Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Similar documents
Performance Analysis of Aodv Protocol under Black Hole Attack

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Power aware Multi-path Routing Protocol for MANETS

Evaluation of Routing Protocols for Mobile Ad hoc Networks

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

PNR: New Position based Routing Algorithm for Mobile Ad Hoc Networks

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

A Simulation study : Performance comparison of AODV and DSR

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

PERFORMANCE COMPARISON OF AODV AND DSR ROUTING PROTOCOL IN MOBILE AD-HOC NETWORK

Mobile Ad-hoc Networks (MANET)

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Mitigating Superfluous Flooding of Control Packets MANET

Routing Protocols in MANETs

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Performance Evaluation of MANET through NS2 Simulation

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Defending MANET against Blackhole Attackusing Modified AODV

POLITECNICO DI TORINO Repository ISTITUZIONALE

A survey on quality of services of DSDV, AODV and DSR routing protocols in Ad hoc Networks

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A Review on Black Hole Attack in MANET

A Survey - Energy Efficient Routing Protocols in MANET

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Implementation: Detection of Blackhole Mechanism on MANET

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Security In Multicast Mobile Ad-Hoc Networks

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Recent Researches in Communications, Information Science and Education

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

AODV-PA: AODV with Path Accumulation

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)

2013, IJARCSSE All Rights Reserved Page 85

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Analysis of Routing Protocols in MANETs

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

Ad-Hoc Data Processing and Its Relation with Cloud Computing Process Using Functional Approach

Performance Evaluation and Comparison of AODV and AOMDV

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks

An PERFORMANCE ENHANCEMENT OF AODV ROUTING PROTOCOL IN MANETS

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

IJMIE Volume 2, Issue 6 ISSN:

Overhead Reduction and Performance Enhancement of AODV and DSR Routing Protocols

A Robust Trust Aware Secure Intrusion Detection for MANETs

Wireless Networking & Mobile Computing

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

IMPLEMENTATION OF DYMO ROUTING PROTOCOL

Performance Analysis of Secure Routing Protocols in Mobile Ad-Hoc Networks

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

Performance Comparison and Analysis of DSDV and AODV for MANET

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR

3. Evaluation of Selected Tree and Mesh based Routing Protocols

A survey on AODV routing protocol for AD-HOC Network

QUALITY OF SERVICE PROVISIONING IN MANET USING A CROSS-LAYER APPROACH FOR ROUTING

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2

Transcription:

Security Enhancement of AODV Protocol for Mobile Ad hoc Network Ms Darshana Patel 1, Ms Vandana Verma 2 1,2 RCEW, Jaipur, Rajasthan, India. ABSTRACT Here, authors presents a smart encryption algorithm integrated with existing AODV protocol that enhances the security of routing in MANET. Mobile Ad hoc Network s because of maliciousness that intentionally disrupts the network by using variety of attacks and due to routing protocols (e.g. AODV), which were already developed without considering security features to prevent the various kinds of attacks. And also there is infrastructure less environment, and having open peer-to-peer architecture, shared wireless medium and dynamic topology, MANETs are frequently established in insecure environments like disaster sites and military applications. Ad-hoc On-Demand Distance Vector (AODV) is widely used routing protocol. Author s strategy is to choosing one of the secure routing protocols among all according to its effectiveness. It is analyzed by its functionality and performance measurements. Then, the different existing security techniques (e.g. encryption algorithm.) were surveyed so that to come up with new algorithm to integrate with the basic AODV protocol. And fortunately, a scheme of integrating encryption algorithm with basic AODV routing protocol is found capable of handling both unauthorized and malicious nodes attacks. The proposed security scheme was also simulated in the NS2. Keywords: MANETs, Performance, Routing, Security 1. INTRODUCTION MANET is a set of independent mobile nodes e.g. Laptops, tablets, pda etc. that communicate over relatively bandwidth and power constrained wireless links. My research strategy is to choosing one of the secure routing protocols among all according to its effectiveness, Authors have study it and analyze its functionality and performance measurements. Then, the different existing security techniques (e.g. encryption algorithm.) were surveyed so that to come up with new algorithm to integrate with the basic AODV protocol. And fortunately, a scheme of integrating encryption algorithm with basic AODV routing protocol is found capable of handling both unauthorized and malicious nodes attacks. In this work, Authors are presenting their own work with enhancing the security of AODV routing protocol that protects against a number of attacks carried out in packet routing mechanisms for MANETs. Authors would present their encryption algorithm to secure AODV messages which they have implemented on existing AODV protocol in NS- ALLINONE. Here authors are generating signature using their algorithm and concating it with AODV message formats, in addition they have applied encryption to safe the signature of destination node using public key and once again another signature is generated and also concated it along with AODV message formats for more security by various attackers. Figure 1: Ad Hoc Network 2. AODV ROUTING PROTOCOL AODV is a most widely used protocol and it is based on distance vector routing protocol that has been specially build Volume 2, Issue 1, January 2013 Page 317

