Performance Analysis of Secure Routing Protocols in Mobile Ad-Hoc Networks

Similar documents
Performance Analysis of Aodv Protocol under Black Hole Attack

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Routing Protocols in MANET: Comparative Study

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

AODV-PA: AODV with Path Accumulation

Power aware Multi-path Routing Protocol for MANETS

Routing Protocols in MANETs

Performance Evaluation of MANET through NS2 Simulation

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

A Simulation study : Performance comparison of AODV and DSR

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Estimate the Routing Protocols for Internet of Things

2013, IJARCSSE All Rights Reserved Page 85

Defending MANET against Blackhole Attackusing Modified AODV

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Performance Analysis of Three Routing Protocols for Varying MANET Size

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

Evaluation of Routing Protocols for Mobile Ad hoc Networks

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

IJMIE Volume 2, Issue 6 ISSN:

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

PERFORMANCE STUDY OF IMPROVED AODV AGIANST BLACK HOLE ATTACK IN WIRELESS ENVIRONMENT

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Performance Comparison and Analysis of DSDV and AODV for MANET

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

A Novel Secure Routing Protocol for MANETs

A Review on Black Hole Attack in MANET

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Routing Protocols in Mobile Ad-Hoc Network

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Security In Multicast Mobile Ad-Hoc Networks

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

Wireless Network Security Spring 2015

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

A COMPARISON STUDY OF DSDV AND SEAD WIRELESS AD HOC NETWORK ROUTING PROTOCOLS

IMPLEMENTATION OF DYMO ROUTING PROTOCOL

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Secured Routing with Authentication in Mobile Ad Hoc Networks

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Mitigating Superfluous Flooding of Control Packets MANET

Recent Researches in Communications, Information Science and Education

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

An Adaptive Congestion Avoidance ACA_AODV Routing Protocol

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

3. Evaluation of Selected Tree and Mesh based Routing Protocols

CAODV Free Blackhole Attack in Ad Hoc Networks

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model

A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

A Survey of Routing Protocol in MANET

A Survey of Attacks in Mobile Ad Hoc Network

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

International Journal of Advance Engineering and Research Development

Performance Evaluation and Comparison of AODV and AOMDV

Improving the Performance of Wireless Ad-hoc Networks: Accounting for the Behavior of Selfish Nodes

Analysis of Routing Protocols in MANETs

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Mobile Ad-hoc Networks (MANET)

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

QUALITY OF SERVICE PROVISIONING IN MANET USING A CROSS-LAYER APPROACH FOR ROUTING

Performance Evaluation of Various Routing Protocols in MANET

A Review paper on Routing Protocol Comparison

Wireless Network Security Spring 2013

Securing AODV Using HMAC of Cryptography for MANETs

Improved Local Route Repair And Congestion Control In Self Organizing Networks

MODIFICATION AND COMPARISON OF DSDV AND DSR PROTOCOLS

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Transcription:

Performance Analysis of Secure Routing Protocols in Mobile Ad-Hoc Networks 1 C. Sreedhar, 2 Dr. S. Madhusudhana Verma, 3 Dr. N. Kasiviswanath 1,2 Dept. of CSE, GPREC, Kurnool, AP, India 3 Rayalaseema University, Kurnool, AP, India Abstract Routing in Mobile Ad-Hoc Networks (MANETs) is a challenging task due to its nature of open medium, infrastructure-less, dynamic and no trusted central authority. In MANET, a node can get compromised during the route discovery process. Attackers from inside or outside can easily exploit the network. Several secure routing protocols are proposed for MANETs. In this paper, we consider Ad-Hoc On-Demand Distance Vector (AODV) routing protocol due to the reason that it uses the shortest number of wireless hops towards a destination as the primary metric for selecting a route with independence of the traffic congestion. To add security to AODV, Secure AODV was designed to enhance security services to the original AODV. Secure AODV protocol was designed with cryptographic techniques such as digital signatures and hash chains, which can have significant impact on the routing performance of AODV routing protocol. An improvement to S-AODV, Adaptive SAODV (A-SAODV) was developed based on adaptive mechanism. We compare the performance and impacts using AODV, S-AODV and A-SAODV routing protocols using NS-2 Simulator. Simulation results will show the performance impact of security implements into the original AODV after the implementations of S-AODV and A-SAODV. Keywords MANETs, Routing Protocols, S-AODV, A-SAODV I. Introduction A MANET is a collection of wireless nodes that can dynamically form a network to exchange information without using any preexisting fixed network. Mobile networking is one of the most important technologies supporting pervasive computing. During the last decade, advances in both hardware and software techniques have resulted in mobile hosts and wireless networking common and miscellaneous. Most of the MANET routing protocols can be classified into two: Proactive routing protocols and reactive routing protocols. The problem of security in MANETs [1-2], represents a serious challenge. To add to that, due to the inherent, severe constraints in power, storage and computational resources in the MANET nodes, causes a challenging issue for a routing protocol. Therefore, the traditional security mechanisms and protocols, including those for the wired networks are not directly applicable and require a careful relook [3]. We attempt revisiting the secure routing protocols applicable in MANETs and investigate the performance of some of the secure Ad-Hoc routing protocols. The routing protocols are especially susceptible in MANETs because of the major reliance on the cooperative routing algorithms employed for establishing the network routes, with underlying assumptions about the sanctity of the peer network nodes. Several security attacks such as attacks using modification, attacks using fabrication, attack using impersonation [4]. II. Related Work Security is the primary concern in wired or wireless networks. A number of security mechanisms has been developed and proposed. The insecurity of the wireless links, energy constraints, poor physical protection of nodes in a hostile environment compare to wired network and vulnerability of statically configured security scheme has been identified in [5-8], as challenges. The absence of infrastructure and the consequent absence of authorization facilities impede the usual practice of establishing a line of defense, separating nodes into trusted and not-trusted. Such a distinction would have been based on a security policy, the possession of the necessary credentials and the ability for nodes to validate them. In MANET, there may be no ground for an a priori classification, since all nodes are required to cooperate in supporting the network operation, while no prior security association can be assumed for all the network nodes. In order to maintain connectivity in a mobile ad hoc network all participating nodes have to perform routing of network traffic. In this research, we have considered AODV protocol, a well known for a MANET [9], which is a reactive protocol where in nodes in the network exchange routing information only when a communication must take place and keep this information upto-date only as long as the communication lasts. Secure AODV (S-AODV) is a security extension of the AODV protocol, based on public key cryptography. SAODV routing messages (RREQs, RREPs, and RERRs) are digitally signed to guarantee their integrity and authenticity. Adaptive SAODV (A-SAODV) is a prototype implementation of SAODV which includes an adaptive reply decision feature, meant to optimize the S-AODV performance with respect to the double signature option. The cooperation of nodes cannot be enforced by a centralized administration authority since one does not exist. Therefore, a network layer protocol designed for such self-organized networks must enforce connectivity and security requirements in order to guarantee the undisrupted operation of the higher layer protocols [10]. III. Ad-Hoc On-Demand Distance Vector (AODV) The AODV routing protocol [11-12], is a pure on-demand routing protocol. The primary objectives of AODV are: 1. To perform path discovery process when necessary. AODV uses broadcast route discovery mechanism. 2. To distinguish between local connectivity management (neighbor detection) and general topology maintenance. 3. To broadcast information about changes in local connectivity to those neighboring mobile nodes those are likely to need the information. One of the distinguished features of AODV is its use of a destination sequence number of each route entry. The AODV algorithm enables dynamic, self-starting, multi-hop routing between participating mobile nodes wishing to establish and maintain an ad hoc network. Several attacks [13,14], can be launched against AODV routing protocol such as message tampering attack, message dropping attack and message replay attack. The path discovery process is initiated whenever a source node needs to communicate with another node and when the node does not contain the routing information in the routing table or the www.ijcst.com International Journal of Computer Science And Technology 693

