ArticlePDF Available

Secure Routing Protocols for Mobile Ad-Hoc Network (MANETs) –A Review

Authors:
  • SNEC, Calcutta University

Abstract

Mobile Ad-hoc network (MANET) is a self configuring, multi hop wireless network. Security in mobile ADHOC network is a big challenge because there is no centralized authority which can supervise the individual nodes operating in the network. The attacks can come from inside the network and also from the outside. This article surveys classifies the secure routing protocol in MANET, and also discussing presently proposed method of mitigating those attack. In the routing protocol of the MANET while forwarding data packets to other nodes, some intermediate node extract useful information packets and can't forward the packet to the next node. Some node may modify the content of packets during the data transmission session. So that any one node can manipulate the original data.
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 1, January - February 2016 ISSN 2278-6856
Volume 5, Issue 1, January – February 2016 Page 74
Abstract: Mobile Ad-hoc network (MANET) is a self
configuring, multi hop wireless network. Security in mobile
ADHOC network is a big challenge because there is no
centralized authority which can supervise the individual nodes
operating in the network. The attacks can come from inside
the network and also from the outside. This article surveys
classifies the secure routing protocol in MANET, and also
discussing presently proposed method of mitigating those
attack. In the routing protocol of the MANET while
forwarding data packets to other nodes, some intermediate
node extract useful information packets and can’t forward the
packet to the next node. Some node may modify the content of
packets during the data transmission session. So that any one
node can manipulate the original data.
Keywords: Ad-hoc Network, Routing, Security, Attacks,
MANET.
1. INTRODUCTION
A mobile ad-hoc network (MANET) consist of a set of
mobile hosts that carry out basic networking functions like
packet forwarding, routing etc. without the help of an
established infrastructure. Nodes of an ad-hoc network
rely on one to another in forwarding a packet to its
destination, due to the limited range of each mobile host’s
wireless transmissions. Security in MANET is an essential
component for basic network functions like packet
forwarding and routing [1,2].
Fig. 1 Mobile ad-hoc network
Network operations can be easily threatened if
communications are not embedded into basic network
functions at the early stages of their design. Routing
network using dedicated nodes to support basic functions
like packet forwarding, routing, and network
management, in ad-hoc networks those functions are
carried out by all available nodes. This is very difficult for
the core of the security problems specific to ad-hoc
networks. As opposed to dedicated nodes of a classical
network, the nodes of an ad hoc network cannot be trusted
for the correct execution of critical network functions. In
wireless network there is a high demand for security. [3,4]
The malleable behavior our wireless routing protocol
wireless routing network focused of attack of malicious
agent. The remaining paper is organized as follows.
Section 2 describes different routing protocol for MANET.
Section 3 describes vulnerabilities on routing
protocol Section 4 defines different secure routing
protocols and finally conclusion.
2. DIFFERENT ROUTING PROTOCOL FOR MANET
In MANET there are different types of routing protocols
for routing the packets. Each routing has own rule to
packet transfer method. In mobile ad-hoc network in
different circumstances different protocol are use, like (1)
Proactive Protocol (2) Reactive protocol (3) Hybrid
protocol
Fig. 2: MANET Routing Protocols
2.1 Proactive Protocol
In this routing protocol [4,5] network have unique
routing table for send the data packets and want to
establish connection to other nodes in the network. This
protocol one type of demand-based operation which utilize
network order to energy and bandwidth more efficiently.
Pattern on a demand basis rather than maintaining routing
between all nodes at all time. This is the flip-side of
Secure Routing Protocols for Mobile Ad-Hoc
Network (MANETs) –A Review
Ratul Dey1, Himadri Nath Saha2
1University of Engineering & Management,
Jaipur, Rajasthan – 303807, India
2Institute of Engineering & Management,
Y-12 Electronic Complex Sector-V, Saltlake Kolkata:- 700091
MANET Routing Protocol
Proactive Protocol Reactive protocol
Hybrid protocol
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 1, January - February 2016 ISSN 2278-6856
Volume 5, Issue 1, January – February 2016 Page 75
demand-based operation. In cases where the additional
latency which demand-based operations may be
unacceptable, if there are adequate bandwidth and energy
resources, proactive operations may be desirable in these
situations. [6,7,8]There are different type of proactive
protocol like, Destination-Sequenced Distance-Vector
(DSDV), Fisheye State Routing (FSR), Source Tree
Adaptive Routing (STAR), Optimized Link-State Routing
(OLSR), Cluster head gateway switch routing (CGSR),
Wireless routing protocol (WRP), Global state routing
(GSR).
