ArticlePDF Available

Study on Reliable and Secure Routing Protocols on Manet

Authors:

Abstract and Figures

Objectives: This survey article intent presents knowledge into the security execution issues related to steering in wireless networking like MANET's (Mobile Ad hoc Networks). Findings: The mobile adhoc networks are exposed to attacks at all the layers especially at the network layer. This study specially provides a set of solutions for the issues of various attacks like attacks on modifications, impersonation attacks, fabrication and rushing attacks. A few methodologies are analysed for prevention, detection and reaction on various attacks by malicious nodes. The study of this article has examined the methodologies meant for fathoming the implementation issues like, changes in topology, vitality utilization of stations, delay, throughput, transmit time, packet transmission ratio, systems or nodes security and administration. Conclusion: This article presents a comparison table specifying that every protocol provides security only to a limited access. Thus, there is still a prerequisite of more secured belief that can deal with the diverse asking for necessities like reliable protocols for security issues of MANET.
Content may be subject to copyright.
Indian Journal of Science and Technology, Vol 9(14), DOI: 10.17485/ijst/2016/v9i14/84433, April 2016
ISSN (Print) : 0974-6846
ISSN (Online) : 0974-5645
* Author for correspondence
1. Introduction
e security plays an important role when considered
for communication networks of wired and wireless.
e mobile adhoc networks laying its face down to
dissimilar security attacks due to lack of decentralized
administration. e achievement of mobile adhoc
network (MANET) mainly depends on condence of
the users in security aspects. e severity of the attack
depends on midway distance of the malicious nodes
between the nodes, dropping of packets, misrouting of
packets, providing false information etc. Together the
scalability and mobility of the nodes shows the impact on
the routing protocols with respect to security issues. All
routing protocol requires protected data transmission.
e various security desires of mobile adhoc networks
are analogous like infrastructure less wireless networks
or wired networks. On the other hand, the MANETs
characteristics introduce various challenges and
opportunities to achieve secure goals9,12,15, namely
condentiality, integrity, authentication, access control,
availability and non-repudiation which are dened as
follows:
Authentication: Authentication1 safeguards the
communication or data transmission which is carried no
more than by the endorsed nodes. e suspicious node
which is demonstrating as a authorised node in the region
of the network which does not hold proper authentication
and that can badly distress the transfer of data between
the nodes.
Availability: Availability is dened as providing or
processing the various services even the attacks are in
existence. It is anxious to state that the various network
Abstract
Objectives: This survey article intent presents knowledge into the security execution issues related to steering in wireless
networking like MANET’s (Mobile Ad hoc Networks). Findings: The mobile adhoc networks are exposed to attacks at all
the layers especially at the network layer. This study specially provides a set of solutions for the issues of various attacks
    
  
         
      Conclusion:
     
there is still a prerequisite of more secured belief that can deal with the diverse asking for necessities like reliable protocols
for security issues of MANET.
Keywords:  
Study on Reliable and Secure Routing
Protocols on Manet
K. Vijayakumar1*and K. Somasundaram2
1Department of Computer Science Engineering, Vignan Institute of Engineering for Women,
Karpagam University, Visakhapatnam, Andhra Pradesh, India;
vijay_kollati@yahoo.co.in
2Department of Computer Science and Engineering, Vel Tech High Tech Dr. RR Dr. SR Engineering College,
#60, Avadi - Vel Tech Road, Vel Nagar, Avadi, Chennai - 600062, Tamilnadu, India;
soms72@.yahoo.com
Vol 9 (14) | April 2016 | www.indjst.org Indian Journal of Science and Technology
2
Study on Reliable and Secure Routing Protocols on Manet
services should be oered each and every time they are
required. e systems conrming the availability in
MANET’s must take necessary care of numerous attacks
like services denial attacks, energy consuming attacks,
and also malfunction of nodes.
Condentiality: Condentiality1,12 is used to safeguards
that the intended party only is being provided with the
information. e remaining nodes which are participating
during transmission except the sender, receiver can
only read the information. By applying data encryption
techniques we can attain high security.
Integrity: e non variation of the data’s originality while
transmission by any other malicious node in the network
can be conrmed and stated by using Integrity.
Non-Repudiation: is feature non disclaimer guarantees
that any node that sends and receives data cannot reject a
transmitted message15. is factor is also used in support
to identify and separate the node which is compromised
in the network.