route entry has been expired. Each node maintains two separate counters [15], a node sequence number and request broadcast ID. The source node then broadcasts a route request (RREQ) packet to its neighbors. Each RREQ is uniquely identified by <IP address, broadcast ID>. The value of broadcast ID is incremented every time a node issues a RREQ request. All nodes that received this RREQ packet will update their information for the source node. AODV uses 3 types of control messages to run the algorithm, RREQ, RREP and RERR messages. The sequence number and request broadcast ID uniquely identifies a RREQ. Each neighbor either satisfies the RREQ by sending a RREP back to the source, or re-broadcasts the RREQ to its own neighbors after increasing the HOP Count. A node may receive multiple copies of the same route broadcast packet from various neighbors. When an intermediate node receives a RREQ, if it has already received a RREQ with the same broadcast ID and source address, it drops the redundant RREQ and does not rebroadcast it. If the node cannot satisfy the RREQ, it keeps track of necessary routing information in order to implement the reverse path setup, as well as the forward path setup that will accompany the transmission of the eventual RREP. When RREQ arrives at a node that possesses the current to the destination, it determines whether it has a valid route entry for the desired destination by finding the freshness of the route by comparing sequence numbers. After ensuring that route is an updated route and valid one, the node unicast RREP message to the source using the reverse path that has been by the RREQ message. In each routing table entry, the address of active neighbors through which packets for the given destination are received is also maintained. A neighbor is considered active if it originates or relays one packet for that destination within the most recent active timeout period. This information is maintained so that all active source nodes can be notified when a link along a path to the destination breaks. A route entry is considered active if it is in use by any active neighbors. The path from a source to a destination, which is followed by packets along active route entries, is called an active path. A mobile node maintains a route table entry for each destination. IV. Secure Ad-Hoc On Demand Distance Vector (S-AODV) The S-AODV [16], addresses the problem of securing a MANET network. SAODV is an extension of the AODV [12], routing protocol which is based on public key cryptography extends the AODV message format to include security parameter for security the routing messages. SAODV is an extension of the AODV routing protocol that can be used to protect the route discovery mechanism providing security features like integrity, authentication and non-repudiation. SAODV assumes that each ad hoc node has a signature key pair from a suitable asymmetric cryptosystem. Further, each ad hoc node is capable of securely verifying the association between the address of a given ad hoc node and the public key of that node. Achieving this is the job of the key management scheme. Two mechanisms are used to secure the AODV messages: Digital signatures to authenticate the non-mutable fields of the messages. Hash chains to secure the hop count information (the only mutable information in the messages). For the non-mutable information, authentication can be performed in a point-to-point manner, but the techniques cannot be applied to the mutable information. Route error messages are protected 694 In t e r n a t i o n a l Jo u r n a l o f Co m p u t e r Sc i e n c e An d Te c h n o l o g y ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) in a different manner because they have a big amount of mutable information. Therefore, every node (generating or forwarding a route error message) uses digital signatures to sign the whole message and that any neighbor that receives verifies the signature. The RREQ and RREP has the following extension fields <Type, Length, Hash function, Max Hop Count, Top hash, signature, hash > The RERR has the following extension fields <Type, Length, reverse, signature > SAODV uses hash chains to authenticate the hop count field of RREQ and RREP messages by allowing every node that receives the message (either an intermediate node or the final destination) to verify that the hop count has not been decremented by an attacker. A hash chain is formed by applying a one-way hash function repeatedly to a seed number. Every time a node originates a RREQ or a RREP message, it performs the following operations: Generates a random number (seed). Max_Hop_Count = TimeToLive Hash = seed Hash_Function = h, Max_hop_count Top_Hash = h (seed) Where, h is a hash function, h i (x) is the result of applying the function h to x i times. In addition, every time a node receives a RREQ or a RREP message, it performs the following operations in order to verify the hop count: Max_Hop_Count Hop_count Top_Hash = h (Hash) Before rebroadcasting a RREQ or forwarding a RREP, a node applies the hash function to the Hash value in the Signature Extension to account for the new hop Hash = h(hash) A. SAODV Digital Signatures Digital signatures are used to protect the integrity of the nonmutable data in RREQ and RREP messages. That is, every field but the Hop_Count of the AODV message and the Hash from the SAODV extension are signed. The main problem in applying digital signatures is that AODV allows intermediate nodes to reply RREQ messages if they have a fresh enough cached route to the destination. While this makes the protocol more efficient it also makes it more complicated to secure. The problem is that a RREP message generated by an intermediate node should be able to sign it on behalf of the final destination. And, in addition, it is possible that the route stored in the intermediate node would be created as a reverse route after receiving a RREQ message (which means that it does not have the signature for the RREP). To solve this problem, the author of the protocol presents 2 solutions. The first one is that, if an intermediate node cannot reply to a RREQ message because it cannot properly sign its RREP message, it just ignores RREQ as if it didn t have the cached route and forwards the RREQ message. The second is that, every time a node generates a RREQ message, it also includes the RREP flags, the prefix size and the signature that can be used (by any intermediate node that creates a reverse route to the originator of the RREQ) to reply a RREQ that asks for the node that originated the first RREQ. To distinguish the different SAODV extension messages, the ones that have two signatures are called RREQ and RREP Double Signature Extension. When a node receives a RREQ, it first verifies the signature before creating or updating a reverse route to that host. Only if the signature www.ijcst.com