2.2 Reactive protocol
Reactive protocol searches for the route in an on-demand
manner and set the link in order to send out and accept
the packet from a source node to destination node. [4, 7]
Route discovery process is used in on demand routing by
flooding the route request (RREQ) packets throughout the
network.
2.3 Hybrid protocol
It is a one special type protocol that separates the network
into several zones, which makes a hierarchical protocol as
the protocol ZHLS (zone-based hierarchical link state).
[9,10] This protocol which effectively combines the best
features of proactive and reactive routing protocol Hybrid
routing protocol is based on GPS (Global positioning
system), which allows each node to identify its physical
position before mapping an area with table to identify it to
which it belongs. Reactive protocols obtain the necessary
route when it is required, by using route discovery process.
In proactive protocols, nodes periodically exchange
information to maintain up-to-date routing information.
Hybrid routing protocols combine basic properties of both
approaches [11,12]. There are different type of Hybrid
protocol like, Zone routing protocol (ZRP), Zone-based
hierarchical link state routing protocol.
3. VULNERABILITIES ON ROUTING
PROTOCOL
Presently there are a wide variety of routing protocols, but
these protocols are not secured and face many attacks
[13,14], which gives rise to the vulnerability in the
network and might highly affect the efficiency of the
system. In mobile ad-hoc network any node can affect by
the different type of attacks. Mainly in MANET there are
two type of attack 1) Data traffic attack. 2) Control traffic
attack. In data traffic attack data packets are affected like,
Black hole attack, Cooperative Black hole attack, Grey-
hole attack, Jellyfish attack etc. In control traffic attack
control packets are affected, like Worm-hole attack, Hello
flood attack, Bogus registration attack, Rushing attack,
Sybil attack and Blackmail attack etc.
3.1 Data Traffic Attack:
3.1.1 Black hole attack:
In this attack a malicious node acts like a Black hole, [15]
dropping all data packets passing through it as like matter
and energy disappear from the path in a black hole. If the
attacking node is a connected node of two networks then it
totally separated as the two networks.
3.1.2 Cooperative black hole attack
This attack is similar to Black-Hole attack, but more than
one malicious node tries to disrupt the network at the
same time. It is one of the most critical attack and can
totally disrupt the operation of an Ad Hoc network[16].
Mostly the only solution becomes finding alternating route
to the destination, if at all exists.
3.1.3 Grey-hole attack
It too drops data packets, but node’s malicious activity is
limited to certain conditions or trigger. Two most
common type of behavior [17].
3.1.3.1 Node dependent attack drops data packets
destined towards a certain victim node or coming from
certain node, [18] while for other nodes it behaves
normally by routing data packets to the destination nodes
correctly.
3.1.3.2 Time dependent attack [19] drops data packets
based on some predetermined/trigger time while behaving
normally during the other instances.
3.1.4 Jellyfish attack
In this attack instead of blindly dropping the data packets,
it delays them before finally delivering them. It
manipulate the order of packets according to they are
received and sends it in random order [17,19]. This
disrupts the normal flow control mechanism used by
nodes for reliable transmission. Jellyfish attack can result
in significant end to end delay so there degrading QoS.
3.2 Control Traffic Attack
3.2.1 Wormhole attack
If link become the lowest path to the destination then
these malicious node always chosen, while sending path to
the direction. The wormhole attack is possible even if the
attacker has not compromised any hosts, and even if all
communication provides authenticity and confidentiality
[20]. In the wormhole attack, an attacker records data
packet at one location in the network, tunnels them to
another location, and retransmits them there into the
network. The wormhole attack is a serious threat in many
ad hoc network routing protocols. The wormhole attack
can done by a single node and it connect more than one
node as a worm hole link.
3.2.2 Hello flood attack
In this attack every node sent their packets towards this
node hopping to the better route destination. Node
broadcast a single high power transmitter to all it’s
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 1, January - February 2016 ISSN 2278-6856
Volume 5, Issue 1, January – February 2016 Page 76
neighbor [21]. Then attacker node not generate any traffic,
so the basis of performance node take the packet and
perform as selective replay attack.
