The document proposes a secure multipath routing and data transmission approach for mobile ad hoc networks (MANETs). It signs route request (RREQ) packets with digital signatures to authenticate paths during route discovery. It then encrypts message parts using session keys and hashes before fragmenting and transmitting them across multiple paths. The destination node decrypts and recovers the original message. Simulation results show improved packet delivery ratio, reduced delay and packet drops, and increased resilience compared to other approaches.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio in trade off with message overhead and delay
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Secure routing proposals in manets a reviewijfcstjournal
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
With the growing number of smartphone end users, peer-to-peer ad hoc content giving is likely to occur often. Thus, new articles sharing mechanisms must be developed since traditional information delivery schemes will not be efficient with regard to content sharing due to the sporadic connectivity between smartphones on the market. To obtain data delivery such challenging environments, researchers include proposed the employment of store-carry-forward methodologies, in which a node stores a communication and holds it until a forwarding prospect arises through an encounter together with other nodes. Most past works in this field have dedicated to the conjecture of whether two nodes could encounter the other, without thinking about the place and also time from the encounter. In this particular paper, we propose to her discover-predict-deliver as a possible efficient articles sharing scheme for delay-tolerant touch screen phone networks. In this proposed scheme, contents are usually shared while using the mobility information of people. Specifically, our strategy employs the mobility understanding algorithm to spot places inside your own home and outdoor.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Design and development of anonymous location based routing for mobile ad-hoc...IJECEIAES
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one
point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is
very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network
nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one
alters the network's operation in its unique way. In general, attacks can be separated into two categories:
those that target the data traffic on a network and those that target the control traffic. This article explains
the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are
currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from
attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology
safeguards control and data flow against threats. This is achieved by generating a Hash Function for every
transaction. We will begin by discussing the security of the MANET. This article's second section explores
the role of blockchain in MANET security. In the third section, the SRA is described in connection with
blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using
Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances
MANET security while concurrently decreasing delay. The performance of the proposed technique is
analysed and compared to the routing protocols Q-AODV and DSR.
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio in trade off with message overhead and delay
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Novel Approach To Detect Trustworthy Nodes Using Audit Based Scheme For WSNIJERDJOURNAL
ABSTRACT: In multi-hop ad hoc networks there exists a problem of identifying and isolating misbehaving nodes which refuses to forward packets. Audit-based Misbehavior Detection (AMD) is a comprehensive system that effectively and efficiently isolates both continuous and selective packet droppers. The AMD system integrates reputation management, trustworthy route discovery, and identification of misbehaving nodes based on behavioral audits. Compared to previous methods, AMD evaluates node behavior on a per-packet basis, without employing energy-expensive overhearing techniques or intensive acknowledgment schemes. Moreover, AMD can detect selective dropping attacks even if end-to-end traffic is encrypted and can be applied to multichannel networks or networks consisting of nodes with directional antennas. This work implements the AMD approach by considering the rushing attack. The analysis of the results confirms that AMD based method with rushing attack performs better as compared to the non rushing attack.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Secure routing proposals in manets a reviewijfcstjournal
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent
requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for
testing dynamics and applications. Wireless medium as medium for communication and lack of
centralized control renders MANETs a favorable victim of hackers and intruders. Other features like
change in the topology due to node’s movements, battery depletion at nodes and coverage hampering due
to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent
times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and
current perspective in secure routing schemes in recent times.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
With the growing number of smartphone end users, peer-to-peer ad hoc content giving is likely to occur often. Thus, new articles sharing mechanisms must be developed since traditional information delivery schemes will not be efficient with regard to content sharing due to the sporadic connectivity between smartphones on the market. To obtain data delivery such challenging environments, researchers include proposed the employment of store-carry-forward methodologies, in which a node stores a communication and holds it until a forwarding prospect arises through an encounter together with other nodes. Most past works in this field have dedicated to the conjecture of whether two nodes could encounter the other, without thinking about the place and also time from the encounter. In this particular paper, we propose to her discover-predict-deliver as a possible efficient articles sharing scheme for delay-tolerant touch screen phone networks. In this proposed scheme, contents are usually shared while using the mobility information of people. Specifically, our strategy employs the mobility understanding algorithm to spot places inside your own home and outdoor.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
Design and development of anonymous location based routing for mobile ad-hoc...IJECEIAES
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one
point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is
very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network
nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one
alters the network's operation in its unique way. In general, attacks can be separated into two categories:
those that target the data traffic on a network and those that target the control traffic. This article explains
the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are
currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from
attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology
safeguards control and data flow against threats. This is achieved by generating a Hash Function for every
transaction. We will begin by discussing the security of the MANET. This article's second section explores
the role of blockchain in MANET security. In the third section, the SRA is described in connection with
blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using
Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances
MANET security while concurrently decreasing delay. The performance of the proposed technique is
analysed and compared to the routing protocols Q-AODV and DSR.
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...IJCNCJournal
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
A Mobile ad hoc network (MANET) is self-organizing,
decentralized and infrastructure-less wireless network. The
successful transmission of the data packet depends on the
complete cooperation of each node in the network. These types of
network don’t have permanent base station, so each node in the
network acts as a router. Due to openness, decentralized, selforganizing
nature of MANET, it is vulnerable to various attacks.
So security is the main concern in MANET.
In this project, we have considered 2 attacks; Vampire
attack and DDoS attacks. Vampire attack drains the energy of
the nodes. DDoS attack exhausts the resources available to a
network, such that the node cannot provide any services. Here,
we discuss methods 2 methods as a solution to our problem; one
is to prevent the attack from happening and other to detect and
recover from the attacks.
