. Additionally
comparison between completely different routing protocols with relation to specific parameters.
Ad-hoc Routing Protocols
Flat Routing Hierarchical Routing geographic position
assisted routing
Proactive Reactive
DSDV OLSR AODV DSR ZRP LAR DREAM GPRS
Fig 2: Classification of Routing Protocols MANETs[1]
2.2.1 Ad-hoc On Demand Distance Vector (AODV)
AODV could be a reactive protocol, i.e., that the routes area unit created and maintained only they're required. The
routing table stores the knowledge regarding future hop to the destination and a sequence range that is received from
the destination and indicating the freshness of the received packets . Additionally the knowledge regarding the active
neighbors is received throughout the routing of the destination host.
Route Request(RREQs)
3. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1170 www.ijariie.com 254
Fig3: Route Request(RREQs) Packets[1]
Route Replies(RREPs)
Fig 4: Route Replies(RREPs) Packets[1]
Route Errors(RERRs)
Fig 5: Route Errors (RERRs) Packets[1]
Advantages
1) It is a routing protocol in which doesn't need any central body system to manage the routing method.
4. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1170 www.ijariie.com 255
2) The overhead of the messages is less.
3) The AODV protocol could be a loop free and avoids the reckoning to infinity drawback, that were typical to the
classical distance vector routing protocols, by the usage of the sequence numbers.
2.2.2 Optimized Link State Routing Protocol
Optimized link state routing [10] can be a proactive protocol there in, each node intermittently broadcasts its routing
table, allowing each node to make associate comprehensive browse of the network topology. The episodic nature of
this protocol creates AN large amount of overhead so on cut back overhead, it limits the number of mobile nodes
that will forward network wide traffic and for this purpose it use multi purpose relays (MPRs), that unit in
command of forwarding routing messages and optimization for flooding operation. Mobile nodes, that unit elect as
MPRs can forward management traffic and decrease the dimensions of management messages. MPRs unit chosen
by a node, such that, it's planning to reach each a pair of hop neighbor via a minimum of 1 MPR, then it'll forward
packets. quality causes, route modification and topology changes very ofttimes and topology management (TC)
messages unit broadcasted throughout the network. All mobile nodes maintain the routing table that contains routes
to any or all or any approachable destination nodes.
Advantages
1) The reactiveness to the topological changes is adjusted by ever-changing the interval for broadcasting the how-
do-you-do messages.
2) Due to the OLSR routing protocol simplicity in exploitation interfaces, it's simple to integrate the routing protocol
within the existing in operation systems, while not ever-changing the format of the header of the informatics
messages.
3) OLSR protocol is compatible for the appliance that doesn't enable the long delays within the transmission of the
info packets.
2.2.3 Dynamic supply Routing protocol (DSR)
The dynamic supply routing protocol (DSR) is associate on demand routing protocol. DSR is easy and economical
routing protocol designed specifically to be used in multi-hop wireless spontanepous networks of mobile nodes. The
DSR protocol consists of 2 main mechanisms that employment togetherto enable the invention and maintenance of
supply route within the spontanepous network.
3. Uncertain Reasoning
Most tasks requiring intelligent behavior have a point of uncertainty related to them. the sort of uncertainty that may
occur in knowledge-based systems is also caused by issues with the information. For example: knowledge may well
be missing or inaccessible,Data may well be gift however unreliable or ambiguous owing to measuring errors.The
illustration of the information is also imprecise or inconsistent.
1) knowledge could be user’s best guess.
2) knowledge is also supported defaults and therefore the defaults might have exceptions.
The uncertainty can also be caused by the diagrammatical information since it'd
1.Represent best guesses of the specialists that square measure supported plausible or applied math associations they
need determined.
2.Not be acceptable altogether things (e.g., might have indeterminate applicability)
Given these varied sources of errors, most knowledge-based systems need the incorporation of some style of
uncertainty management.
Three ways of handling uncertainty:
• Probabilistic reasoning.
• Certainty factors
• Dempster-Shafer Theory
2.3.1 Probabilistic reasoning
Bayes’ Theorem
Conditional probability is defined as
5. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1170 www.ijariie.com 256
P(H E)
P(H | E) = ------------------, for P(E) 0.
P(E)
i.e., the conditional probability of H given E.
In real-life practice, the probability P(H | E) cannot always be found in the literature or obtained from statistical
analysis. The conditional probabilities
P(E | H)
however often are easier to come by;
Thus
P(E | H) P(H)
P(H | E) = ---------------------
P(E)
Hypothetical reasoning and backward induction
1) Bayes’ Theorem is commonly used for decision tree analysis of business and the social sciences.