In addition to the previous specied problems there are
certain other problems also need to be considered to
provide security like:
Collaboration and Fairness
Location Condentiality
Trac diversion avoidance
2. Security Attacks on Manets
In communication networks where there is no
infrastructure, security inspection is a great deal as every
hub is allowed to pass through in several heading such
that the concentrated protection in such systems is no
more available. Assaults on such type of network where
there is mobility, are comprehensively partitioned into
two noteworthy classications:
Active Attacks: In this kind of attacks4,15 the attackers try
to agitate the original functionality of the transmitting
and communicating devices in the network. is task is
carried by evaluating the information and changing the
packets which contain the information, denial of neither
services13 nor changing the path desired for routing by
modifying the route specifying path, count of hops in
a path etc. ese kinds of active attacks can easily be
identied and detected when compared with the other
opposite attacks called Inactive (Passive) attacks.
Passive Attacks: ese passive attacks4,15 can be stated as
more dangerous when compared to active attacks because
it will not change or vary the normal behaviour of network
whereas the attackers attempt to pay attention silently
or reclaims the important information available with
data packets transmitted. It is very dicult to identify
this behaviour of passive attack. ese kinds of passive
assaults26 are broadly divided into four main categories is
shown in. Figure 1.
Figure 1. Various Types of Attacks on MANET.
K. Vijayakumar and K. Somasundaram
Vol 9 (14) | April 2016 | www.indjst.org Indian Journal of Science and Technology 3
2.1 Attacks using Modication
Redirection with the help of altering the route sequence
number: To determine the superlative route between the
sources to the destination, the stations should continually
depends on various parameters like sequence number,
delay, hop count etc. ese parameters should be low
in value which species the chosen path is the best. In
this kind of attack, the trac in the network is under
misleading by the suspicious station by varying the count
of hops between the nodes to a least assessment than the
earlier least value.
Hop count alteration by redirecting: In these attacks the
hop count parameter is changed to a smaller value and
the packet trac is diverted towards the malicious node
which leads to a false path.
Source route alteration and causing attacks by DoS
(Denial of Service): e attacks by denial of service are
occurred by the entire demolition of the routing function
by denial of service. In this the attacker aects in such a
way that it neither drops the network trac nor it redirects
the data packets to an unknown destination or mislead to
a lengthy path to destination to create unwanted delay in
transmission.
Tunneling: ese are another type of attacks where more
number of nodes may co-ordinated to encapsulate and
then the messages are switched over among them through
active routing paths of data. By this event there is a chance
for a single or more than one node to short circuit the
regular stream of data ow by providing a false count for
the set of connections which is guarded by two colliding
attackers.
2.2 Attacks by Impersonation
Impersonation attacks can be caused by “Spoong. In this
kind of attacks, malicious node will alter the IP or MAC
address for all the data packets departing from the node
and the address of one node can also be used by another
node. With the help of spoong, the malicious node be
able to modify the network topology or separate some
nodes from the remaining network.
2.3 Attacks Caused by Fabrication
Fabricating route error message: ese are the attacks
in routing protocol like on-demand, which is further
exceptional, which utilises link preservation to reclaim
the damaged path. At whatever point a node alters its
present location, the closest node proliferates mistake
information to alternate nodes expressing that this
specic way is no more accessible. By sending this kind
of error information, any station can be eortlessly le.
Broadcasting erroneous routes: In this category of
incursions, the attackers accomplish the path information
from the header of data packet and modify the routing
link. is will modify the path accumulation of nearby
node.
Attacks by overow of Routing table: In this type of
assaults, where attacker performs to develop paths to
other than active links. When the sucient paths have
been developed, new paths can be no more registered in
the routing cache.
2.4 Rushing Attacks
ese categories of incursion are also takes place in
routing protocol like on-demand. In this a request packet
for link establishment is send to determine the link
to the sink node. is activity is taken as advantage by
nodes to perform rushing attacks4 by sending the RREQ
message more regularly when compared with remaining
stations such that, the path together with the adversary is
identied.
3. Security Routing Protocols of
Manet
ere are dierent security conventions for MANET’s
which can be for the most part characterized into two
noteworthy classications namely prevention and
reaction upon detection.
Prevention: In this category, the attacking stations are
blocked in order not to start any further movements
by the protocols involved in routing. is method
requires encoding techniques to validate the integrity,
condentiality, non-repudiation of routing information.