3.2.3 Bogus registration
In bogus registration attack, attacker distinguish it self as
a node and generate wrong information to the neighbor
[21,22]. When packet transmitted then disturb the
neighbor nodes.
3.2.4 Rushing attack
In this mobile ad-hoc network each node before
transmitting data first set the path source to destination.
Sender node broadcast route request and neighbor node
route reply with proper routing information, and again
new selected node doing same method [22]. Rushing
attack quickly forward with a broadcast massage to the
neighbor so, when actual request come neighbor node just
discard the request, due to previous request accept.
3.2.5 Sybil attack
Sybil attack shows the fake multiple identities, show
multiple node in the networks [23]. So one single node
can assume as the multiple nodes and can hamper
multiple nodes at a time.
3.2.6 Blackmail attack
In the blackmail attack attacker nodes accused an innocent
node as harmful node [24]. When the routing table try to
identify perfect node according to the vote then if attacker
node in sufficient number of those MANET it can give the
wrong information according to the path.
4. DIFFERENT SECURE ROUTING
PROTOCOLS
For the secure routing protocol first need proper
authentication need to digital signature of each and every
authenticated nodes [25,26]. It also need to mutable
information of the control packets. It also often
complemented with the use of one-way hash functions.
Identify wormhole and the tunnel [27,28]. These routing
schemes provide authentication services which guard
against modification and replaying of routing control
messages and uses different cryptographic primitives for
providing secure routing.
4.1 Basic Routing Protocols
This protocol maintained by the originating node hashing
the messages and signing the resulted message digest,
which is verified by the recipients of a route request, by
computing the hash of a message using the agreed upon
hash function [29,30]. The advantage is that the protocol
can combat external attacks by checking for the
authenticity. The advantage of this protocol is that it
extends the ICMP router discovery packet format to
include the MAC and IP address of the sender, and
authentication information that can be used to verify the
broadcast beacon [31,32]. But the disadvantage of it is that
it requires nodes to have shared secret keys for generating
message authentication codes which are used to
authenticate the routing control messages and the scheme
is based on the assumption that the nodes in the network
mutually trust each other and it employs public key
cryptography for providing the security services.
4.2 Trust based Routing Protocols
Trust is a value that can calculated on the basis of nodes
action when it needed. Trust used to prevent from various
attacks like wormhole, black-hole, Dos, selfish attack
etc. Trust can be implemented in various ways such
as by reputation, from opinion of nodes etc. This
routing security schemes which fall in this category assign
quantitative values to the nodes in the network, based on
observed behavior of the nodes in question. The trust
values are then used as additional metrics for the routing
protocols [33,34]. The advantage is that it is robust
against individual attackers and capable of adjusting its
scope between local and network wide topology discovery.
It can also operate well in networks where the topology
and membership is changing very frequently.
4.3 Incentive based Routing Protocols
In ad hoc networks, devices have to cooperate.
Autonomous devices tend to abstain from cooperation.
Incentive schemes have been proposed as a means of
fostering cooperation under these circumstances. In order
to work effectively, incentive schemes need to be carefully
tailored to the characteristics of the cooperation protocol
they should support [16,35,36]. These routing schemes
implemented using credits that are given to nodes that
cooperate and forward packets. In turn network services
such as routing is provided only to those nodes that have
good credit. If a node at an unfavorable location
may not get enough packets to forward and thus
may never be able to get credits to forward its
own packets.
4.4 Detection and isolation based secure routing
scheme
This protocol can detects flooding, black hole, gray hole,
wormhole and blackmail attacks. On detection the
protocol takes immediate actions to blacklist these nodes
from the network, thereby decreasing the number of
malicious nodes in a network, hence improving the other
QoS parameters [37,38]. This protocol detects and isolates
misbehaving nodes in MANET. It is an enhancement of
DSR routing and based on selection of selfish and
unselfish nodes. The advantage is that the trust and
routing calculation process is evaluated by experience,
observation and behavior of other nodes, present in the
network [39,40]. This protocol can effectively detect
selfish nodes and isolate wormhole nodes that drop
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 1, January - February 2016 ISSN 2278-6856
Volume 5, Issue 1, January – February 2016 Page 77
packets.
5. CONCLUSION
From extensive studies on existing secure MANET
routing protocols, it has been observed that these protocols
do not adequately mitigate attacks by misbehaving nodes
which not only modify packets but also selectively drop
some or all the packets. These misbehaving nodes cause
various network communication problems. These studies
have finally motivated us to search for an alternative
design towards more efficient, secure routing protocols for
MANET to be used in adversarial environment.
