Secure Routing Protocols for Mobile Ad-Hoc Network (MANETs) A Review

Similar documents
Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Performance Evaluation of Various Routing Protocols in MANET

A Review on Black Hole Attack in MANET

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

Security Issues In Mobile Ad hoc Network Routing Protocols

Packet Estimation with CBDS Approach to secure MANET

Performance measurement of MANET routing protocols under Blackhole security attack

Routing Protocols in Mobile Ad-Hoc Network

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS

Introduction to Mobile Ad hoc Networks (MANETs)

Keywords Wormhole Attack, AODV, Multipath Algorithm, On Demand Routing Protocols, Route Request, Route Reply, Mobile Ad-hoc Network,

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Webpage: Volume 4, Issue VI, June 2016 ISSN

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Wireless Network Security Spring 2013

A Review on Mobile Ad-hoc Networks (MANET S) with Attacks Impact

Variation in Wireless Sensor Network Performance Parameters under Black Hole Attack and It s Mitigation

Improving ZRP Protocol against Blackhole Attack

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

Secure routing in ad hoc and sensor networks

A Review Paper on Secure Routing Technique for MANETs

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Routing Protocols in MANET: Comparative Study

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

A Review Paper on Routing Protocols in Wireless Sensor Networks

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

International Journal of Advance Research in Computer Science and Management Studies

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

2013, IJARCSSE All Rights Reserved Page 85

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

MODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

ABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India

Defending MANET against Blackhole Attackusing Modified AODV

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

II. ROUTING CATEGORIES

International Journal of Advance Engineering and Research Development

Gurleen Kaur Walia 1, Charanjit Singh 2

Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

Performance Analysis and Enhancement of Routing Protocol in Manet

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

The General Analysis of Proactive Protocols DSDV, FSR and WRP

DETECTION OF COOPERATIVE BLACKHOLE ATTACK ON MULTICAST IN MANET

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

Securing Fisheye State Routing Algorithm Against Data Packet Dropping By Malicious Nodes in MANET

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Detection of Vampire Attack in Wireless Adhoc

Secure Routing and Transmission Protocols for Ad Hoc Networks

A survey on AODV routing protocol for AD-HOC Network

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Keywords: - MANETs, Unicast, Network, Classification, Routing

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

A Survey on Performance Evaluation of MANET Routing Protocols

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Detection of Malicious Nodes in Mobile Adhoc Network

Implementation: Detection of Blackhole Mechanism on MANET

To Detect and Isolate the Selective Packet Drop Attack in MANET

A Survey on the Secure Routing Protocols in MANETs

Performance Evaluation of AODV and DSR routing protocols in MANET

Overview of Challenges in VANET

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Performance Evaluation of MANET through NS2 Simulation

Comprehensive Study and Review Various Routing Protocols in MANET

Maharishi Markandeshwar University

A COMPARATIVE STUDY ON DIFFERENT TRUST BASED ROUTING SCHEMES IN MANET

IJMIE Volume 2, Issue 6 ISSN:

Effects of Caching on the Performance of DSR Protocol

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

Performance Comparison of Routing Protocols for Remote Login in MANETs

Keywords: Blackhole attack, MANET, Misbehaving Nodes, AODV, RIP, PDR

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Secure Routing with Detection Black Hole in MANET: A Study

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

ISSN: [Preet* et al., 6(5): May, 2017] Impact Factor: 4.116

Transcription:

Secure Routing Protocols for Mobile Ad-Hoc Network (MANETs) A Review Ratul Dey 1, Himadri Nath Saha 2 1 University of Engineering & Management, Jaipur, Rajasthan 303807, India 2 Institute of Engineering & Management, Y-12 Electronic Complex Sector-V, Saltlake Kolkata:- 700091 Abstract: Mobile Ad-hoc network (MANET) is a self configuring, multi hop wireless network. Security in mobile ADHOC network is a big challenge because there is no centralized authority which can supervise the individual nodes operating in the network. The attacks can come from inside the network and also from the outside. This article surveys classifies the secure routing protocol in MANET, and also discussing presently proposed method of mitigating those attack. In the routing protocol of the MANET while forwarding data packets to other nodes, some intermediate node extract useful information packets and can t forward the packet to the next node. Some node may modify the content of packets during the data transmission session. So that any one node can manipulate the original data. Keywords: Ad-hoc Network, Routing, Security, Attacks, MANET. 1. INTRODUCTION A mobile ad-hoc network (MANET) consist of a set of mobile hosts that carry out basic networking functions like packet forwarding, routing etc. without the help of an established infrastructure. Nodes of an ad-hoc network rely on one to another in forwarding a packet to its destination, due to the limited range of each mobile host s wireless transmissions. Security in MANET is an essential component for basic network functions like packet forwarding and routing [1,2]. like packet forwarding, routing, and network management, in ad-hoc networks those functions are carried out by all available nodes. This is very difficult for the core of the security problems specific to ad-hoc networks. As opposed to dedicated nodes of a classical network, the nodes of an ad hoc network cannot be trusted for the correct execution of critical network functions. In wireless network there is a high demand for security. [3,4] The malleable behavior our wireless routing protocol wireless routing network focused of attack of malicious agent. The remaining paper is organized as follows. Section 2 describes different routing protocol for MANET. Section 3 describes vulnerabilities on routing protocol Section 4 defines different secure routing protocols and finally conclusion. 2. DIFFERENT ROUTING PROTOCOL FOR MANET In MANET there are different types of routing protocols for routing the packets. Each routing has own rule to packet transfer method. In mobile ad-hoc network in different circumstances different protocol are use, like (1) Proactive Protocol (2) Reactive protocol (3) Hybrid protocol MANET Routing Protocol Proactive Protocol Reactive protocol Hybrid protocol Fig. 2: MANET Routing Protocols Fig. 1 Mobile ad-hoc network Network operations can be easily threatened if communications are not embedded into basic network functions at the early stages of their design. Routing network using dedicated nodes to support basic functions 2.1 Proactive Protocol In this routing protocol [4,5] network have unique routing table for send the data packets and want to establish connection to other nodes in the network. This protocol one type of demand-based operation which utilize network order to energy and bandwidth more efficiently. Pattern on a demand basis rather than maintaining routing between all nodes at all time. This is the flip-side of Volume 5, Issue 1, January February 2016 Page 74