Reaction upon Detection: Detecting attacks and Reaction
upon detection attacks procedure as the name implies will
nd any malignant node or movement of any suspicious
Vol 9 (14) | April 2016 | www.indjst.org Indian Journal of Science and Technology
4
Study on Reliable and Secure Routing Protocols on Manet
station in the wired or wireless communicating network
and take necessary action to continue the appropriate
route in transmission of information in the network.
Based on the survey done on various protocols the
secure routing protocols26 can be categorised as shown in
Figure 2.
Instantly, the various routing protocols that concerned
in prevention of attacks schema are given in detail as:
3.1. Prevention of Attacks
3.1.1 Preventing by using Asymmetric
Cryptosystem
ARAN: An On-demand secure routing protocol, ARAN
(Authenticated Routing for Ad-hoc Network) is based
on the cryptographic certicates. ARAN utilizes a
preparatory cryptographic declaration process took aer
by end to end course verication procedure to acquire
secure path establishment.
is routing standard is a safe directing on-
interest directing convention taking into account the
cryptographic declarations. is convention
• In the preliminary certication process, the
certicates are issued by a condential armation
system, which conveys its public key to each and
every hub within the system. Each and every node in
the system is important to contain a public key and
its address is to be armed prior to taking part in the
communication and connecting to the network.
• e main aim of this end-to-end authentication is to
ensure the route discovery for reaching the intended
destination. e objective is that the source need to
check such that the destination intended was come to
or not. A digitally marked RDP (Resource Discovery
packet) starts broadcasting by the source hub. is
packet incorporates various parameters like address
of destination node, Ns a nonce, endorsement of the
starting hub, and current time. e current time and
the Nonce are available to counteract repeat assaults
and to distinguish looping and record its mark on the
packet. All the succeeding middle hubs will evacuate
the mark of the past hub, check it and ax their mark
on the packet. Similarly, along the reply packet (REP)
every hub annexes its mark before sending it to the
following hop. All the routes whether active or not
are being tracked by the nodes in order to maintain
the route. erefore if any inactive or broken node
receives a data, a blunder message indicating is
created and sent to the source hub.
Figure 2. Secure Routing Protocols.
K. Vijayakumar and K. Somasundaram
Vol 9 (14) | April 2016 | www.indjst.org Indian Journal of Science and Technology 5
3.1.2 Preventing by Using Symmetric Cryptosystem
SAR: SAR (Security Aware mobile Ad-hoc Routing)
protocol uses the metrics for security to obtain routing.
A security parameter is included within the RREQ data
packet in SAR. During the message sending or receiving,
nodes are required to have secret keys for decrypting3. If
any route is available with the required security parameter
a packet RREP is transmitted between the intermediate
station or the sink node to the source node. And a
shortest route is being marked for data forwarding in case
of dierent route is traced.
Secure Routing Protocol: is protocol uses symmetric
cryptography which is an additional routing protocol for
providing secure called Secure Routing Protocol (SRP)
which relays on route querying method. In this among the
source and destination node, a Security Association (SA)
is needed. is Security Association SA generates a key
which is normally used to perform the data encryption
as well as decryption with the help of these two nodes.
e SRP header is included with the base header and is
shown in Table 1. e packet RREQ species the output
of a key hashed function, QID a query identier and
QSEQ a query sequence number. e shared key, basic
routing protocol header and the IP header is taken by the
key hash function.
Table 1. SRP Packet header
IP HEADER
BASIC ROUTING PROTOCOL HEADER
TYPE RESERVED
QUERY IDENTIFIER (QID)
SEQUENCE NUMBER OF A QUERY (QSEQ)
MESSAGE AUTHENTICATION CODE (MAC)
e routing tables are being updated by the in-between
hubs on transmitting the query to the neighbour hubs. In
the event the query is dropped when their table of routing
has similar QID of the receiving node.
At the point when the receiver is achieved, the
receiver station will check for protection measurements
by assessing the message authentication code (MAC)-
key hash function. e secret key by validating, for the
source node it makes reply packet containing of route
from source to destination, QID, QSEQ. In the wake of
getting the reply packet, MAC is once again calculated by
the source node. Between the sender and the receiver we
have many routes. By using the route error message, in
this protocol route support is also additionally nished.