MANETs (Mobile Ad hoc Network) is a self-governing system in which different mobile nodes are connected by wireless links. MANETs comprise of mobile nodes that are independent for moving in and out over the network. Nodes are the devices or systems that is laptops, mobile phone etc. those are participating in the network. These nodes can operate as router/host or both simultaneously. These nodes can form uninformed topologies as per their connectivity among nodes over the network. Security in MANETs is the prime anxiety for the fundamental working of network. MANETs frequently will be ill with security threats because of it having features like altering its topology dynamically, open medium, lack of central management & monitoring, cooperative algorithms and no apparent security mechanism. These factors draw an attention for the MANETs against the security intimidation. In this paper we have studied about security attack in MANET and its consequences, proposed technique for black hole detection is hybrid in nature which combines the benefit of proactive and reactive protocol and proposed technique is compared with AODV.
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
Mobile Ad hoc Network (MANET) is consists of mobile hosts or sensor nodes proficient of functioning in
absence of infrastructure. Such networks should be capable of self forming, self organizing, self managing, self
recovering, and able to operate under dynamic conditions. The multi-hop communication phenomenon is used
to sending information to receiver. To attain this, each mobile node depends on its neighbor or range node to
forward the data packet to the destination. In fact, most of previous studies on MANET have implicitly assumed
that nodes are cooperative such as node cooperation becomes a very important issue in MANET. The attacker in
dynamic network are easily affected the routing performance and data receiving ratio is affected as compared to
normal performance of network as well as dropping of data is enhanced. The packets percentage is degrades is
the confirmation of attacker misbehavior. The characteristics of wormhole attack is to making the tunnel and
reply the positive acknowledgement of destination at time of route request and drop all the data deliver through
tunnel. The attacker is identified by the past and current data receiving and forwarding in MANET. The
proposed IPS (Intrusion Detection and Prevention System) provides the security on the basis of link reliability.
In this work, we proposed new link reliability based security through Predecessor based Route Establishment of
detecting routing misbehavior of wormhole attack for prevention in MANET. The attacker is blocked through
the broadcasting scheme used by proposed prevention scheme from their actual identification to neighbors. The
security provider nodes are blocking the communication of attacker and provide the secure communication
among the mobile nodes. The performance of proposed scheme is evaluated through performance metrics like
PDR and throughput.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents
sharing of information which can be local or remote. Though local communications may occur face to face
between individuals remote communications take place among people over long distances. Mobile ad hoc
networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless
devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET
is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as
router. In order to send data, the source node initiates a routing process by using a routing protocol. The
nature of the wireless medium is always insecure. So, during routing many attacks can take place. The
main objective of an eavesdropper is to grab the confidential information in the network. This secret
information is used by a malicious node to perform further attacks. Here, the entire problem lies in
identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper,
we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol
in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found
that the network performance degrades in presence of an eavesdropper.
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
In this dynamic world, communication is a sine qua non for development. Communication represents sharing of information which can be local or remote. Though local communications may occur face to face between individuals remote communications take place among people over long distances. Mobile ad hoc networks (MANETs) are becoming an interesting part of research due to the increasing growth of wireless devices (laptops, tablets, mobiles etc.) and as well as wireless internet facilities like 4G/Wi-Fi. A MANET is any infrastructure-less network formed by independent and self-configuring nodes. Each node acts as router. In order to send data, the source node initiates a routing process by using a routing protocol. The nature of the wireless medium is always insecure. So, during routing many attacks can take place. The main objective of an eavesdropper is to grab the confidential information in the network. This secret information is used by a malicious node to perform further attacks. Here, the entire problem lies in identifying the eavesdropper because the eavesdropper acts a normal node in the network. In this paper, we analyzed the impact of eavesdropper while executing an Ad hoc On Demand routing (AODV) protocol in MANETs. All the simulations are done using QualNet 5.1 network simulator. From the results, it is found that the network performance degrades in presence of an eavesdropper.
2. 2 B. Rajkumar and G. Narsimha
obtained CCNA-exploration qualifications. Currently, he is a Lecturer at the
College of Computing and Informatics, Haramaya University, Ethiopia. His
specialisations include computer network, networking, mobile computing, and
compiler design, design and analysis of algorithm, MANET and discrete
mathematics. His current research interests are MANERT, public key
infrastructure, network security, and authentication server.
Gugulothu Narsimha received his BE in Electronics and Communication
Engineering form the University College of Engineering, Osmania University
Hyderabad, passed in 1996, MTech in Computer Science and Engineering from
the University College of Engineering, Osmania University Hyderabad, passed
in 1999, and PhD in Computer Science and Engineering from the University
College of Engineering, Osmania University Hyderabad. He has about ten
years and six months of teaching experience. Currently, he is an Assistant
Professor in the Computer Science and Engineering Department at JNTUH
College of Engineering, Nachupally. His research interests are in resource and
mobility management for wireless mesh networks, wireless sensor networks
and heterogeneous wireless networks.
1 Introduction
1.1 Background
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes,
which can dynamically exchange data among themselves without the reliance on a
fixed-base station or a wired backbone network. MANET nodes are typically
distinguished by their limited power, processing, and memory resources as well as high
degree of mobility (Jaisankar and Saravanan, 2010). In MANET, several routing
protocols can be used, such as ad-hoc on-demand distance vector (AODV) and dynamic
source routing (DSR) (Vaidya and Lim, 2009).