2) The method of Bayesian decision making is also used in expert system PROSPECTOR.
2.3.2Bayesian inference
Is a method of statistical inference in which Bayes' rule is used to update the probability estimate for a hypothesis as
additional evidence is acquired. Bayesian updating is an important technique throughout statistics, and especially in
mathematical statistics. For some cases, exhibiting a Bayesian derivation for a statistical method automatically
ensures that the method works as well as any competing method. Bayesian updating is especially important in the
dynamic analysis of a sequence of data. Bayesian inference has found application in a range of fields including
science, engineering, philosophy, medicine and law.
In the philosophy of decision theory, Bayesian inference is closely related to discussions of subjective probability,
often called "Bayesian probability". Bayesian probability provides a rational method for updating beliefs
Bayesian inference derives the posterior probability as a consequence of two antecedents, a prior probability and a
"likelihood function" derived from a probability model for the data to be observed. Bayesian inference computes the
posterior probability according to Bayes' rule:
P(E | H) P(H)
P(H | E) = ---------------------
P(E)
Where
• denotes a conditional probability; more specifically, it means given.
• H stands for any hypothesis whose probability may be affected by data (called evidence below). Often there are
competing hypotheses, from which one chooses the most probable.
• the evidence E corresponds to new data that were not used in computing the prior probability.
• P(H) the prior probability, is the probability of H before E is observed. This indicates one's previous estimate of
the probability that a hypothesis is true, before gaining the current evidence.
• P(H | E) the posterior probability, is the probability of given , i.e., after is observed. This tells us what we want
to know: the probability of a hypothesis given the observed evidence.
• P(E | H) is the probability of observing E given H. As a function of with fixed, this is the likelihood. The
likelihood function should not be confused with , P(H | E) as a function of H rather than of E. It indicates the
compatibility of the evidence with the given hypothesis.
• P(E) is sometimes termed the marginal likelihood or "model evidence". This factor is the same for all possible
hypotheses being considered. (This can be seen by the fact that the hypothesis H does not appear anywhere in the
symbol, unlike for all the other factors.)
Advantages and disadvantages of Bayesian methods
• The Bayesian methods have a number of advantages that indicates their suitability in uncertainty management.
Most significant is their sound theoretical foundation in probability theory. Thus, they are currently the most mature
of all of the uncertainty reasoning methods.
• While Bayesian methods are more developed than the other uncertainty methods, they are not without faults.
1.They require a significant amount of probability data to construct a knowledge base. Furthermore, human experts
are normally uncertain and uncomfortable about the probabilities they are providing.
6. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1170 www.ijariie.com 257
2.If they are statistically based, the sample sizes must be sufficient so the probabilities obtained are accurate. If
human experts have provided the values, are the values consistent and comprehensive?
3.Often the type of relationship between the hypothesis and evidence is important in determining how the
uncertainty will be managed. Reducing these associations to simple numbers removes relevant information that
might be needed for successful reasoning about the uncertainties. For example, Bayesian-based medical diagnostic
systems have failed to gain acceptance because physicians distrust systems that cannot provide explanations
describing how a conclusion was reached (a feature difficult to provide in a Bayesian-based system).
4.The reduction of the associations to numbers also eliminated using this knowledge within other tasks. For
example, the associations that would enable the system to explain its reasoning to a user are lost, as is the ability to
browse through the hierarchy of evidences to hypotheses.
2.3.3 Dempster-Shafer Theory
Here we discuss another method for handling uncertainty. It is called Dempster-Shafer theory. It is evolved during
the 1960s and 1970s through the efforts of Arthur Dempster and one of his students, Glenn Shafer.
1) This theory was designed as a mathematical theory of evidence.
2) The development of the theory has been motivated by the observation that probability theory is not able to
distinguish between uncertainty and ignorance owing to incomplete information.
Difficulty with the Dempster-Shafer theory
1) One problem is with standardization and contrary to our expectation.
2) Ignores the assumption about things that doesn't exist.
4.SIMULATION
The implementation result of a Bayesian Interface and Dempster Shafer theory to achieve Trust Based Routing in
Mobile Ad-hoc Networks is exhibited. For implementation and result analysis, AODV Protocol is used in Network
Simulator.