REFERENCES
[1] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields. “A
Secure Routing Protocol for Ad Hoc Networks” in
proc. of Network Protocols, 2002. Proceedings. 10th
IEEE International Conference, November -2002,
pp.78-87.
[2] H. N. Saha, A. Chattopadhyay and D. Sarkar
“Review on intelligent routing in MANET,” in proc.
of 6th International Conference and Workshop on
Computing and Communication (IEMCON -2015),
IEEE Xplore Digital Library, October 2015 , pp. 1-6.
[3] S. Banerjee, R. Nandi, R. Dey and H. N. Saha, “A
review on different Intrusion Detection Systems for
MANET and its vulnerabilities, ” in proc. of 6th
International Conference and Workshop on
Computing and Communication (IEMCON -2015),
IEEE Xplore Digital Library, October 2015 , pp. 1-7.
[4] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, B.
Banerjee, S. Mukherjee, R. Singh and D. Ghosh, “A
Review on MANET Routing Protocols and its
Vulnerabilities,” International Journal of Emerging
Trends & Technology in Computer Science
(IJETTCS),vol. 2, no. 6, pp. 252-262,November 2013.
[5] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, B.
Banerjee, S. Mukherjee, R. Singh and D. Ghosh, “A
Review on Attacks and Secure Routing Protocols in
Manet, ”International Journal of Innovative Research
and Review (JIRR) ,vol.1, no. 2, pp.12-36,December
2013.
[6] J. Mandaland H. N. Saha, “Modified Ant Colony
Based Routing Algorithm in MANET,” International
Journal of Computer & Organization trends
(IJCOT),vol..3, no.10, pp.473-477,November2013.
[7] S. K. Deb,H. N. Saha, D. Bhattacharyya and P. K.
Banerjee, “Modified Dynamic On-Demand Routing
Protocol, ”International Journal of Emerging Trends
and Technology in Computer Science (IJETTCS),
vol. 3,no. 2, pp.139-144, March 2014.
[8] W. Sarkar, H. N. Saha and A. Ghosh, “A Greedy
Methodology to Solve Travelling Salesperson
Problem Using Ant Colony Optimization”
International Journal of Science and Research (IJSR),
Vol. 3 No. 7, July 2014.
[9] K. Roy and H. N. Saha, “Restricted Hoping Routing
Protocol,” in proc. of International Conference on
Computer Application (ICCA), December 2010,
pp.281-290.
[10] K. Chakraborty, A. Sengupta and H. N. Saha,
“Energy Efficiency in Wireless Network Using
Modified Distributed Efficient Clustering Approach,
”in proc. of International Conference on Computer
Science and Information Technology
(CCSIT),Springer, vol. 132, Part II, January 2011,
pp.215-222.
[11] H. N. Saha, D. Bhattacharyya, and P. K.
Banerjee, “Modified Fidelity Based On-Demand
Secure (MFBOD) Routing Protocol in Mobile Ad hoc
Network,” International Journal of foundations of
computing and decision sciences (FCDS),De Grurter,
Vol.40, No. 4, pp.267–298, December 2015.
[12] H. N. Saha, R. Singh, D. Bhattacharyya and P. K.
Banerjee, “Implementation Of Personal Area Network
for Secure Routing in MANET by Using Low Cost
Hardware,” Turkish Journal Of Electrical
Engineering & Computer Sciences, pp.1-20, 2015.
[13] H. N. Saha, D. Bhattacharyya and P. K. Banerjee,"
Fidelity Index Based On Demand (FBOD) Secure
Routing In Mobile Ad hoc Network,” in proc. of
International Conference on Parallel Distributed
Computing Technologies and
Applications(PDCTA),Springer,vol.203,Part-II,
September 2011, pp.615-627.
[14] H. N. Saha, D. Bhattacharyya and P. K. Banerjee,
“Fidelity Based On-Demand Secure Routing
(FBOD)in Mobile Ad-hoc Networks,” International
Journal of Advanced Computer Science and
Applications(IJACSA), Special No. on Wireless &
Mobile Networks, SAI, pp.19– 25,August 2011.