However, the unreliability of the wireless medium and the dynamic topology due to
nodes mobility or failure result in frequent communication failures and high delay during
path re-establishments (Vaidya and Lim, 2009).
1.1.1 Multipath routing in MANET
In multipath routing, nodes have multiple paths to communicate within the transmission
range, thereby facilitating efficient connectivity between transmitters that may not be
within each other’s wireless range (Singh et al., 2014).
Multiple disjointed paths can exist between nodes; therefore, multipath routing can be
used to statistically enhance the confidentiality of exchanged messages between source
and destination nodes. Sending a confidential data on one path helps the attackers to get
the whole data, whereas sending it in parts on different disjointed paths increases the
confidentiality robustness because it is almost impossible to obtain all the parts of a
message divided and sent on multiple paths existing between the source and the
destination (Geetha and Sujatha, 2010).
A multipath routing protocol is a promising technique to overcome problems of
frequent topological changes and link instability as the use of multiple paths could
diminish effect of possible node and link failures. Thus, multipath ad hoc routing
3. Secure multipath routing and data transmission in MANET 3
protocols are deemed superior over single-path routing protocols as the former provides
robustness, increased reliability, less end-to-end delay, load-balancing, and security
(Singh et al., 2014).
MANETs are prone to numerous types of routing faults including,;
• transmission errors
• node failures
• link failures
• route breakages
• congested nodes or links.
However, the major disadvantage is that more collision occurs among correlated routes
due to multipath routing and degrades network performance i.e., packet delivery ratio
(Singh et al., 2014). In MANET environment, the nodes may also be selfish and
malicious. The selfish behaviour may drop the packets, whereas the malicious behaviour
may launch the passive or active attacks and decrease the reliability of the data transfer
(Koul et al., 2009; Johnson et al., 2007; Mavropodi et al., 2007).
1.1.2 Secure multipath routing in MANET
The presence of malicious nodes may cause serious message security concerns. Few of
these concerns are: message confidentiality, message availability, and node's
authentication. Owing to these issues associated with cooperative routing, providing a
complete message security in MANETs is still a challenge (Liu et al., 2011; Ehrampoosh
and Mahani, 2011; Vaidya and Lim, 2009; Khaleel and Ahmed, 2012; Khalil and Bagchi,
2011).
The security systems offer authentication, confidentiality, integrity, and non-
reputation. Here, the detection of passive attack is very difficult because the operation of
the network itself is not affected. One of the solutions to the problem is to use powerful
encryption mechanism to encrypt the data being transmitted. Similarly, an active attack
attempts to alter and destroy the data being exchanged in the network, thereby disrupting
the normal functioning of the network. Active attacks can either be internal or be
external. External attacks are carried out by nodes that do not belong to the network,
whereas internal attacks are caused by the compromised nodes that are part of the
network. Active attacks carried out when the nodes involving actions such as
impersonation, modification, fabrication, and replication. Both passive and active attacks
can be made on any layer of the network protocol stack (Geetha and Sujatha, 2010;
Tague et al., 2011; Bansal, 2013; Zakhary and Radenkovic, 2010; Zhao et al., 2010).
The active attack parameters are:
• resource consumption attack
• rushing attack
• black hole attack
• gray hole attack
• wormhole attack (Geetha and Sujatha, 2010).
4. 4 B. Rajkumar and G. Narsimha
Some of the different multipath routing algorithms for enhancing data securities are
multipath TCP security (MTS), secure multipath routing (SecMR) (Geetha and Sujatha,
2010), and secure, disjoint, multipath source routing (SDMSR) in which the source node
selects the available routes one by one systematically. MTS has a well number of sharing
nodes and the highest interruption ratio among all the other algorithms (Singh et al.,
2014).
The various techniques are used to secure the routing such as;
1 credit-based systems – assign rewards in the form of credits to nodes that are
successfully participated in the data forwarding process
2 reputation-based systems – use the node’s reputations as parameters of a reward
policy mechanism to compensate well-behaved nodes and to punish badly behaved
nodes
3 tif-for-tat (TFT) systems – use a TFT strategy to reward good behaved nodes
4 cryptography-based systems – use encryption and/or hard cryptography techniques to
secure the data routing
5 multipath-based secured routing techniques – where the data before transmission is
broken into a number of packets, then encrypted before being routed separately in
the network following different available paths (using a conventional routing
scheme) (Woungang et al., 2012).
1.2 Problem identification and solution
In our first paper (Rajkumar and Narsimha, 2015), we have proposed a trust-based
light-weight authentication routing protocol in MANET in which a multipath route
discovery technique is used to select the path with maximum packet success ratio as an
optimal path for data transmission. For each node in the chosen path, global trust value is
estimated based on direct and indirect trust values of the node. If the trust value of any
node is below the threshold value, then it will be authenticated using the secret sharing
technique. This authentication technique can enhance the reliability, redundancy, and
network lifetime.
However, in Rajkumar and Narsimha (2015), route discovery is not performed
securely as the routing packets may be attacked. Hence, as an extension to the previous
works, we propose a SecMR and transmission technique for MANET. The main
objective of this work is to provide security not only for the multipath routing protocol
but also for data transmission using these multiple routes.
The rest of this paper is organised as follows: Section 2 presents existing work related
to the proposed framework. Section 3 describes a framework for SecMR and data
transmission over MANET. Section 4 depicts a performance evaluation of the proposed
framework. Section 5 provides the conclusions of the paper.