demand-based operation. In cases where the additional latency which demand-based operations may be unacceptable, if there are adequate bandwidth and energy resources, proactive operations may be desirable in these situations. [6,7,8]There are different type of proactive protocol like, Destination-Sequenced Distance-Vector (DSDV), Fisheye State Routing (FSR), Source Tree Adaptive Routing (STAR), Optimized Link-State Routing (OLSR), Cluster head gateway switch routing (CGSR), Wireless routing protocol (WRP), Global state routing (GSR). 2.2 Reactive protocol Reactive protocol searches for the route in an on-demand manner and set the link in order to send out and accept the packet from a source node to destination node. [4, 7] Route discovery process is used in on demand routing by flooding the route request (RREQ) packets throughout the network. 2.3 Hybrid protocol It is a one special type protocol that separates the network into several zones, which makes a hierarchical protocol as the protocol ZHLS (zone-based hierarchical link state). [9,10] This protocol which effectively combines the best features of proactive and reactive routing protocol Hybrid routing protocol is based on GPS (Global positioning system), which allows each node to identify its physical position before mapping an area with table to identify it to which it belongs. Reactive protocols obtain the necessary route when it is required, by using route discovery process. In proactive protocols, nodes periodically exchange information to maintain up-to-date routing information. Hybrid routing protocols combine basic properties of both approaches [11,12]. There are different type of Hybrid protocol like, Zone routing protocol (ZRP), Zone-based hierarchical link state routing protocol. 3. VULNERABILITIES ON ROUTING PROTOCOL Presently there are a wide variety of routing protocols, but these protocols are not secured and face many attacks [13,14], which gives rise to the vulnerability in the network and might highly affect the efficiency of the system. In mobile ad-hoc network any node can affect by the different type of attacks. Mainly in MANET there are two type of attack 1) Data traffic attack. 2) Control traffic attack. In data traffic attack data packets are affected like, Black hole attack, Cooperative Black hole attack, Greyhole attack, Jellyfish attack etc. In control traffic attack control packets are affected, like Worm-hole attack, Hello flood attack, Bogus registration attack, Rushing attack, Sybil attack and Blackmail attack etc. 3.1 Data Traffic Attack: 3.1.1 Black hole attack: In this attack a malicious node acts like a Black hole, [15] dropping all data packets passing through it as like matter and energy disappear from the path in a black hole. If the attacking node is a connected node of two networks then it totally separated as the two networks. 3.1.2 Cooperative black hole attack This attack is similar to Black-Hole attack, but more than one malicious node tries to disrupt the network at the same time. It is one of the most critical attack and can totally disrupt the operation of an Ad Hoc network[16]. Mostly the only solution becomes finding alternating route to the destination, if at all exists. 3.1.3 Grey-hole attack It too drops data packets, but node s malicious activity is limited to certain conditions or trigger. Two most common type of behavior [17]. 3.1.3.1 Node dependent attack drops data packets destined towards a certain victim node or coming from certain node, [18] while for other nodes it behaves normally by routing data packets to the destination nodes correctly. 3.1.3.2 Time dependent attack [19] drops data packets based on some predetermined/trigger time while behaving normally during the other instances. 3.1.4 Jellyfish attack In this attack instead of blindly dropping the data packets, it delays them before finally delivering them. It manipulate the order of packets according to they are received and sends it in random order [17,19]. This disrupts the normal flow control mechanism used by nodes for reliable transmission. Jellyfish attack can result in significant end to end delay so there degrading QoS. 3.2 Control Traffic Attack 3.2.1 Wormhole attack If link become the lowest path to the destination then these malicious node always chosen, while sending path to the direction. The wormhole attack is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality [20]. In the wormhole attack, an attacker records data packet at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack is a serious threat in many ad hoc network routing protocols. The wormhole attack can done by a single node and it connect more than one node as a worm hole link. 3.2.2 Hello flood attack In this attack every node sent their packets towards this node hopping to the better route destination. Node broadcast a single high power transmitter to all it s Volume 5, Issue 1, January February 2016 Page 75