[15] H. N. Saha,D. Bhattacharyya and P. K. Banerjee,
“Different Types of Attacks Mitigation in Mobile Ad
Hoc Networks Using Cellular Automata,” in proc. of
International Conference on Computer Science and
Information Technology(CCSIT),
Springer,vol.84,part-1, 2012, pp.203-213.
[16] H. N. Saha,D. Bhattacharyya and P. K. Banerjee,
“A Priority Based Protocol for Mitigating Different
Attacks in Mobile Ad Hoc Networks,” International
Journal for Computer Science and
Communication(IJCSC),vol. 1, no.2, pp.299-302, July
2010.
[17] H. N. Saha, D. Bhattacharyya, P. K. Banerjee, A.
Bhattacharyya , A. Banerjee and D. Bose, “Study of
Different Attacks in MANET with its Detection &
Mitigation Schemes,” International Journal of
Advanced Engineering Technology (IJAET),vol.
3,no. 1, pp.383-389, January 2012.
[18] H. N. Saha, D. Bhattacharyya and P. K. Banerjee,
“A Novel Energy Efficient and Administrator Based
Secured Routing MANET,” International Journal of
Network Security & Its Applications (IJNSA), vol.4,
no.4, AIRCC, pp.73-92,July 2012.
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 1, January - February 2016 ISSN 2278-6856
Volume 5, Issue 1, January – February 2016 Page 78
[19] H. N. Saha,D. Bhattacharyya and P. K. Banerjee,
“A Novel Multi Point Relay Based Secure Routing in
MANET,” International Journal of Network Security
& Its Applications (IJNSA), AIRCC , vol. 4, no.6,
November 2012, pp.133-144.
[20] H. N. Saha,D. Bhattacharyya and P. K. Banerjee,
“A Distributed Administration Based Approach for
Detecting and Preventing Attacks in Mobile Ad Hoc
Networks,” International Journal of Scientific and
Engineering Research (IJSER),vol.2, no. 3, pp.101-
111, March 2011.
[21] Arpit Bansal, Navjot Kaur, Sunil Khullar, Dr.
R.P.S. Bedi. Performance Analysis of ZHLS-GF
Routing Protocol for MANETs through simulations.
In Research Cell: An International Journal of
Engineering Sciences ISSN: 2229-6913. Vol. 5 Dec.
2011.
[22] H. N. Saha, D. Bhattacharyya and P. K. Banerjee,
“A Novel Approach for Attacks Mitigation in Mobile
Ad Hoc Networks using Cellular Automata,
”International Journal of Ad hoc, Sensor &
Ubiquitous Computing (IJASUC),vol. 3, no.2,AIRCC,
pp.33-49, April 2012.
[23] H. N. Saha,D. Bhattacharyya and P. K. Banerjee,
“Semi-Centralised Multi Authenticated RSSI Based
Solution to Sybil Attack,” International Journal of
Computer Science and Emerging Technologies
(IJCSET), vol. 1, no. 4, pp.439-436, December 2010.
[24] L. Venkatraman and D. P. Agrawal, “An
optimized inter-router authentication scheme for ad
hoc networks,”in proc. of the Wireless, 2001, pp.129–
146.
[25] D. Bose, A. Banerjee, A. Bhattacharyya, H. N.
Saha, D. Bhattacharyya and P. K. Banerjee, “An
Efficient Approach to Secure Routing in MANET,” in
proc. of Advances in Computing and Information
Technology (ACITY), Springer,vol.176, July
2012,pp.765-776.
[26] H. N. Saha, D. Bhattacharyya, A. K.
Bandhyopadhyay and P. K. Banerjee, “Two-level
Secure Re-Routing(TSR) in Mobile Ad Hoc
Networks,” in proc. of Advances in Mobile Network,
Communication and its Applications (MNCAPPS),
IEEE xplore, August 2012, pp.119-122.
[27] H. N. Saha, D. Bhattacharyya and P. K. Banerjee,
“Secure Multipoint Relay Based Secure Routing in
MANET,” in proc. Of International Conference on
Computer Science, Engineering and Information
Technology (CCSEIT), ACM Digital Library ,
October 2012,pp.63-68.
[28] H. N. Saha, B. Banerjee, D. Bhattacharyya, D.
Ghosh, R. Singh and S. Mukherjee, “Different
Routing Protocols and Their Vulnerabilities and
Their Measures,”in proc. of International Conference
On Advances In Computer Science And Electronics
Engineering (CSEE), Seek Digital Library, March
2014,pp.192-202.