2 Literature review
Vaidya and Lim (2009) have proposed a secure and reliable framework for multimedia
streaming over multipath MANET that provides security for both the ad hoc routing and
5. Secure multipath routing and data transmission in MANET 5
for real-time data transfer. This framework is designed based on source routing such as
DSR and has three basic operations, namely, route discovery, data forwarding and route
maintenance. In addition, the communication between source and destination uses
bidirectional communication on each link. However, when the number of malicious
nodes increased, the overload of packet transmission will be high.
Liu et al. (2011) have proposed a method for providing message security in MANET
when nodes cooperate in routing. This approach combines a trust-based multipath routing
scheme and a real-time recurrent neural network–based cipher to deal with the issues
underlying message confidentiality, integrity, and access control. The security approach
uses TR-RRNN scheme for implementation and to find the secured routes. However, if
there is no secured route, then the algorithm will wait for another route. During this time
interval, messages will be failed to deliver.
Athreya and Tague (2011) have proposed a routing mechanism that uses cross-layer
strategies that involve incorporating feedback and information from layers below the
network layer to make decisions at the network layer. RSSI measurements are used in the
physical layer to define node neighbourhood; ETX measurement from the link layer and
node forwarding behaviour from network layer are used to study path reliability via a
utility function. In addition, a path evaluation mechanism is performed for the paths
returned by the multipath routing mechanism. However, the black holing cannot be
avoided during the network bootstrapping phase.
Huang et al. (2011) have proposed a message security approach in MANETs that uses
a trust-based multipath AOMDV routing combined with soft encryption, so-called
T-AOMDV scheme. Moreover, the fuzzy multilevel security was provided a way to
compute a quantified estimate of risk associated with a subject. Trust mechanism
promotes the idea of identifying malicious nodes through packets monitoring and node's
action. However, if the trust value is not appropriate, the chosen path will not be secure
for transferring entire data and the process will be restarted.
Woungang et al. (2012) have proposed an enhanced trust-based multipath DSR
protocol to securely transmit messages in MANETs. This method consists of
soft-encryption, trust management strategy, and multipath DSR routing. Here, history of
interactions module stored the records on the interactions between nodes in a suitable
data structure. Trust computation takes place before each interaction occurring between
nodes.
Chen and Wu (2009) have proposed a SecMR scheme based on modified secret
sharing as an effective mechanism to protect data confidentiality and simultaneously
enhance data delivery rate in MANET. The scheme is based on multipath route finding
algorithm, modified secret sharing scheme, cryptography, and optimisation technology to
detect active attacks and control the passive attacks. The message compromising
probability and message delivery rate is used to evaluate the performance and security in
different routing.
3 Proposed work
3.1 Overview
In this paper, we have proposed the SecMR and data transmission in MANET, in which
trust-based light-weight authentication routing protocol enables the selection of routes
6. 6 B. Rajkumar and G. Narsimha
using RREQ and RREP. After that, confidentiality and integrity is provided to the
messages using light-weight techniques. Digital signatures are included along with
RREQ messages so that the destination could verify the signatures to increase the
security. Then, trust define strategy is defined that depicts the characteristics of node
based on different trust levels. Based on the path length and trust value of node, secure
route discovery is performed. After discovering route, data transmission is initiated.
During transmission, soft encryption and XOR operations is used to encrypt the
messages. The destination node on receiving the message decrypts and recovers the
original message.
Figure 1 Block diagram of the proposed protocol (see online version for colours)
Data transmission
phase
Route request phase
Data packet
Soft
encryption
XOR function
Destination
node
Intermediate
nodes
Source node RREQ/RREP
Digital
signature
3.2 Multipath route discovery
The discovery of multiple disjoint paths depends on ad hoc on-demand multipath distance
vector (AOMDV) routing (Ehrampoosh and Mahani, 2011). Initially, packet success rate
was estimated based on the random variables and variance at time describing the in
progress success rate of data packet. These variables were modelled as the beta random
variable.
The route discovery process is performed as follows:
1 Before transmitting data packet to destination D, the source node S verifies its route
cache for path availability.
2 If there is a path, then S will consider the available path for data transmission.
3 Else, S broadcasts route request (RREQ) packet towards D through the intermediate
nodes (Ni).
4 On receiving RREQ, Ni updates the route cache about the source, sequence number,
destination, previous hop node, and packet success rate in a routing table.
7. Secure multipath routing and data transmission in MANET 7
5 Ni then either re-broadcasts the RREQ to its neighbours or sends the route reply
(RREP), if the node is D. This process is repeated till RREQ reaches D.
6 Once D receives RREQ, for every received RREQ, the RREP packet is unicasted in
the reverse path towards the source.
7 Every Ni on receiving RREP updates its cache for the next-hop of the RREP and then
unicasts this RREP in the reverse path using the earlier stored previous-hop node
information. This step is repeated till RREP reaches S.
8 S then computes end-to-end packet success rate of the path based on the collected
information from RREP.
9 S chooses an optimal path with high packet success rate as a primary path. This
optimal path is used for data transmission between S and D. The path with the next
higher level of packet success rate in chosen as backup path (alternate path).
3.3 Signing of RREQ packets
After route discovery, we add the intermediate node’s routing table with a list of recent
most RREQ received for any source destination pair and intermediate nodes for the
request in addition to the source and purpose ID, sequence number, previous hop ID, and
packet success rate (Vaidya and Lim, 2009).