3.1.3 Preventing by using One-Way Hash Chain
SEAD: Secure Ecient Ad-hoc Distance Vector Routing
(SEAD) is based on Destination sequence distance vector
DSDV protocol which is a proactive and secured routing
protocol. e protocol SEAD is designed against the
modication and security attacks like Denial of Service
and attacks by unwanted resource consumption. In this
protocol, the data packet authenticity is been checked by
making use of hash chain method where the hash chain
value is taken for update the routing for transmitting.
Whenever an update of routing is received by a node, each
message entry authentication is veried. is protocol
SEAD eliminates looping by making use of destination
sequence number. e protocol SEAD protocol validates
update message of routing for the source by avoiding
loops which is being done with any one of the following
two mechanisms:
e SEAD convention likewise validates the avoiding
so as to wellspring of directing overhaul message circles
which is being nished with any of the accompanying two
systems:
• To employ broadcast authentication mechanisms,
in the adhoc networks between the nodes a clock
synchronization is being used.
• A shared secret key is provided between the node
pair.
Authentication of a routing update message between
the nodes i.e MAC (Message Authentication Code) is
provided by a secret key shared between the pair of nodes.
Ariadne: is protocol Ariadne is also one of the routing
protocols for security on-demand constructed with
the help of DSR for ad-hoc networks using symmetric
cryptography. is Ariadne protocol uses shared key for
authentication (MAC) between the nodes. is protocol
Ariadne working is stated in 3 ways as: At the point when
a hub (source hub) needs to communicate with whatever
other hub, it sends RREQ, a message for route request
which contains the source address, destination address,
an identier to nds the present route disclosure, a
measure of time called TESLA time interim representing
Vol 9 (14) | April 2016 | www.indjst.org Indian Journal of Science and Technology
6
Study on Reliable and Secure Routing Protocols on Manet
to the normal entry time of the request to the destination
hub and a hash chain. At the point when RREQ is
gotten, the intermediate hub checks the TESLA time
interim legitimacy. A one way hash facility is used in
order to check the authentication. In the event that the
information packet is a legal packet then the hub attaches
its own particular location in the rundown of hubs, by
replacing the hash chain with another one comprising of
its location in addition to the old one, and adds a MAC of
the entire packet to the MAC list. Finally, the hub which
is so called destination will veries each and every step of
the route by comparing the received hash and calculated
MAC hash.
3.1.4 Hybrid Approach
SLSP: e SLSP (Secure Link State Routing Protocol) is
utilized to safeguard the revelation and the dispersion
of link state information. is convention utilizes
asymmetric key to provide high security. Initially the
hubs that participate are distinguished based on the IP
addresses of their interfaces. Secure Link State Routing
Protocol can be normally given in three steps. ey are:
• Public Key Distribution (PKD): In this protocol the
central server is not used for key distribution. e
public key distribution (PKD) is normally carried
over between the nodes that are available within its
own surrounding area.
• Neighbour discovery: e neighbour nodes discovery
process is done by the process that periodically
the information about the Link state of node is
broadcasted with the help of Neighbour Lookup
Protocol (NLP). A packet with Hello message that
contains MAC address of sender and the network IP
address is broadcasted in the network. is kind of
messages was also signed. e malicious node or any
discrepancies in the network are recognised by the
help of NLP.
• Link State Updates (LSU): e packets of LSU
are recognized with the help of initiated nodes IP
address. A sequence number of 32-bit is present in
the LSU packet which is periodically updated. In
this protocol the LSU of the intermediate nodes will
authenticate the connected signature by means of a
public key which is formerly reserved at the time of
pubic key distribution phase. e nodes traversed
eld used in LSU is set to hashed hops traversed, the
TTL is decremented and at last the packet is again
broadcasted. ese SLSP nodes are going to maintain
a list of information like apriority ranking of their
proximity nodes which depends trac control
rate in order to maintain the secure of the packet
against denial of service attacks. For the lowest rate
generated LSU packets high priorities are used. is
behaviour facilitates the neighbours of determining
the malfunctioning nodes that overow higher rate
control packets tie up the success nature of the assault.
SAODV: is Secure Ad-hoc On-demand Distance
Vector Routing Protocoll (SAODV) protocol is depended
on demand routing protocol AODV2. is protocol works
with the help of asymmetric cryptography and also by
using hash chaining. e RREQ packet which is shown in
Table 2 is digitally signed by the node when it desires to
send a message, and transmits to the neighbour nodes. At
the point when the RREQ packet is gotten, intermediate
nodes authenticates before overhauling or making
an opposite route to the host by using cryptographic
techniques.