[29] J. Binkley, et al., “Authenticated ad hoc routing at
the link layer for mobile systems,” Wireless
Networks,vol.7, no2, pp.139–145, 2001.
[30] S. Banerjee, A. Majumdar, H. N. Saha and R. Dey
“Modified Ant Colony Optimization (ACO) based
routing protocol for MANET,” in proc. of 6th
International Conference and Workshop on
Computing and Communication (IEMCON -2015),
IEEE Xplore Digital Library, October 2015 , pp. 1-7.
[31] H. N. Saha,D. Bhattacharyya and P. K. Banerjee,
“Energy Efficient Administrator Based Secured
Routing in MANET,” in proc. of International
Conference on Computer Science, Engineering &
Applications (ICCSEA),vol.167, May2012, pp. 659-
672.
[32] H. N. Saha, R. Singh, D. Bhattacharyya and P. K.
Banerjee, “An Administrator and Fidelity Based
Secure Routing Protocol in MANET," Journal of
Computing and Information Technology (CIT),
Accepted.
[33] A. Banerjee, D. Bose, A. Bhattacharyya, H. N.
Saha and D. Bhattacharyya. “Administrator and Trust
Based Secure Routing in MANET,” in proc. of
Advances in Mobile Network, Communication and its
Applications (MNCAPPS),IEEE Xplore, August
2012,pp.39-45.
[34] P. Papadimitratos and Z. J. Haas, “Secure Link
State Routing for Mobile Ad Hoc Networks,” in proc.
of IEEE Workshop on Security and Assurance in Ad
Hoc Networks, IEEE Press 27–31, January 2003,
pp.379-383.
[35] H. N. Saha,D. Bhattacharyya and P. K. Banerjee,
"A Novel and Efficient Secured Routing Algorithm in
Mobile Ad hoc Network,” International Journal of
Wireless & Mobile Networks (IJWMN),vol. 3, no.
5,AIRCC, pp.249-264, October 2011.
[36] D. Choudhury, D. Kar, K. R. Biswas and H. N.
Saha, “Energy efficient routing in mobile ad-hoc
networks , in proc. of 6th International Conference
and Workshop on Computing and Communication
(IEMCON -2015), IEEE Xplore Digital Library,
October 2015 , pp. 1-7.
[37]H. N. Saha, K. Hazra, I. Mondal, M. Chakraborty
and S. Sarkar, “A Review on Intelligence Secure
Routing Protocols in the Mobile Ad-hoc Networks,”
International Journal of Advanced Multidisciplinary
Research(IJAMR),vol.1,no. 3, pp.01–13, December
2014.
[38] H. N. Saha, D. Bhattacharyya and P. K. Banerjee,
“Minimized Overhead and Administrator Based
Secure Routing Protocol,” International Journal of
Computer Applications(IJCA),vol.25,no. 9,
Foundation of Computer Science, pp.22-35, July
2011.
[39] H. N. Saha, R. Singh and D. Bhattacharyya,
"Hardware Implementation of Fidelity based On-
Demand Routing Protocol in MANETs,”
International Journal of Computer Network and
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 1, January - February 2016 ISSN 2278-6856
Volume 5, Issue 1, January – February 2016 Page 79
Information Security (IJCNIS), MECS, vol.7,no.8, pp.
39-48, July 2015.
[40] S. Buchegger and J. Y. Le-Boudec, “Performance
analysis of the CONFIDANT protocol,” in proc. of
the 3rd ACM international symposium on Mobile ad
hoc networking and computing (MobiHoc’2002),
2002, pp.226–236.
AUTHOR
He completed B-Tech from West Bengal University
of Technology, India on Computer Science
Engineering and Technology from CSET and
completed M.Tech form West Bengal University of
Technology, India on Computer Science
Engineering and Technology from Institute of Engg & Tech,
Kolkata. His area of interests is Wireless sensor networks, Data
Mining, Image Processing.
Himadri Nath Saha has completed his Bachelor
of Engineering from Jadavpur University and has
received his Master of Engineering from Indian
Institute of Engineering, Science and Technology.
After completing his Master of Business
Administration he has completed his PhD in Engineering from
Jadavpur University.
... Hybrid method was developed in [9] for minimizing energy consumption and execution time through multipath routing in MANET. Different routing protocol was designed in [10] for identifying malicious activities during secured data transmission in MANET. With the above considerations, main contribution of the research work is arranged as follows. ...