neighbor [21]. Then attacker node not generate any traffic, so the basis of performance node take the packet and perform as selective replay attack. 3.2.3 Bogus registration In bogus registration attack, attacker distinguish it self as a node and generate wrong information to the neighbor [21,22]. When packet transmitted then disturb the neighbor nodes. 3.2.4 Rushing attack In this mobile ad-hoc network each node before transmitting data first set the path source to destination. Sender node broadcast route request and neighbor node route reply with proper routing information, and again new selected node doing same method [22]. Rushing attack quickly forward with a broadcast massage to the neighbor so, when actual request come neighbor node just discard the request, due to previous request accept. 3.2.5 Sybil attack Sybil attack shows the fake multiple identities, show multiple node in the networks [23]. So one single node can assume as the multiple nodes and can hamper multiple nodes at a time. 3.2.6 Blackmail attack In the blackmail attack attacker nodes accused an innocent node as harmful node [24]. When the routing table try to identify perfect node according to the vote then if attacker node in sufficient number of those MANET it can give the wrong information according to the path. 4. DIFFERENT SECURE ROUTING PROTOCOLS For the secure routing protocol first need proper authentication need to digital signature of each and every authenticated nodes [25,26]. It also need to mutable information of the control packets. It also often complemented with the use of one-way hash functions. Identify wormhole and the tunnel [27,28]. These routing schemes provide authentication services which guard against modification and replaying of routing control messages and uses different cryptographic primitives for providing secure routing. 4.1 Basic Routing Protocols This protocol maintained by the originating node hashing the messages and signing the resulted message digest, which is verified by the recipients of a route request, by computing the hash of a message using the agreed upon hash function [29,30]. The advantage is that the protocol can combat external attacks by checking for the authenticity. The advantage of this protocol is that it extends the ICMP router discovery packet format to include the MAC and IP address of the sender, and authentication information that can be used to verify the broadcast beacon [31,32]. But the disadvantage of it is that it requires nodes to have shared secret keys for generating message authentication codes which are used to authenticate the routing control messages and the scheme is based on the assumption that the nodes in the network mutually trust each other and it employs public key cryptography for providing the security services. 4.2 Trust based Routing Protocols Trust is a value that can calculated on the basis of nodes action when it needed. Trust used to prevent from various attacks like wormhole, black-hole, Dos, selfish attack etc. Trust can be implemented in various ways such as by reputation, from opinion of nodes etc. This routing security schemes which fall in this category assign quantitative values to the nodes in the network, based on observed behavior of the nodes in question. The trust values are then used as additional metrics for the routing protocols [33,34]. The advantage is that it is robust against individual attackers and capable of adjusting its scope between local and network wide topology discovery. It can also operate well in networks where the topology and membership is changing very frequently. 4.3 Incentive based Routing Protocols In ad hoc networks, devices have to cooperate. Autonomous devices tend to abstain from cooperation. Incentive schemes have been proposed as a means of fostering cooperation under these circumstances. In order to work effectively, incentive schemes need to be carefully tailored to the characteristics of the cooperation protocol they should support [16,35,36]. These routing schemes implemented using credits that are given to nodes that cooperate and forward packets. In turn network services such as routing is provided only to those nodes that have good credit. If a node at an unfavorable location may not get enough packets to forward and thus may never be able to get credits to forward its own packets. 4.4 Detection and isolation based secure routing scheme This protocol can detects flooding, black hole, gray hole, wormhole and blackmail attacks. On detection the protocol takes immediate actions to blacklist these nodes from the network, thereby decreasing the number of malicious nodes in a network, hence improving the other QoS parameters [37,38]. This protocol detects and isolates misbehaving nodes in MANET. It is an enhancement of DSR routing and based on selection of selfish and unselfish nodes. The advantage is that the trust and routing calculation process is evaluated by experience, observation and behavior of other nodes, present in the network [39,40]. This protocol can effectively detect selfish nodes and isolate wormhole nodes that drop Volume 5, Issue 1, January February 2016 Page 76