Table 1 Format of routing table
Source ID Sequence
number
Destination
ID
Previous hop
node ID
Packet
success rate
Recent most
RREQ
received
3.3.1 Route request phase
When an arrived packet consists of a list of intermediate nodes that is a superset of items
in the routing table, the packet is discarded. Otherwise, the node adds its own entry into
the packet and rebroadcasts it.
In Figure 2, an intermediate node a receives RREQ directly from source S. When
intermediate node a receives the same RREQ from node b, a discards it. On receiving
RREQ, node a appends its address in the route list and self-certificate it and rebroadcasts
it.
Similarly, node d receives RREQ from nodes a and b and discard those from e. Once
node d receives RREQ from node a, it verifies its self-certificate SCera. If it is valid, node
d removes the signature of node a, signs RREQ message with its Kd, and replaces SCera
with its SCerd. Then, it appends its address in the route list and then rebroadcasts it.
8. 8 B. Rajkumar and G. Narsimha
Figure 2 Route discovery (see online version for colours)
he
c
f i
gd
b
a
D
S
RREQ traversal
Source and destination nodes
Denied RREQ route
Intermediate nodes
Table 2 Notations used in multipath route discovery and data transfer
Notations used Description
Sq Unique ID assigned by S to RREQ
SignKX − (M) Message M digitally signed by node X
sCertX Self-certificate generated by node X
NS Nonce by S
SKS, SKD Session keys generated by S and D
N Sequence number
EKX + (M) Encryption of message M with KX+
DKX − (M) Decryption of message M with KX−
SKS, SKD Session keys generated by S and D
prhI Previous hop node ID
PSR Packet success rate
Route request process
( )
: ( , , , , , ), ,
, ,
S
KD S KS S
S SignK REQ S D Sq prhI PSR routelist
E N S sCert
⇒ ∗ < −
+ >
(
( ) )
: ( , , , , , ), ,
, , ,
a S
KD S KS a
a SignK SignK REQ S D Sq prhI PSR routelist
E N S sCertS sCert
⇒ ∗ < − −
+ >
(
( ) )
: ( , , , , , ), ,
, , ,
d S
KD S KS d
d SignK SignK REQ S D Sq prhI PSR routelist
E N S sCertS sCert
⇒ ∗ < − −
+ >
9. Secure multipath routing and data transmission in MANET 9
(
( ) )
: ( , , , , , ), ,
, , ,
g S
KD S KS g
g SignK SignK REQ S D Sq prhI PSR routelist
E N S sCertS sCert
⇒ ∗ < − −
+ >
3.3.2 Route reply phase
On reception of RREQ from its neighbour nodes, the destination D discovers multiple
paths – primary path and node disjoint paths from all the received routes. On the first
RREQ reception, the destination verifies all the signatures and caches the route list. It
decrypts and stores session key from S and generates route reply (RREP) packet. RREP
consists of accumulated route as that of RREQ, a digital signature of the D on the entire
message, and encrypted session key (SKD).
The RREP is then sent back on the reverse route as given by the accumulated route in
the RREQ. Each intermediate node on the reverse route verifies its identifier as well as
the predecessor and successor nodes’ identifiers in the accumulated route. If both tests are
valid, the intermediate node signs the RREP and passes it to the next node in the path.
Consequently, the RREP reaches the source node. This node verifies whether it received
the message from its neighbour and if this neighbour is the first node on the path. The
path is then accepted to be valid if all the signatures are verified. It also decrypts and
stores the session key from destination.
Route reply process:
( )
( )
: , , , , , , , ,
,
D S
S D D
D g SignK REP S D Sq N prhI PSR routelist
EK SK sCert
⇒ < −
+ >
(
( ) )
: ( , , , , , , , ),
, ,
g D S
S D D g
g d SignK SignK REP S D Sq N prhI PSR routelist
EK SK sCert sCert
⇒ < − −
+ >
(
( ) )
: ( , , , , , , , ),
, ,
d D S
S D D d
d a SignK SignK REP S D Sq N prhI PSR routelist
EK SK sCert sCert
⇒ < − −
+ >
(
( ) )
: ( , , , , , , , ),
, ,
a D S
S D D a
a S SignK SignK REP S D Sq N prhI PSR routelist
EK SK sCert sCert
⇒ < − −
+ >
If the destination receives a duplicate RREQ, it will compare route path of RREQ to its
route cache. Only when source and destination nodes are same, a path is a node-disjoint
path; otherwise, it will discard the RREQ.
Routing paths are selected from the set of paths using a trust defined strategy.
3.4 Trust model
The trust model as per our first work (Rajkumar and Narsimha, 2015) estimated the direct
(DTij) and indirect (IDTij) trust values of each node utilising Eigen trust algorithm. Then,
a resolver is employed to estimate the global trust value of the node. The direct reputation
(DTij) of a node is calculated based on previous trust value of its neighbour node and RSI
(recent satisfaction index). Each node periodically computes its connectivity rating
[recent satisfaction index (RSI)] with each of its direct neighbour nodes. Indirect trust
10. 10 B. Rajkumar and G. Narsimha
value (IDTij) is estimated from aggregated form of trust report received and processed by
Ni about Nj.
A resolver is employed to compute the resultant global trust value (GTij) of the node
based on the direct and indirect trust values. It also executes trust noise cancellation
mechanism for eliminating trust noise. Each node Ni monitors the trust values (GTij) of its
neighbour nodes within its transmission range. Then it collects the trust values from the
monitored nodes and exchanges the collected information with its neighbouring nodes.
After the information exchange, if any node finds that the trust value of monitored node
is below threshold, then the node is subjected to authentication.