4.1 Simulation results
Experiments are performed to measure the Packet delivery Ratio, Throughput and End-to-End Delay with
calculating the Trust Value of the node depending on the direct observation between the two nodes and reputation
from the intermediate nodes.
Fig 6: Creating source and Destination nodes
Figure 6 shows the scenario of 50 nodes in network under MANET in which Packets are transmitted using
AODV Routing Protocol. Scenario shows the source node 15,19 and destination node 24,28 by using AODV
protocol.
7. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1170 www.ijariie.com 258
Fig 7 RREQ packet Message Broadcasting
Figure 7 shows the broadcasting of the RREQ packets from source to destination.in the above scenario Node 15 is
broadcasting the RREQ packet to all the intermediate nodes in order to reach the destination node 24.
Fig 8 Attacker Node
4.2 Result analysis:
This section shows the result analysis of the different Experimental Parameters. Parameters such as Packet
Delivery Ratio. Throughput, End-to-End Delay are considered. Here the PDR is calculated on the basis of no of
packets send to the total no of packets for both systems to compare their values. Throughput defines as the total
number of packets delivered over the total simulation time. The average end to end delay of knowledge packet is
that the interval between the info packet generation time and therefore the time once the last bit arrives at the
destination.
Fig 9Result of Packet Delivery Ratio
8. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1170 www.ijariie.com 259
Figure 9 shows the result analysis of the existing and proposed system of the packet ratio delivery.
Fig 10 Result of End-to-End Delay
Figure 10 shows the result analysis of the existing and proposed system of the Average End-to-End Delay
Fig 5.11 Result of Throughput
Figure 11 shows the result analysis of the existing and proposed system of the Average End-to-End Delay.
5. CONCLUSIONS
The proposed algorithm focus on the evaluating the accurate trust value of each node. In the proposed algorithm
Trust is evaluated based on direct and indirect observation of the node. The direct observation is evaluated based on
Bayesian interface and indirect observation based on Dempster Shafer theory. Combination of these two values in
the trust model, is use to obtain more precise trust value of the nodes in MANETs. Also parameters used in the
existing system such as Throughput, Average End-to-End Delay will be improved and the other experimental
parameters will be added.
REFERENCES
[1]. Y. Wang, F. Yu, H. Tang, and M. Huang, “A mean field game theoretic approach for security
enhancements in mobile ad hoc networks,” IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1616–
1627, 2014.
[2] Z. Wei, H. Tang, F. R. Yu, and M. Wang, “Security enhancement for mobile ad hoc networks routing
with OLSRv2,” in Proc. SPIE Defence, Security, and Sensing
2013, (Baltimore, MD, USA), Apr. 2013.
9. Vol-1 Issue-2 2015 IJARIIE-ISSN(O)-2395-4396
1170 www.ijariie.com 260
[3] Q. Guan, F. Yu, S. Jiang, and V. Leung, “Joint topology control and security in mobile ad hoc
networks with cooperative communications,” IEEE Trans. Veh. Tech., vol. 61, no. 6, pp. 2674–2685,
2012.
[4] J. Loo, J. Lloret, and J. H. Ortiz, Mobile Ad Hoc Networks:Current Status and
Future Trends. CRC Press, 2011.
[5] B. Elizabeth, R. Aaishwarya, P. Kiruthika, M. Shrada, A. Prakash, and V.Uthariaraj, “Bayesian
based confidence model for trust inference in manets,” in
Proc. IEEE ICRTIT’11, (Chennai, Tamil Nadu, India), Jun. 2011.
[6] J. H. Cho, A. Swami, and I. R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE
Commun. Surveys & Tutorials, vol. 13, no. 4, pp. 562–583,
2011.
[7] Han Yu, Zhiqi Shen, Chunyan Miao, Cyril Leung, and Dusit Niyato,”A Survey of Trust and Reputation
Management System in Wireless Communications,” proc. of the IEEE, 2010.
[8] Pedro B. Velloso, Rafael P Laufer, Daniel de O. Cunha, Otto Carlos M.B. Duarte, and Guy Pujolle.”
Trust Management In Mobile Ad hoc Networks Using a Scalable Maturity Based Model, IEEE
transactions on networks and Service Management Vol. & No. 3 Sept. 2010. pp172 - 185.
[9] A. Darwiche, Modeling and reasoning with Bayesian Networks. Cambridge
University Press, 2009.
[10] M. Momani, S. Challa, and R. Alhmouz, “BNWSN: Bayesian network trust model for wireless
sensor networks,” in Proc. MIC-CCA 2008, (Amman), Aug.
2008.