Table 2. SAODV Protocol Header
TYPE LENGTH HASH
FUNCTION
MAX HOP COUNT
TOP HASH
SIGNATURE
HASH
e hop count values are being certied in SAODV by
using Hash chains. A seed; a random value is developed
whenever a station wants to forward a RREP or RREQ
packet. It marks a Maximum Hop Count given to the TTL
(Time to live) value in the IP header. e seed is dened
as the signature extension of the Hash range. e Top
Hash range is set to the hashed seed and the Max Hop
Count periods. At whatever point a neighbour node gets a
RREQ or a RREP it conrms the count of hop by hashing
Max Hop Count - Hop Count times the Hash eld and
check whether the resultant worth is same as Top Hash
value. When the above said both values are dissimilar
from each other, then the node will drops the data packet
and a message showing error will be given by the nodes
for the broken links.
K. Vijayakumar and K. Somasundaram
Vol 9 (14) | April 2016 | www.indjst.org Indian Journal of Science and Technology 7
3.2 Detection and Reaction
e various protocols that are designed for Detection and
Reaction representation are:
3.2.1 Byzantine Algorithm
is Byzantine algorithm is specically implemented to
safeguard the network from Byzantine2,15 collapse which
includes change of packets, discarding data packets,
incursion made by self-interested or malignant nodes.
ere are three stages26 in dening Byzantine procedure
comprise as shown in Figure 3.
Figure 3. ree phases of Byzantine algorithm.
Route Discovery: Whenever a source hub needs to
forward the data, it imparts link request data which
contains address of source, address of destination, a weight
list, a sequence number and private key for conrmation
to its acquaintance. On acquiring the RREQ information
the hub on the node in transition manipulates its node list
for the entry of RREQ. In the event that there is no option,
it checks the secret key for validation and includes its list
and re-imparts it to dierent entities.
A route reply message (RREP) is generated on verifying
the secret key when the sink node reaches. On accepting
the RREP message, source hub approves the private key.
It additionally coordinates the internal connection and
available route. On the o chance that the received route
is superior to anything available route, then modify this
path in its route table.
Fault Detection: Fault detection process species, every
transitional hub mentioned as a probe node forwards
acknowledgement or acquaintance to sender hub for each
and every message which it receives. If more quantity of
unacknowledged messages moves beyond the verge value,
enrol of fault is done on the route.
Link Weight Management: e protocol at this phase,
manipulates the weight or load of the routes. At the fault
detection stage if a path is determined as a faulty path,
then it is being coupled with its related weight. At the
route revelation stage path with negligible weight worth
will be considered as enhanced way.
3.2.2 Core
In this algorithm it uses a method to uphold entity to
associate all the nodes in MANET which functions
upon the cooperative behaviours of the entities. It uses
the methods of Watchdog and Reputation Table to
determine the collaborative or malicious entities. e
related reputation or ratings of the transitional nodes
are maintained in a reputation table blocks. e block
of Watchdog manipulates the function and oers the
Reputation value. CORE mechanism contains of a source
hub and a set of transition hubs. In this, at whatever point
a transition hub denies co-working with the source hub,
this CORE convention will constrain the dissent of move
hub. is may take to lessening of transitional hub from
the system.
3.2.3 Condant
Condant protocol is used to determine the non-
supportive stations. e Condant protocol comprise
of various blocks like the monitor, path manager, trust
manager and reputation system. e passive feedbacks
for each message which it sends are considered and being
monitored by the monitor block. e transition of alarm
signals is concerned by the trust manager block. When a
station locates that a host is non-functioning, it forwards
information in the form of alarm. is kind of messages
is shared among the nodes that are stated as associates.
Alarms message from other stations are given considerably
a smaller amount weightage. e reputation system
block holds a chart of station and the related evaluations.
Assessments are changed in light of a rate capacity that
makes employments of modest weights if a alarm is
managed for a getting misbehaving station and higher
weights for direct data. e path manager block manages
all link data in concern with accumulation, removal, and
changing of route based on the acknowledged message
it accepted from the reputation system. e path which
contains the identied malicious node is eliminated, if the
rating goes under a certain threshold value by calling the
path manager block.