3.4.1 Trust-defined strategy
Now, we define the trust-defined strategy to secure routing where a node with a trust
level of x is given at most x parts of the packet to forward. This limits the possibility of
using a brute force decryption of the message. For instance, if four trust levels (trust 1–4)
are assigned to nodes excluding no trust and complete distrusts (trust level of 0 and −1),
the message would be divided into four parts (Narula et al., 2008). Therefore
1 If trust level = 4
A node with a trust level of 4 can read the message; therefore, the nodes which are
certified to be completely safe only are given the right to read the full message.
These might include nodes which are directly visible in case of military applications
or nodes whose keys have been exchanged securely.
2 If trust level = 3
A node with a trust level of 3 can surely find out 2n possible messages of which one
would be correct, where n is the number of bits used for encryption.
For example, if a 32-bit message is sent as four eight-bit messages, then a node
with trust level 3 would receives 3 bytes. Considering that remaining byte out of
256 possibilities can be obtained through a brute force search, such node can find the
entire message.
3 If trust level = 2
A node with a trust level of 2 can be sure of finding 28 × 28 possible messages with
similar process.
4 If trust level = 1
Similarly, a node with a trust level of 1 can assure finding 28 × 28 × 28 possible
messages.
5 If trust level = 0
A node with a trust level of zero is not given any part of the message. These nodes
may either act as sinks, and not forwarding any message or nodes that mangle the
messages before forwarding.
11. Secure multipath routing and data transmission in MANET 11
6 If trust level = −1
A node with a trust level of −1 is a certified malicious node. All packets received
from this kind of node are dropped immediately. Measures are taken to limit any
promiscuous access of message parts by this node.
Therefore, with the reduction in trust level, the probability of comprehending the entire
message decreases by a factor of 2n
.
3.5 Secure route selection model
Once a new path is discovered and the trust levels of the nodes involved are available, a
secure route is chosen. The routes are selected using a greedy approach on the basis of
path length, such that a node with a trust level T does not get more than T packets on the
route.
Secure routes are selected from a set of given routes in the following manner:
1 Whenever a new route is found, the routes are rearranged in the increasing order of
hop counts. Hence, the chosen route set consists of the smallest possible routes that
can securely route the message without causing large overheads associated with the
multipath routing.
2 The first route is selected, and the maximum numbers of parts of the message that
can be routed via it are assumed to be routed. Note that no actual routing is done at
this step.
3 The next route is selected, and the maximum numbers of parts of the message that
can be routed via it are assumed to be routed. If all the parts of message can be
routed securely, the actual routing is done by the selected paths.
4 This process is repeated until the secured routes are found.
5 If no secured routes are found, the algorithm is repeated by starting at step 2, by
selecting the second route as the first route.
6 This algorithm is repeated until all the combination of routes has been exhausted.
7 If no secured route is found, the algorithm waits for another route.
8 If all routes have been found or a specific time interval has been surpassed, the
algorithm is assumed to have failed and a failure message is displayed.
In the routing process, the algorithm selects the secure routes using an algorithm
(Woungang et al., 2012).
Arrange the paths P = {P1, P2…. Pn} in increasing order of path length
Initialise count Ci for all nodes = 0
Select the smallest path from P
{
Select next smallest path
if (for all selected nodes i, Ci ≤ Ti )
{ // Here, Ti is the trust value of node i calculated in previous paper
12. 12 B. Rajkumar and G. Narsimha
if ( four paths are selected )
exit the loop;
else continue;
}
if (All paths are exhausted )
wait for another path
} if (no paths left)
Print (‘it is not possible to route the message securely’)
These routes may or may not be disjoint, so more routes can be generated this way.
3.6 Route maintenance
If a route breakage occurs due to node mobility, the neighbour of the node will send a
route error to the source. Consequently, the source will discard that route from the routing
table. If the source has another path to the destination, it can use it. When the source has
no entry for the destination and the session is still active, it would initiate a new route
discovery. This scheme uses digital signature along with a nonce in route error messages
to authenticate the packet and ensure freshness (Vaidya and Lim, 2009).
3.7 Message encryption and routing:
After finding an optimal route, we can transmit data. In data transmission phase, we
divide a 4n-bits message is into four parts of n bits each (Narula et al., 2008). Let m1, m2,
m3, m4 be these parts. We define the bit operation XOR on bit vectors r and s as follows:
If r = {r1, r2, r3, … rn} and s = {s1, s2, s3,…sn} then
{ }1 1 2 2 3 3, , , n ns XOR r r XOR s r XOR s r XOR s r XOR s= …
Then, the aforementioned parts m1, m2, m3 and m4 are then soft encrypted using the
following equations:
1 1 3m m XORm′ = (1)
2 2 4m m XORm′ = (2)
3 3 2m m XORm′ = (3)
4 4 1 2m m XORm XORm′ = (4)
The parts 1 2 3, ,m m m′ ′ ′ and 4m′ are now routed instead of m1, m2, m3 and m4, respectively.
A node waits for intermediate multiple paths to the destination.
At the destination node, the message parts can be decrypted using the following
equations:
1 2 4m m XORm′ ′= (5)
2 1 2 3 4m m XORm XORm XORm′ ′ ′ ′= (6)
3 1 2 4m m XORm XORm′ ′ ′= (7)
13. Secure multipath routing and data transmission in MANET 13
4 1 3 4m m XORm XORm′ ′ ′= (8)
Overall algorithm
1 Route discovery phase with RREQ and RREP is accompanied with digital signature
to increase the security of the system.