Article
A Mobile Ad-Hoc Network(MANET) is a structure-less network where the mobile nodes randomly moved in any direction within the transmission range of the network. Due to this mobility, wide range of intrusion occurs in MANET. Therefore, Intrusion Detection Systems (IDS) are significant in MANETs to identify the malicious behavior. In order to improve the secured data communication an efficient Quantum Phase Shift Energy Conserved Data Security (QPSEC-DS) technique is introduced. The Quantum Phase Shift (QPS) technique is used for ensuring the security during the data transmission from sender to receiver in MANET. Initially, the quantum based approach is used to encrypt the information using QPS at the sender through secret key distribution. The receiver side also performs the same QPS, and then the encrypted bit is received successfully. This in turns attains the secured packet transmission without any malicious node in the MANET. Based on the phase shifting, the energy conservation between the sender and receiver is measured for transmitting the data packet using QPSEC-DS technique. Also, the enhanced Dynamic Source Routing (DSR) protocol is applied in QPSEC-DS technique is implemented to improve the energy management and secured data communication between the source and destination in an efficient manner. The QPSEC-DS technique conducts the simulations work on parameters including packet delivery ratio, energy consumption, communication overhead and end to end delay.
Article
Full-text available
The proliferation of mobile computing and communication devices are driving a revolutionary change in our information society. Among all the applications and services run by mobile devices, network connections and corresponding data services are without doubt the most demanded services by mobile users. A MANET is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires, which makes it ideal for the present scenario. But, due to lack of any centralized infrastructure and access to trusted authorities, the security in MANET poses a huge threat. The prominent routing protocols we know are generally designed for environments where the nodes within a network are non-malicious. Due to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb its development. We propose a protocol for MANETs named “Administrator and Fidelity Based Secure Routing Protocol” (AFSR), which ensures secure routing through the network: by electing an Administrator node on the basis of Willingness and Fidelity, after which a node only communicates to that secure Admin node. This selection of secured admin nodes results in mitigation of various threats. We have evaluated our proposed protocol by simulating and comparing in GloMoSim.
Conference Paper
Full-text available
A mobile ad-hoc network (MANET) is a collection of mobile nodes which communicate over radio. These kinds of networks are very flexible, thus they do not require any existing infrastructure or central administration. Therefore, mobile ad-hoc networks are suitable for temporary communication links. The biggest challenge in this kind of networks is to find a path between the communication end points, which is aggravated through the node mobility. In this paper we present a new on-demand power-balanced routing algorithm for mobile, multi-hop ad-hoc networks. The protocol is based on swarm intelligence and especially on the ant colony based meta heuristic. These approaches try to map the solution capability of swarms to mathematical and engineering problems. The proposed routing protocol is highly adaptive, efficient and scalable. The main goal in the design of the protocol is to reduce the overhead for routing. Our simulation results show that the proposed routing protocol is significantly different from existing protocols.
Article
Full-text available
Travelling Salesperson Problem is a problem where the user has to visit all the cities by using the shortest distance. It is an NP-hard problem in combinatorial optimization, important in operations research and theoretical computer science. TSP is a special case of the travelling purchaser problem .By representing this problem in graphical method we see that it is nothing but a complete graph where user have to visit all the nodes using the shortest distance. Scientist have found that biological ant have an excellent behavior by which they always choose the shortest way between the source and the destination although there are several ways between them. Using this behavior of the biological ant we describe an artificial ant colony capable of solving the traveling salesman problem (TSP). Ants of the artificial colony are able to generate successively shorter feasible tours by using information accumulated in the form of a pheromone trail deposited on the edges of the TSP graph. In this paper we have proposed a new greedy method by which TSP can be solved.
Article
Full-text available
Presently, mobile ad hoc networks (MANETs) are being used extensively in the defense, private, domestic, etc. fields and each of these emulates a personal area network (PAN). A MANET does not require any infrastructure; moreover, it can behave as a mobile network. These features have boosted the popularity of MANETs in the community. As more and more fields become dependent on MANETs, the system needs to be more energy aware and low cost. To commercialize MANETs, the routing protocols need to be lightweight, secure, and energy efficient, and the hardware on which it is to be implemented should be low cost at the same time. In this paper, we have proposed a lightweight, energy aware, secure routing model for MANETs, which has been implemented on low-cost hardware. Our model uses fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that secure neighbor or not. It also uses packets like Report and Recommendation that help the protocol to detect and eliminate the malicious nodes from the network. To make the protocol energy aware we have formulated new battery thresholds, so that the battery can be monitored and losses can be minimized. To observe the results we implement this protocol in hardware, on the Arduino platform, which is a scalable, reliable, cheap, and open source. We observe that our protocol exhibits high packet delivery fraction, low normalize routing load, and low end to end delay, compared to existing secure routing protocols.