for MANETs. AODV is an on demand protocol and reactive in nature as it finding the routes only when sender wants to send data. AODV makes widespread use of sequence numbers in control packets to avoid the problem of generation of routing loops. When a source node is interested to communicate with a destination node whose route is unknown for sender, it broadcasts a RREQ (Route Request) packet to all its neighbor nodes. Each RREQ packet contains a Request ID, source and the destination node IP addresses and sequence numbers along with a hop count and flags field in its packet format. The Request ID field uniquely identifies the RREQ packet; By observing sequence number field we can have information regarding how fresh the control packet is? And the hop-count maintains the number of intermediate nodes between the source and the destination. Recipient node of the RREQ packet that has not find the Source IP and ID pair or doesn t maintain a fresher (larger sequence number) route to the destination rebroadcasts the same packet after incrementing the hop-count. When the RREQ packet arrived at the destination node a RREP (Route Reply) packet is generated and sent back to the source. RREP packet contains the destination node sequence number, the source and the destination IP addresses, route lifetime along with a hop count and flags. Intermediate node that receives the RREP packet, increments the hop count field, and it establishes a Forward Route to the source of the packet and transmits the packet on the Reverse Route. When a link failure is detected for a next hop of an active route a RERR (Route Error) message is sent to its active neighbors that were using that particular route. 3. ENHANCING THE SECURITY OF AODV IN MOBILE AD-HOC NETWORK USING ENCRYPTION ALGORITHM MANETs are frequently established in insecure environments like disaster sites and military applications. Ad-hoc On- Demand Distance Vector (AODV) is widely used routing protocol. AODV is based on distance vector routing, but here the updates are shared not on a periodic basis but on an as per on demand basis. For example, battle field ad hoc network, in such a network it would surely be first concerned with the efficient and in time delivery of the message but with this, we will have to be more concerned about the strong secrecy of the information also. These kinds of scenarios, where we want to transmit private and secure information very rapidly, motivate authors to make use of encryption algorithm with public key for security context. In this paper, author considers the advantage of encryption algorithm with public key to hide the information of all the fields of message by using an encryption algorithm. Enhancing the Security of AODV in Mobile Ad-hoc Network using Encryption Algorithm Here author have proposed an encryption algorithm with public key used to secure AODV messages. This mechanism calculates signature using appropriate encryption algorithm for all the fields of an AODV message. It also calculates signature with public key and then both signatures will be transmitted along with the AODV messages. The Proposed Encryption Algorithm as follows: 1. In routing of AODV, sender node generates the signature using an encryption algorithm and concate it with each of the AODV messages. It performs the following operations: - It uses secure hash algorithm (SHA) value to generate signature. - Sets signature SHA value with the message format. - Now for specially destination node sender uses public key to generate another signature and generate the same and also concate it with message. 2. Afterwards, each time an intermediate node receives sent message, it calculates the following calculations to verify the genuine message: - It uses the concated signature to match the newly generated signature by intermediate node and compare it; if it matches then node will forward the message to the next node. - But before rebroadcasting a message it will check the index of upcoming node to check whether it is destination or not. 3. Finally, if receiving node matches the value of index and find it is destination node then, it will calculate the signature with using public key for more security purpose and compare it with concated special signature with key. Figure 2: The proposed encryption scheme Volume 2, Issue 1, January 2013 Page 318