2 RREQ/RREP signature is accomplished by self-certificates and session keys.
3 Then, we provide secure route selection model based on the path length and trust
value of node.
4 After the route discovery, we provide data transmission phase.
5 In data transmission phase, we encrypt data using soft encryption and performing
XOR operations.
6 The destination node on receiving the message will decrypt and recover the original
message.
4 Simulation results
4.1 Simulation setup
The performance of the secure multipath routing and data transmission (SMRDT) is
evaluated through NS2 (Network Simulator, http:///www.isi.edu/nsnam/ns.) simulation.
A random network deployed in an area of 1,000 × 1,000 m is considered. The number of
speed is varied as 5, 10, 15, 20 and 25 m/s. Initially, the nodes are placed randomly in the
specified area. The simulated traffic is CBR with UDP source and sink.
Table 3 Simulation parameters
No. of nodes 50
Area size 1,000 × 1,000
Mac 802.11
Simulation time 50 sec
Traffic source CBR
Packet size 512
Attackers 2, 4, 6, 8 and 10
Rate 250Kb.
Propagation model Two ray ground
Antenna type Omni antenna
Speed 5, 10, 15, 20 and 25 m/s
4.2 Performance metrics
The proposed SMRDT protocol is compared with multi-path trust-based secure AOMDV
(T-AOMDV) protocol (Huang et al., 2011). The performance is evaluated mainly,
according to the following metrics.
14. 14 B. Rajkumar and G. Narsimha
• packet delivery ratio: it is the ratio of the number of packets received successfully
and the total number of packets transmitted
• average drop: it is the number of packets dropped during the data transmission
• fraction of compromised communications: it is given by the ratio of number of
packets affected or altered by the attackers to the number of packets transmitted
• detection accuracy: it is given by the ratio of number of attacks detected successfully
to the number of attack attempts.
4.3 Results
4.3.1 Varying the attackers
Initially, the external attackers performing unauthenticated access and packets alteration
are launched and varied from two to ten.
Figure 3 Attackers vs. detection accuracy (see online version for colours)
Detection Accuracy
50
60
70
80
90
100
2 4 6 8 10
Attackers
Accuracy(%)
SMRDT
TAOMDV
Figure 3 shows the detection accuracy of both SMRDT and TAOMDV protocols, when
the attackers are increased. From the figure it can be seen that, accuracy decreases from
96% to 82% for SMRDT and 78% to 71% for TAOMDV, as the attackers are increased.
However, SMRDT outperforms TAOMDV by obtaining 14% higher accuracy, since
TAOMDV does not detect attacks related to integrity.
Figure 4 Attackers vs. delivery ratio (see online version for colours)
Packet Delivery Ratio
0
0.2
0.4
0.6
0.8
1
2 4 6 8 10
Attackers
DeliveryRatio
SMRDT
TAOMDV
15. Secure multipath routing and data transmission in MANET 15
Figure 5 Attackers vs. packet drop (see online version for colours)
Average Packet Drop
0
20000
40000
60000
80000
2 4 6 8 10
Attackers
Drop(pkts)
SMRDT
TAOMDV
Figures 4 and 5 show the packet delivery ratio and packet drop of both SMRDT and
TAOMDV protocols, when the attackers are increased. From the figure it can be seen
that, increase in number of attackers result in increase in packet drop and decrease in
delivery ratio. As SMRT protects packet drops due to attacks as well as due to route
disconnections, it has 61% lower drop and 40% higher delivery ratio, then TAOMDV.
Figure 6 Attackers vs. resilience (see online version for colours)
Fraction of Compromised
Communications
0
20
40
60
80
2 4 6 8 10
Attackers
Fraction(%)
SMRDT
TAOMDV
Figure 6 shows the fraction of compromised communications of both SMRDT and
TAOMDV in percentages, when the attackers are increased. It can be seen that, increase
in number of attackers result in more affected communications. As SMRT provides
strong integrity and trusting, the compromised communications are reduced by 38%
when compared to TAOMDV.
4.3.2 Varying the node speed
Next, the node speed is varied as 5, 10, 15, 20 and 25 m/s keeping the attackers as 2.
Figures 7 and 8 show the packet delivery ratio and packet drop of both SMRDT and
TAOMDV protocols, when the speed is increased. From the figure it can be seen that,
increase in node speed result in increase in packet drop and slight decrease in delivery
ratio, due to route disconnections. As SMRT protects packet drops due to attacks as well
as due to route disconnections, it has 85% lower drop and 70% higher delivery ratio, then
TAOMDV.
16. 16 B. Rajkumar and G. Narsimha
Figure 7 Attackers vs. delivery ratio (see online version for colours)
Packet Delivery Ratio
0
0.2
0.4
0.6
0.8
1
5 10 15 20 25
Speed(m/s)
DeliveryRatio
SMRDT
TAOMDV
Figure 8 Attackers vs. drop (see online version for colours)
Average Packet Drop
0
5000
10000
15000
20000
5 10 15 20 25
Speed(m/s)
Drop(pkts)
SMRDT
TAOMDV
5 Conclusions
In this paper, we proposed a secure multipath routing and data transmission in MANET
in which digital signatures are included along with RREQ messages to increase the
security so that the signatures are verified by the destination nodes. Then, secure route
discovery is performed based on the path length and trust value of node. After route
discovery, data transmission is initiated. During data transmission, soft encryption and
XOR operations are performed. The destination node on receiving the message will
decrypt and recover the original message. Simulation result show that the proposed
approach can improves the packet delivery ratio with reduced delay, packet drop, and
resilience. In future, the proposed approach will be extended by comparing it with several
existing secure routing protocols.