packets. 5. CONCLUSION From extensive studies on existing secure MANET routing protocols, it has been observed that these protocols do not adequately mitigate attacks by misbehaving nodes which not only modify packets but also selectively drop some or all the packets. These misbehaving nodes cause various network communication problems. These studies have finally motivated us to search for an alternative design towards more efficient, secure routing protocols for MANET to be used in adversarial environment. REFERENCES [1] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields. A Secure Routing Protocol for Ad Hoc Networks in proc. of Network Protocols, 2002. Proceedings. 10th IEEE International Conference, November -2002, pp.78-87. [2] H. N. Saha, A. Chattopadhyay and D. Sarkar Review on intelligent routing in MANET, in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015, pp. 1-6. [3] S. Banerjee, R. Nandi, R. Dey and H. N. Saha, A review on different Intrusion Detection Systems for MANET and its vulnerabilities, in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015, pp. 1-7. [4] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, B. Banerjee, S. Mukherjee, R. Singh and D. Ghosh, A Review on MANET Routing Protocols and its Vulnerabilities, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),vol. 2, no. 6, pp. 252-262,November 2013. [5] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, B. Banerjee, S. Mukherjee, R. Singh and D. Ghosh, A Review on Attacks and Secure Routing Protocols in Manet, International Journal of Innovative Research and Review (JIRR),vol.1, no. 2, pp.12-36,december 2013. [6] J. Mandaland H. N. Saha, Modified Ant Colony Based Routing Algorithm in MANET, International Journal of Computer & Organization trends (IJCOT),vol..3, no.10, pp.473-477,november2013. [7] S. K. Deb,H. N. Saha, D. Bhattacharyya and P. K. Banerjee, Modified Dynamic On-Demand Routing Protocol, International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), vol. 3,no. 2, pp.139-144, March 2014. [8] W. Sarkar, H. N. Saha and A. Ghosh, A Greedy Methodology to Solve Travelling Salesperson Problem Using Ant Colony Optimization International Journal of Science and Research (IJSR), Vol. 3 No. 7, July 2014. [9] K. Roy and H. N. Saha, Restricted Hoping Routing Protocol, in proc. of International Conference on Computer Application (ICCA), December 2010, pp.281-290. [10] K. Chakraborty, A. Sengupta and H. N. Saha, Energy Efficiency in Wireless Network Using Modified Distributed Efficient Clustering Approach, in proc. of International Conference on Computer Science and Information Technology (CCSIT),Springer, vol. 132, Part II, January 2011, pp.215-222. [11] H. N. Saha, D. Bhattacharyya, and P. K. Banerjee, Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad hoc Network, International Journal of foundations of computing and decision sciences (FCDS),De Grurter, Vol.40, No. 4, pp.267 298, December 2015. [12] H. N. Saha, R. Singh, D. Bhattacharyya and P. K. Banerjee, Implementation Of Personal Area Network for Secure Routing in MANET by Using Low Cost Hardware, Turkish Journal Of Electrical Engineering & Computer Sciences, pp.1-20, 2015. [13] H. N. Saha, D. Bhattacharyya and P. K. Banerjee," Fidelity Index Based On Demand (FBOD) Secure Routing In Mobile Ad hoc Network, in proc. of International Conference on Parallel Distributed Computing Technologies and Applications(PDCTA),Springer,vol.203,Part-II, September 2011, pp.615-627. [14] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, Fidelity Based On-Demand Secure Routing (FBOD)in Mobile Ad-hoc Networks, International Journal of Advanced Computer Science and Applications(IJACSA), Special No. on Wireless & Mobile Networks, SAI, pp.19 25,August 2011. [15] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, Different Types of Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automata, in proc. of International Conference on Computer Science and Information Technology(CCSIT), Springer,vol.84,part-1, 2012, pp.203-213. [16] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, A Priority Based Protocol for Mitigating Different Attacks in Mobile Ad Hoc Networks, International Journal for Computer Science and Communication(IJCSC),vol. 1, no.2, pp.299-302, July 2010. [17] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, A. Bhattacharyya, A. Banerjee and D. Bose, Study of Different Attacks in MANET with its Detection & Mitigation Schemes, International Journal of Advanced Engineering Technology (IJAET),vol. 3,no. 1, pp.383-389, January 2012. [18] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, A Novel Energy Efficient and Administrator Based Secured Routing MANET, International Journal of Network Security & Its Applications (IJNSA), vol.4, no.4, AIRCC, pp.73-92,july 2012. Volume 5, Issue 1, January February 2016 Page 77