Article
Full-text available
MANET (mobile ad-hoc network) is a network model which is infrastructure-less. It consists of mobile networks which are free to move and the communication between them are wireless. Due to lack of any centralized infrastructure and access to trusted authorities, the security in MANET poses a huge threat. The conventional method of certificate revocation is not applicable in such mobile communication. The prominent routing protocols we know are generally designed for non-adversarial environments, where the nodes within a network are non-malicious, unselfish and well-behaving. The reality however is that in any network, there are likely to be malicious, selfish or miss-behaving nodes which have intentions of disrupting the routing protocol. Owing to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. In this paper we make a review of all the threats faced by the commonly known routing protocols, and classify these attacks. Brief descriptions of these attacks are given, mainly emphasizing on the network level attacks. Further we briefly review the existing secured MANET routing protocols to tackle these attacks and discuss their efficiency and shortcomings.
Article
Full-text available
Mobile Ad-hoc Network (MANET) is a wireless network model which is infrastructure-less and consists of mobile nodes which are free to move. Since MANET does not have any centralized base station and is robust in nature, it is a major center of attraction both in telecommunication industries as well as academics. Due to the open nature, lack of any centralized infrastructure and access to trusted authorities, the security in MANET poses a huge threat. Also energy constraint is another factor to be considered and thus, routing in MANET is a big challenge this paper we have discussed in depth about the various on-demand, proactive and hybrid routing protocols in MANET. We have also discussed and compared their vulnerabilities in form of attacks.
Article
Full-text available
Security in routing is a challenging issue in mobile ad-hoc (MANET) network because of itsopen nature, infrastructure less property, mobility and energy constraints. Messages typically roam inmulti-hopped fashion and nodes may be powered by limited energy source and with limited physicalsecurity. So we proposed a new scheme which is significantly different from others available schemes toprovide security during routing in mobile ad hoc networks. In this paper, our proposed scheme, SecureMultipoint Relay based Routing in MANET (SMRR) provides routing based on trust, which is an integervalue that helps to select Multipoint Relay (administrator) inside the network for routing. We have alsoimplemented the message confidentiality and integrity in our proposed scheme. Our simulation resultsshow the robustness, reliability and trustworthiness of our scheme.
Chapter
The lack of static infrastructure causes several issues in mobile Ad Hoc network, such as energy utilization, node authentication and secure routing. In this paper we propose a new scheme for energy efficient secure routing of data packets in MANET. This approach will reduce the computational overhead to make it more energy efficient than existing schemes. As there is no stationary infrastructure,each node in MANET acts a router that forwards data packets to other nodes. Therefore selection of effective, suitable, adaptive and robust routing scheme is of utmost importance. We have reduced the amount of network activity for each node required to route a data packet. This leads to lesser wastage of energy and increases security.Our simulation results will show how this is energy efficient and secure. Finally we have discussed how this scheme prevents various attacks which may jeopardize any wireless network.
Article
Mobile ad hoc networks (MANETs) are infrastructure - less, multi - hop, wireless mobile networks formed spontaneously . It refers to any set of networks where all devices have equal status on a network and are free to associate with any other ad hoc network dev ice in link range. The ad hoc network does not rely on a pre - existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data to other n odes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity. Ad hoc networks are useful when infrastructure is not available, is impractical, or is expensive. It is mainly used for military applications, rescue and for home networking. Many conventional routing algorithms have been proposed for MANETs. An emerging area that has recently captured much attention in network routing researches is Swarm Intelligence (SI). Swarm intelligence deals with natural a nd artificial systems composed of many individuals that coordinate using decentralized control and self - organization. In particular, it focuses on the collective behaviors that result from the local interactions of the individuals with each other and with their environment. Examples of systems studied by swarm intelligence are colonies of ants and termites, schools of fish, flocks of birds, herds of land animals. In this paper we explore the SI approach to address routing problem in ad hoc networks with the goal to reduce routing overheads .