is verified, will it store the route. If the RREQ was received with a Double Signature Extension, then the node will also store the signature for the RREP and the lifetime (which is the reverse route lifetime value) in the route entry. An intermediate node will reply to a RREQ with a RREP only if it fulfills the AODV s requirements to do so and the node has the corresponding signature and old lifetime to put into the Signature and Old Lifetime fields of the RREP Double Signature Extension. Otherwise, it will rebroadcast the RREQ. When a RREQ is received by the destination itself, it will reply with a RREP only if it fulfills the AODV s requirements to do so. This RREP will be sent with a RREP Single Signature Extension. When a node receives a RREP, it first verifies the signature before creating or updating a route to that host. Only if the signature is verified, will it store the route with the signature of the RREP and the lifetime. Using digital signatures prevents impersonation attack. B. Adaptive Secure Ad-Hoc On Demand Distance Vector (A-SAODV) Adaptive Secure AODV (A-SAODV) [17] is a prototype implementation of SAODV, based on the AODV-UU implementation by Uppsala University. Unlike AODV-UU, A-SAODV is a multithreaded application: cryptographic operations are performed by a dedicated thread to avoid blocking the processing of other messages. Therefore, in A-SAODV, there are two execution threads: one dedicated to cryptographic operations and the other to all other functions (routing message processing, SAODV routing table management, timeout management, SAODV message generation, and data packet forwarding). The two threads communicate via a First Input First Output (FIFO) queue containing all the messages that must be signed or verified. The prototype developed includes an experimental feature, the adaptive reply decision, to optimize SAODV performance with respect to the double signature option. The situation is different in SAODV, because generating such a reply requires the intermediate node to generate a cryptographic signature: nodes may spend much time in computing these signatures and become overloaded. Moreover, if intermediate nodes have a long queue of routing messages that must be cryptographically processed, the resulting delay may be longer than if the request reaches the destination node. If the double signature mechanism removed, an uncollaborative protocol created, in which only the destination node is allowed to reply to a RREQ message. C. A-SAODV Route Request and Route Reply Processing This is possible, where the simulation results show that if signing time is low, and routes are not very short, performance is worse than SAODV with double signatures. Therefore, the A-SAODV approach makes the double signature feature adaptive: intermediate nodes reply to RREQs only if they are not overloaded. Each node has a queue of routing messages to be signed or verified, and the length of this queue (with different weights for signature operations and verification operations) can be used to evaluate the current load state of the routing daemon When a node receives a RREQ message and has the information to generate a RREP on behalf of the destination, it checks the queue length and compares it with a threshold. If the queue length is lower than the threshold, the node generates a RREP (collaborative behavior); otherwise it forwards the RREQ without replying (uncollaborative behavior). In the A-SAODV prototype, the threshold value can be changed during execution (two special values allow always reply behavior and never reply behavior). Other, more elaborate strategies could be defined to estimate the crypto queue delay and consequently decide whether to reply or forward the message. For example, a fixed threshold (based on the timeouts defined by the routing protocol) and a predictor of queuing times could be used. In this way, the algorithm could adapt itself to the situation and the computing power of the node. An additional external parameter could be used to take into account the previously mentioned external factors (how much a node is willing to collaborate, e.g., depending on its battery state). Another little optimization included in the A-SAODV prototype is a cache of latest signed and verified messages, in order to avoid signing or verifying the same message twice. V. Experimental Results In this research paper, the comparisons of three routing protocol have been measured between AODV, Secure AODV and Adaptive Secure AODV to study the performance of each routing protocols in a free-attack simulation environment using different performance metrics. A. Scenario and Environment Settings The scenario and the environment settings are fixed. It is purposely done to see the fair results between the routing protocols. These routings protocols AODV, Secure AODV and Adaptive Secure AODV are fairly compared in a chosen free-attack simulation environment. Here are some of the details on the setup: Number of nodes : 50 Maximum connections : 40 traffic sources Mobility Model :Randomwaypoint Rate : 8 kbps Mobility speed : 40 m/s Topology size : 500 m * 500 m Time : 100 sec B. Packet Delivery Fraction The ratio of the data packets delivered to the destinations to those generated by the Constant Bit Rate (CBR) sources. PDF shows how successful a protocol performs delivering packets from source to destination. Higher value (nearest to 1.0) means the better the results. It describes the loss rate that will be seen by the transport protocols, which in turn, affect the maximum throughput that the network can support. Fig. 1: Packet Delivery Fraction (%) vs Pause Time From the fig. 1, the result shows that AODV outperform both SAODV and A-SAODV in PDF percentage. It means that AODV produced more throughputs compared to SAODV and A- SAODV www.ijcst.com International Journal of Computer Science And Technology 695