Vol 9 (14) | April 2016 | www.indjst.org Indian Journal of Science and Technology
8
Study on Reliable and Secure Routing Protocols on Manet
3.2.4 Watchdog and Pathrater
e protocol which is specied under watchdog and
pathrater17 is used to identify the nodes which are
malicious and which will refuse in packets forwarding
where as they are admitted to exchange the packets in the
initial stage. e signicant function of Watchdog is to
investigate whether the data packets are being exchanged
or not by the next station available in the link. If the next
station is not exchanging the packet then it is noticed as
the malicious characters. e main aim of pathrater is to
estimate and identify the trusted route from the outcome
watchdog generates. Whenever a node decides to send
a packet to its neighbour node in the pathway, it rst
veries that the neighbouring node will transmit or not
and also veries that the proximity node should not alter
the contents in the packet before forwarding it. Hence
forth any node that behaves like malicious node like deny
of service or altering the data packet, then this Watchdog
protocol will enhance its rating under failure where
this failure ranking is very supportive in identifying the
trusted route between source and destination.
4. Comparison of Various Secure
Routing Protocols
e below Table 3 is specied based on various protocols
studied, and a comparison8 table is made between
dierent protocols.
e Table 3 represent that a several tasks is carried
for attacks by rushing , DoS and modifying routing table
attacks whereas to prevent tunnelling attacks still more a
lot of security protocols are needed. e routing protocol
in aspects of security is capable of handling only restricted
attacks. For e.g. ARAN and SAR convention can oer
security against surging and directing altering routing
table assaults, where as they are not reasonable for security
against Denial-of-Service and assaults by tunnelling. In
the same way, CORE provides security against Denial-of-
Service attacks. e security for tunnelling attacks can be
provided by Watchdog and Pathrater.
5. Attack Taxonomies in Manet
In MANETS there is a chance for dierent types of
attacks where few kinds of attacks are applicable for
general network, other applies to connectionless network
and few are specic for mobile adhoc networks. e
various attacks for security are broadly open based on
dierent criteria15, namely the province of the attackers,
or the methods applied in assaults. e various security
attacks in MANET and in the remaining networks can
be broadly briefed based on the following strategies like
Active or passive, External or Internal, various protocol
Table 3. Routing protocols comparison based on security aspects
Name of protocol Typ e Chances of attacks
Rushing
attack
Denial of
Service
Modifying
routing
table
Attacks by
Tunnelling
ARAN (Authenticated Routing for Adhoc
Networks)
On demand routing protocol positive negative positive negative
SAR (Secure aware Adhoc Routing) On demand routing protocol positive negative positive negative
SRP (Secure Routing Protocol) On demand routing protocol positive positive positive negative
SEAD (Secure Ecient Adhoc Distance vector
routing)
Table Driven routing protocol positive positive positive negative
Ariadne On demand routing protocol positive positive positive negative
SLSP (Secure Link State routing Protocol) Table Driven routing protocol positive positive positive negative
SAODV(Secure Ad-hoc On-demand Distance
Vector Routing Protocol)
On demand routing protocol positive negative positive negative
CONFIDANT On demand routing protocol positive negative negative positive
BYZANTINE On demand routing protocol positive positive positive negative
WATCHDOG & PATHRATER On demand routing protocol negative negative negative positive
K. Vijayakumar and K. Somasundaram
Vol 9 (14) | April 2016 | www.indjst.org Indian Journal of Science and Technology 9
layer15, Stealthy or Non-stealthy, Cryptographic or Non-
cryptographic etc. e Table 4 shows the security attacks
at various layers2,9,15 of the Internet model.
Active Attacks vs. Passive Attacks: e various attacks
of mobile adhoc networks (MANET’s) are broadly
divided keen on two main groups, specically active
attacks and passive attacks9. In the passive attacks the
data is switched in the network without interrupting the
communication process while in an active attack contains
packet disruption, alteration, or false modication,
thereby disturbing the original behaviour of a MANET.
e dierent illustrations of passive assaults are trac
investigation, eavesdropping and trac observing and
the active assaults jamming, impersonating, modication,
denial of service (DoS), and message replay.
Internal Attacks vs. External Attacks: Another form
of attacks10 can also be categorised into external attacks
and internal attacks9, related to the environment of the
assaults. Some articles specify attacks as outsider and
insider attacks. Externals assaults are kept up by stations
that don’t t in with nature of the system. Internal assaults
are from bargained stations, which are truly part of the
system. Internal assaults are less demanding when related
with external assaults subsequent to the insider knows
important and mystery data, and holds special permit
privileges.