Reference
Athreya, A.P. and Tague, P. (2011) ‘Towards secure multi-path routing for wireless mobile ad-hoc
networks: a cross-layer strategy’, 8th Annual IEEE Communications Society Conference on
Sensor, Mesh and Ad Hoc Communications and Networks, June, pp.146–148, ISSN: 2155-
5486.
Bansal, D. (2013) ‘Design of 50 Hz notch filter circuits for better detection of online ECG’, Int. J.
Biomedical Engineering and Technology, (IJBET), Vol. 13, No. 1, pp.30–48.
17. Secure multipath routing and data transmission in MANET 17
Chen, S. and Wu, M. (2009) ‘Secure multipath routing based on secret sharing in mobile ad hoc
networks’, IEEE International Conference on Network Infrastructure and Digital Content,
November, pp.539–542.
Ehrampoosh, S. and Mahani, A. (2011) ‘Secure routing protocol: affection on MANETs
performance’, International Journal of Communications and Information Technology, IJCIT,
December, Vol. 1, No. 1.
Geetha, S. and Sujatha, S. (2010) ‘Increase the performance and enhancing secure authenticated
multi path encrypted protocol in MANET’, IEEE International Conference on Computational
Intelligence and Computing Research, December, pp.1–7.
Huang, J-W., Woungang, I., Chao, H-C., Obaidat, M-S., Chi, T-Y. and Dhurandher, S.K. (2011)
‘Multi-path trust-based secure AOMDV routing in ad hoc networks’, IEEE Global
Telecommunications Conference, December, pp.1–5.
Jaisankar, N. and Saravanan, R. (2010) ‘An extended AODV protocol for multipath routing in
MANETs’, IACSIT International Journal of Engineering and Technology, August, Vol. 2,
No. 4, pp.394–400, ISSN: 1793-8236.
Johnson, D. et al. (2007) The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc
Networks for IPv4, IETF RFC 4728.
Khaleel, T.A. and Ahmed, M.Y. (2012) ‘The enhancement of routing security in mobile ad-hoc
networks’, International Journal of Computer Applications (0975-888), June, Vol. 48, No. 16,
pp.41–48.
Khalil, I. and Bagchi, S. (2011) ‘Stealthy attacks in wireless ad hoc networks: detection
and countermeasure’, IEEE Transactions on Mobile Computing, August, Vol. 10, No. 8,
pp.1096–1112.
Koul, A., Patel, R.B. and Bhat, V.K. (2009) ‘Double split based secure multipath routing in ad hoc
networks’, International Conference on Advances in Recent Technologies in Communication
and Computing, October, pp.835–839.
Liu, C-Y., Woungang, I., Chao, H-C., Dhurandher, S-K., Chi, T-Y. and Obaidat, M.S. (2011)
‘Message security in multi-path ad hoc networks using a neural network-based cipher’, IEEE
Global Telecommunications Conference, December, pp.1–5, ISSN: 1930-529X.
Mavropodi, R. et al. (2007) ‘SecMR – a secure multipath routing protocol for ad hoc networks’,
Elsevier Ad Hoc Networks, Vol. 5, No. 1, pp.87–99.
Narula, P., Dhurandher, S.K., Misra, S. and Woungang, I. (2008) ‘Security in mobile
ad-hoc networks using soft encryption and trust-based multi-path routing’, Computer
Communications, Vol. 31, No. 4, pp.760–769.
Network Simulator [online] http:///www.isi.edu/nsnam/ns.
Rajkumar, B. and Narsimha, G. (2015) ‘Trust-based light weight authentication routing protocol for
MANET’, Int. J. Mobile Network Design and Innovation, Vol. 6, No. 1, pp.31–39.
Singh, D., Sharma, B.K. and Kumar, A. (2014) ‘A survey on challenges in multipath routing for
adhoc networks’, International Journal of Emerging Technology and Advanced Engineering,
February, Vol. 4, No. 1, pp.376–381, ISSN 2250-2459.
Tague, P., Nabar, S., Ritcey, J.A. and Poovendran, R. (2011) ‘Jamming-aware traffic allocation for
multiple-path routing using portfolio selection’, IEEE/ACM Transactions on Networking,
February, Vol. 19, No. 1, pp.184–194.
Vaidya, B. and Lim, H. (2009) ‘Secure framework for multipath multimedia streaming over
wireless ad hoc network’, IEEE Wireless Communications and Networking Conference, April,
pp.1–6, ISSN: 1525-3511.
Woungang, I., Obaidat, M.S., Dhurandher, S.K., Chao, H-C. and Liu, C. (2012) ‘Trust-enhanced
message security protocol for mobile ad hoc networks’, IEEE International Conference on
Communications, June, pp.988–992, ISSN: 1550-3607.
Zakhary, S.R. and Radenkovic, M. (2010) ‘Reputation-based security protocol for MANETs in
highly mobile disconnection-prone environments’, IEEE/IFIP WONS 2010 – The Seventh
International Conference on Wireless On-demand Network Systems and Services.
18. 18 B. Rajkumar and G. Narsimha
Zhao, Z., Hu, H., Ahn, G-J. and Wu, R. (2010) ‘Risk-aware response for mitigating MANET
routing attacks’, Globel Telecommunications Conference (GEOBECOM 2010), December,
pp.1–6, ISSN: 1930-529X.