[19] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, A Novel Multi Point Relay Based Secure Routing in MANET, International Journal of Network Security & Its Applications (IJNSA), AIRCC, vol. 4, no.6, November 2012, pp.133-144. [20] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, A Distributed Administration Based Approach for Detecting and Preventing Attacks in Mobile Ad Hoc Networks, International Journal of Scientific and Engineering Research (IJSER),vol.2, no. 3, pp.101-111, March 2011. [21] Arpit Bansal, Navjot Kaur, Sunil Khullar, Dr. R.P.S. Bedi. Performance Analysis of ZHLS-GF Routing Protocol for MANETs through simulations. In Research Cell: An International Journal of Engineering Sciences ISSN: 2229-6913. Vol. 5 Dec. 2011. [22] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks using Cellular Automata, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC),vol. 3, no.2,aircc, pp.33-49, April 2012. [23] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, Semi-Centralised Multi Authenticated RSSI Based Solution to Sybil Attack, International Journal of Computer Science and Emerging Technologies (IJCSET), vol. 1, no. 4, pp.439-436, December 2010. [24] L. Venkatraman and D. P. Agrawal, An optimized inter-router authentication scheme for ad hoc networks, in proc. of the Wireless, 2001, pp.129 146. [25] D. Bose, A. Banerjee, A. Bhattacharyya, H. N. Saha, D. Bhattacharyya and P. K. Banerjee, An Efficient Approach to Secure Routing in MANET, in proc. of Advances in Computing and Information Technology (ACITY), Springer,vol.176, July 2012,pp.765-776. [26] H. N. Saha, D. Bhattacharyya, A. K. Bandhyopadhyay and P. K. Banerjee, Two-level Secure Re-Routing(TSR) in Mobile Ad Hoc Networks, in proc. of Advances in Mobile Network, Communication and its Applications (MNCAPPS), IEEE xplore, August 2012, pp.119-122. [27] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, Secure Multipoint Relay Based Secure Routing in MANET, in proc. Of International Conference on Computer Science, Engineering and Information Technology (CCSEIT), ACM Digital Library, October 2012,pp.63-68. [28] H. N. Saha, B. Banerjee, D. Bhattacharyya, D. Ghosh, R. Singh and S. Mukherjee, Different Routing Protocols and Their Vulnerabilities and Their Measures, in proc. of International Conference On Advances In Computer Science And Electronics Engineering (CSEE), Seek Digital Library, March 2014,pp.192-202. [29] J. Binkley, et al., Authenticated ad hoc routing at the link layer for mobile systems, Wireless Networks,vol.7, no2, pp.139 145, 2001. [30] S. Banerjee, A. Majumdar, H. N. Saha and R. Dey Modified Ant Colony Optimization (ACO) based routing protocol for MANET, in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015, pp. 1-7. [31] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, Energy Efficient Administrator Based Secured Routing in MANET, in proc. of International Conference on Computer Science, Engineering & Applications (ICCSEA),vol.167, May2012, pp. 659-672. [32] H. N. Saha, R. Singh, D. Bhattacharyya and P. K. Banerjee, An Administrator and Fidelity Based Secure Routing Protocol in MANET," Journal of Computing and Information Technology (CIT), Accepted. [33] A. Banerjee, D. Bose, A. Bhattacharyya, H. N. Saha and D. Bhattacharyya. Administrator and Trust Based Secure Routing in MANET, in proc. of Advances in Mobile Network, Communication and its Applications (MNCAPPS),IEEE Xplore, August 2012,pp.39-45. [34] P. Papadimitratos and Z. J. Haas, Secure Link State Routing for Mobile Ad Hoc Networks, in proc. of IEEE Workshop on Security and Assurance in Ad Hoc Networks, IEEE Press 27 31, January 2003, pp.379-383. [35] H. N. Saha,D. Bhattacharyya and P. K. Banerjee, "A Novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network, International Journal of Wireless & Mobile Networks (IJWMN),vol. 3, no. 5,AIRCC, pp.249-264, October 2011. [36] D. Choudhury, D. Kar, K. R. Biswas and H. N. Saha, Energy efficient routing in mobile ad-hoc networks, in proc. of 6th International Conference and Workshop on Computing and Communication (IEMCON -2015), IEEE Xplore Digital Library, October 2015, pp. 1-7. [37]H. N. Saha, K. Hazra, I. Mondal, M. Chakraborty and S. Sarkar, A Review on Intelligence Secure Routing Protocols in the Mobile Ad-hoc Networks, International Journal of Advanced Multidisciplinary Research(IJAMR),vol.1,no. 3, pp.01 13, December 2014. [38] H. N. Saha, D. Bhattacharyya and P. K. Banerjee, Minimized Overhead and Administrator Based Secure Routing Protocol, International Journal of Computer Applications(IJCA),vol.25,no. 9, Foundation of Computer Science, pp.22-35, July 2011. [39] H. N. Saha, R. Singh and D. Bhattacharyya, "Hardware Implementation of Fidelity based On- Demand Routing Protocol in MANETs, International Journal of Computer Network and Volume 5, Issue 1, January February 2016 Page 78

Information Security (IJCNIS), MECS, vol.7,no.8, pp. 39-48, July 2015. [40] S. Buchegger and J. Y. Le-Boudec, Performance analysis of the CONFIDANT protocol, in proc. of the 3rd ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2002), 2002, pp.226 236. AUTHOR He completed B-Tech from West Bengal University of Technology, India on Computer Science Engineering and Technology from CSET and completed M.Tech form West Bengal University of Technology, India on Computer Science Engineering and Technology from Institute of Engg & Tech, Kolkata. His area of interests is Wireless sensor networks, Data Mining, Image Processing. Himadri Nath Saha has completed his Bachelor of Engineering from Jadavpur University and has received his Master of Engineering from Indian Institute of Engineering, Science and Technology. After completing his Master of Business Administration he has completed his PhD in Engineering from Jadavpur University. Volume 5, Issue 1, January February 2016 Page 79