Attacks on Dierent Layers of the Internet Model:
Further, the attacks are broadly divided by aording to
ve layers2,15 of the layered model of Internet. e above
Table 2 species a grouping of several security Attacks on
Internet layered model. Certain attacks can be launched
at various layers.
Stealthy vs. Non-Stealthy Attacks: Particular security
attacks13 use stealth, whereby the attackers try to conceal
their activities from either a individual who is observing
the system or an intrusion detection system9,15 (IDS). Be
that as it may, dierent assaults, for example, DoS can’t be
made stealthy.
Cryptography vs. Non-Cryptography Related Attacks:
Certain attacks are non-cryptography associated, and rest
are cryptographic primitive attacks. e Table 5 shows
various cryptographic primitive attacks3 with examples.
Table 5. Attacks based on cryptographic techniques
Cryptographic
technique Attacks
Example
Pseudorandom number
attack
Nonce, timestamp, Initialization
Vector (IV)
Digital signature attack RSA Signature, Elgamal signature,
Digital Signature Standard (DSS)
Hash Collision Attack SHA-0, MD4, MD5, HAVAl-128,
RIPEMD
6. Conclusion
In this article, we have portrayed the distinctive security
targets, security attacks and supporting security for
diverse existing directing system necessities. In this study,
an examination chart is given which species that every
safe convention works beneath dierent restrictions that
give security against constrained attacks. One of the
protocols can achieve all security objectives.
usly, there is still a prerequisite of more secured
convention that can deal with the distinctive asking for
necessities of MANET. is section presents dominant
part of the attack taxonomies in brief that has been
considered as the preparatory piece of study in the
introductory stages of the proposed research work. e
work gives the essential thoughts regarding the capability
of attacks and vulnerabilities in MANET that could help
for comprehension the antagonistic part of the study.
Table 4. Dierent security Attacks on Internet layered model
Name of Layer Type of Attack
Physical layer congestion, interceptions, eavesdropping
Data Link Layer Trac analysis, monitoring, disruption MAC (802.11) WEP weakness
Network layer Black Hole, Wormhole, Byzantine, Flooding attacks, Consumption of resource, location disclosure attacks
Transport Layer Session hijacking, SYN ooding
Application Layer Repudiation, data corruption
Multi- layer attacks Denial of Service, Masquerade, Replay, Man-in-the-middle.
Vol 9 (14) | April 2016 | www.indjst.org Indian Journal of Science and Technology
10
Study on Reliable and Secure Routing Protocols on Manet
7. References
1. Sumathi A, Vinayaga Sundaram B. An ANN Approach in
Ensuring CIA Triangle using Energy based Secured Proto-
col E-AODV for Enhancing the Performance in MANETS.
Indian Journal of Science and Technology. 2015 December;
8(34). Doi: 10.17485/ijst/2015/v8i34/IPL0821.
2. Joseph Ch, Kishoreraja C, Radhika Baskar, Reji M. Perfor-
mance Evaluation of MANETS under Black Hole Attack
for Dierent Network Scenarios. Indian Journal of Science
and Technology. 2015 November; 8(29). Doi: 10.17485/
ijst/2015/v8i29/84653.
3. Vijaya Kumar K, Somasundaram K. A Symmetric Multiple
Random Keys (SMRK) Model Cryptographic Algorithm.
International Journal of Innovative Research in Computer
and Communication Engineering. 2015 November; 3(11),
10896-903.
4. Wilson Prakash S, Sankaranarayanan S. Solution To Pro-
hibit Rushing Attack In Mobile Ad-Hoc Network. Interna-
tional Journal on Applications in Information and Com-
munication Engineering. 2015 September; 1(9):1-5.
5. Joseph Ch, Kishoreraja C, Radhika Baskar, Reji M. Perfor-
mance Metrics of Wormhole Detection using Path Tracing
Algorithm. Indian Journal of Science and Technology. 2015
August; 8(17):63541.
6. Anchugam CV, angadurai K. Detection of Black Hole
Attack in Mobile Ad-hoc Networks using Ant Colony Op-
timization - simulation Analysis. Indian Journal of Science
and Technology. 2015 July; 8(13). Doi: 10.17485/ijst/2015/
v8i13/58200.