in total runtime of the simulations. At lower nodes, SAODV and A-SAODV perform a slight different reading, where SAODV perform better.but, when the pause time increased; starting from 40 seconds, results shows that A-SAODV outperform SAODV and it generates better throughput than SAODV. In overall, PDFs percentage readings are increased from lower pause time to larger pause time because all nodes involved will be more steady, stable and accessible to all active nodes. C. Average End-to-End Delay The delay experienced by packet from the time it was sent by a source till the time it reached the destination. This includes all possible delays caused by buffering during route discovery latency, queuing at the interface queue, retransmission delays at the MAC and propagation and transfer times. As the results shown in fig. 2, there are some unstable results collected from AODV compared to SAODV and A-SAODV. Since the usage of signatures and verifications method in the SAODV and A-SAODV routing protocols, higher delays produced in SAODV and A-SAODV. From the result, we can see that A-SAODV had lower delay and giving much better performance compared to SAODV after simulations moving to a larger pause time. ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) pause time. Contrast with SAODV and A_SAODV, these protocols produced more dropped packet and again, it were caused by the authentications and signatures methods in every single RREQs and RREPs. It shows that many nodes were not authenticated during the simulations and being dropped from participating in the process. At larger pause time, once again A-SAODV outperform SAODV in having smaller quantities of dropped packets, even though both shows only slight differences at the end of simulation time. E. Routing Overheads The number of routing packets transmitted for every data packet sent. Each hop of the routing packet is treated as a packet. Normalized routing load are used as the ratio of routing packets to the data packets. As for the calculation, Normalized Routing Load = routing packets sent / packet received Fig. 4: Routing Overhead vs Pause Time Fig. 2: Average End-to-End Delay vs Pause Time D. Number of Dropped Packets This shows the total number of dropped packets that have been collected during the running of the simulations. It is mobilityrelated packet loss that may occur at both the network layer and the MAC layer. Fig. 3: No. of Dropped Packets vs Pause Time To calculate the number of dropped packet is by subtracting the number of received packets to those packets generated by the source/sender. Number of dropped packet = sent packet received packets. From the fig. 3, the result shows the total amount of dropped packets collected during the simulations. AODV had the lowest number of dropped packets compared to the other routing protocols and became nearly 0 dropped packets produced, as it moves to a larger 696 In t e r n a t i o n a l Jo u r n a l o f Co m p u t e r Sc i e n c e An d Te c h n o l o g y The results from fig. 4, show that the routing overhead (by collecting the normalized routing load produced) decreased when reaching towards the end of the simulation. We could see that as the longer pause time taken in the simulations; the more stable the routings could be, either to or from all nodes involved. Hence, AODV still outperform the other two routing protocols. On the other hand, in lower pause time, SAODV perform better than A-SAODV but when moving to larger pause time (starting from 60 seconds), A-SAODV gives better outputs towards the end; compared with SAODV. VI. Conclusion and Future Work Some analysis and performance comparisons of AODV, SAODV and A-SAODV routing protocols in MANETs have been done in this research paper, based on the performance metrics rather than security metrics. Roughly, SAODV and A-SAODV performs such a like AODV with lower number of nodes and less mobility but when moving to more higher number of nodes and increased mobility, it tends to break down. Secured ad hoc routing protocols are a necessity for securing the routing of data. This paper shows that in the secure routing protocols, the usage of security techniques like digital signatures, authentications and hash chains have major impacts on the performance since it will use more processing power and time. In overall the overhead caused due to additional security should be minimized. The outputs and findings will be much different and the usage of security methods to be in place should be looked again to get better performance or to get better security. And finally, the best routing protocol could be chosen, but still totally depends on the requirements of that routing environment or systems; either to have best performance or best security. www.ijcst.com