The proposed scheme is explained using fig.1 and it fulfills all security requirements. As it generates very less overhead for computation, it saves power consumption of nodes significantly that is most important aspect of the mechanism. 4. SIMULATION AND RESULTS All simulation experiments are developed and simulated on an Intel(R) Core 2 Duo 1.83GHz machine using Ubuntu 12.4.0 with 2 GB RAM and the network simulator NS2 version NS-2.34. Table.1 is summarized the different configuration values that were used in all the performed simulations. Table 1: General Simulation Parameters Parameter Value MANET Area 500*500 sq. m. Total number of nodes 25 Movement Pattern Non-random Node Speed 0 up to 20 m/s Application Constant Bit Rate (CBR) No. of generated Packets 10000 packets per CBR Size of Packet 512 bytes Simulation Time 100 sec CBR Traffic 5-10-15-20 Pause Time 0-10-20-40-100 Experiment 1: Packet Delivery Fraction It is the ratio of packets delivered to that generated by the traffic generator. It is given by received packets/sent packets. The packet delivery ratio is directly influenced by packet loss, which may be caused by general network faults or uncooperative behavior. Figure 3: PDF values for CBR traffic 5 at different pause time Figure 4: PDF values for CBR traffic 10 at different pause time Volume 2, Issue 1, January 2013 Page 319

Figure 5: PDF values for CBR traffic 15 at different pause time Figure 6: PDF values for CBR traffic 20 at different pause time In this experiment, the packet delivery ratio is being measured for the normal AODV and secure encrypted AODV. From the figure.2, 3, 4 and 5, it is clear that addition of security has not much effect (in fact good effect) on the efficient working of the MANET. Experiment 2: Routing Load It is the number of routing packets required to be sent per data packet delivered. It is given by routing packets/received packets. In this experiment, the routing load is being measured for the normal AODV and secure encrypted AODV. Figure 7: RL values for CBR traffic 5 at different pause time Figure 8: RL values for CBR traffic 10 at different pause time Volume 2, Issue 1, January 2013 Page 320

Figure 9: RL values for CBR traffic 15 at different pause time Figure 10: RL values for CBR traffic 20 at different pause time Figure. 6, 7, 8 and 9 shows the dramatic fall of RL in secure encrypted AODV. It is also found that secure version of AODV has less routing load than normal AODV. It is also concluded by many researchers that less RL is indication of good performance. 5. CONCLUSION The proposed security scheme based on encryption algorithm defies various attacks possible in MANETs and satisfies the almost all the security requirements in routing protocol with using central authority and key management scheme which makes it more easily expandable and less complex in computation. As it generates very less overhead of calculations it saves power consumption of nodes significantly. According to the simulations that were performed, the newly proposed security scheme based on encryption algorithm, built on top of normal AODV routing protocol, achieves an overall good results. The proposed encryption algorithm also assures that if any malicious node drops invalid messages to the destination between the route intermediated node, it can be easily detected; so proposed security scheme prevents message dropping attacks which very crucial to prevent. Thus, the proposed scheme proves to be more efficient and less power consuming in securing AODV routing protocol in defending against various attacks on AODV. REFERENCES [1] Vaidya, B.; Makrakis, D.; Mouftah, H. Provisioning secure on-demand routing protocol in mobile ad hoc network IEEE DOI: 10.1109/ AHICI.2011.6113952, 2011 [2] Li-Li Pan, Research and simulation for secure routing protocol based on Ad hoc network, DOI: 10.1109/ICETC.2010.5529947, 2010 [3] Irshad, A.; Gilani, S.M.; Khurram, S.; Shafiq, M.; Khan, A.W.; Usman, M., Hash-chain based peer-peer key management and establishment of security associations in MANETS, DOI: 10.1109/ICIET.2010.5625727, 2010 [4] Hosseini, F.K., Dynamically Improve Throughput and Minimize End-to-End Delay in MANET, DOI: 10.1109/MICCCA.2008.4669842, 2008 [5] Pirzada, McDonald, Secure Routing with the AODV Protocol IEEE pp.57-61, 2005 [6] Junaid Arshad, Mohammad Ajmal Azad, Performance Evaluation of Secure on-demand Routing Protocols for Mobile Ad-hoc Networks, IEEE, pp. 971-975, 2006 [7] Perkins, Royer, and Das, Ad-hoc On-demand Distance Vector (AODV) routing, IETF RFC 3591, 2003. [8] R. Kumar, C. L. Reddy, and P. S. Hiremath, A Survey of Mobile Ad hoc Network Routing Protocols", Journal of Intelligent System Research, vol. 1, pp. 49-64, Jan.-June, 2008. [9] L. Layuan, Y. Peiyan, and L. Chunlin, Performance evaluation and simulations of routing protocols in Ad hoc networks," Computer Communications, vol. 30, pp. 1890-1998, 2007. Volume 2, Issue 1, January 2013 Page 321