References [1] Hongmei Deng, Wei Li, Dharma P. Agarwal, Routing security in wireless Ad-Hoc networks, IEEE Communications Magazine, October 2002. [2] Lidong Zhou, Zygmunt J.Haas, Securing Ad-Hoc networks, IEEE Network, 1999. [3] Ebrahim Mohamad, Louis Dargin, Routing Protocols Security, In: Ad-Hoc Networks, A Thesis at Oakland University School of Computer Science and Engineering. [4] C. Sreedhar, Dr. S. Madhusudhana Verma, Dr. N. Kasiviswanath, Potential Security Attacks on Wireless Networks and their Countermeasure, International Journal of Computer Science and Information Technology (IJCSIT), Vol. 2, No. 5, 2010. [5] P.Ning, K. Sun, How to misuse AODV: A Case Study of Insider Attacks Against Mobile Ad-Hoc Routing Protocols, Info Assurance Wksp, IEEE sys, Man and Cybernetics Soc, 2003, pp. 60-67. [6] Weichao Wang, Yi Lu, Bharat K. Bhargava, On Vulnerability and Protection of Ad-Hoc On-demand Distance Vector Protocol, IEEE Proceedings, 2003, pp. 375-382. [7] Kimaya Sanzgiri, Bridget Dahilly, Brian Neil Leviney, Clay Shieldsz, Elizabeth M. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks, Proceedings of the 10th IEEE International Conference on Network Protocols, 2002, pp. 1-10. [8] M. Aziz, M. Al-Akaidi, Security issues in wireless Ad Hoc Networks and the application to the telecare project, Proceedings of the 15 International Conference on Digital Signal Processing, DSP 2007, pp. 491-494. [9] Davide Cerri, Alessandro Ghioni, Securing AODV: The A-SAODV Secure Routing Prototype, IEEE Communications Magazine, 2008. [10] Jane Zhen, Sampalli Srinivas, Preventing Replay Attacks for Secure Routing in Ad-Hoc Networks, Dalhousie University, Halifax, NS, Canada, Springer-Verlag Berlin Heidelberg 2003, Ad-Hoc-NOW 2003, LNCS 2865, pp. 140 150, 2003. [11] C. E. Perkins, E. M. Royer, Ad-Hoc On-Demand Distance Vector Routing, Proc. 2nd IEEE Wksp. Mobile comp. Sys. And Apps. Feb,1999, pp. 90-100. [12] C.E. Perkins, E. M. Belding-Royer, S. R. Das. Ad-Hoc On- Demand Distance Vector Routing, IETF RFC 3561, July 2003. [13] Junaid Arshad, Mohammad Ajmal Azad, Performance Evaluation of Secure on-demand Routing Protocols for Mobile Ad-Hoc Networks, 2006 IEEE. [14] M. F. Juwad, H. S. Al-Raweshidy, Experimental Performance Comparisons between SAODV & AODV, IEEE Second Asia International Conference on Modelling & Simulation, 2008. [15] Charles E. Perkins, Ad-Hoc Networking, Addison-Wesley, 2001. [16] M. G. Zapata, Secure Ad-Hoc On-Demand Distance Vector (SAODV) Routing, INERNET DRAFT, draft-guerreromanet-saodv-00.txt, August 2001. [17] Davide Cerri, Alessandro Ghioni, Securing AODV: The A-SAODV Secure Routing Prototype, IEEE Communications Magazine, 2008. C. Sreedhar received his B.E. degree in Computer Science & Engineering from Madras University, Chennai, M.E. degree in CSE from Sathyabama University, Chennai, and pursuing Ph.D. degree from Rayalaseema University, Kurnool. At present, He is working as associate professor in CSE department, in G. Pulla Reddy Engineering College, Kurnool. His research interests include wireless networks, security, and robotics. Dr. S. Madhusudhana Verma received his M.S degree in 1986, M.Phil degree in 1994 and Ph.D in 1998 from Sri Venkateswara University, Tirupathi. At present, he is working as Professor and Head of OR & SQC at Rayalaseema University, Kurnool. His research interests are reliability engineering, statistical modeling and computer science. He attended 13 National/ International conferences and published 15 research articles in National/International journals and guided Doctoral and M.Phil degrees. Dr. N. Kasiviswanath received his B.E. degree in Computer Science & Engineering from Marthwada University, M.S. degree in Computer Science & Engineering from BITS, Pilani and the Ph.D. degree from Rayalaseema University, Kurnool. He has 20 years of teaching experience. He has published 25 research papers in National/International journals/ conferences. At present, he is working as Professor and Head of Computer Science & Engineering Department, G. Pulla Reddy Engineering College, Kurnool. www.ijcst.com International Journal of Computer Science And Technology 697