7. enral B, irunadana Sikamani K. AMRA: Angle based
Multicast Routing Algorithm for Wireless Mesh Networks.
Indian Journal of Science and Technology. 2015 July;
8(13):59451.
8. Anand V, Sairam N. Methodologies for Addressing the Per-
formance Issues of Routing in Mobile Ad hoc Networks: A
Review. Indian Journal of Science and Technology. 2015
July; 8(15). Doi: 10.17485/ijst/2015/v8i15/70511.
9. Gomathi K, Parvathavarthini B. An extensive analysis of
manet attacks using special characteristics. Indian Journal
of Computer Science and Engineering (IJCSE). 2015 Jun-
Jul; 6(3):110-13.
10. Dom Ali, Reza Seyed, Kheytkhah Esmail. Secure Challeng-
es in Mobile Adhoc Networks - A survey. International
Journal of Computer Science and engineering Survey. 2015
February; 6(1):15-29.
11. Pradeep Reddy CH, Jagadeesh Gopal, Arun Kumar S. Ef-
cient Bandwidth Utilization with Congestion Control for
Wireless Mesh Networks. Indian Journal of Science and
Technology, 2014 November; 7(11):1780-87.
12. Santoshi K, Vijaya Kumar K. An Empirical Model of Mali-
cious Node detection and Prevention with Data rating. In-
ternational Journal of Engineering Trends and Technology
(IJETT). November 2014; 17(2):56-59.
13. Jain Shikha. Security reats in MANETS: A Review. In-
ternational Journal on Information eory. 2014 April;
3(2):37-50.
14. Subburaj V, Chitra K. Multi Hop Secure Adhoc Network
to Eradicate Cooperative Diversity. Indian Journal of Sci-
ence and Technology. 2014 February; 7(2):135-41.
15. Godwin Ponsam J, Srinivasan R. A Survey on MANET
Security Challenges, Attacks and its Counter measures. In-
ternational Journal of Emerging Trends & Technology in
Computer Science. 2014 January-February; 3(1):274-79.
16. Abbas S, Merabti M, Jones DL, Kifayat K. Lightweight Sybil
Attack Detection in MANETs. IEEE Systems Journal. 2013
April; 7(2):236-48.
17. Anitha D, Punithavalli M. A Collaborative Selsh Replica
with Watchdog and Pathrater in MANETS. International
Journal of Computer Science and Mobile Computing. 2013
March; 2(3):112-19.
18. Shakshuki EM, Kang N, Sheltami TR. EAACK - A Secure
Intrusion-Detection System for MANETs. IEEE Transac-
tions on Industrial Electronics. 2013 March; 60(3):1089-98.
19. Liu W, Nishiyama H, Ansari N, Yang J, Kato N. Cluster
based Certicate Revocation with Vindication Capability
for Mobile Ad Hoc Networks. IEEE Transactions on Paral-
lel and Distributed Systems, 2013 Feb; 24(2):239-49.
20. Hinds Alex, Ngulube Michael, Zhu Shaoying, Hus-
sain-Al-Aqrabi. A Review of Routing Protocols for Mobile
Ad-hoc Networks (MANETS). International Journal of In-
formation Education and Technology. 2013 Feb; 3(1):184-
91.
21. Ayday E, Fekri F. An Iterative Algorithm for Trust Man-
agement and Adversary Detection for Delay-Tolerant Net-
works. IEEE Transactions on Mobile Computing. 2012
September; 11(9):1514-31.
22. Guan Q, Yu FR, Jiang S. Joint Topology Control and Au-
thentication Design in Mobile Ad Hoc Networks With Co-
operative Communications. IEEE Transactions on vehicu-
lar technology. 2012 July; 61(6):2674-85.
23. Gagandeep, Aashima, Pawan Kumar. Analysis of Dierent
Security Attacks in MANETs on Protocol Stack A - Review.
International Journal of Engineering and Advanced Tech-
nology (IJEAT). 2012 June; 1(5):269-75.
24. Dhurandher, SK, Obaidat MS, Verma K, Gupta P, Dhu-
randher P. FACES: Friend-Based Ad Hoc Routing Using
Challenges to Establish Security in MANETs Systems. IEEE
Systems Journal. 2011 June; 5(2):176-88.
25. Yu FR, Tang H, Mason PC, Wang F. A Hierarchical Identi-
ty Based Key Management Scheme in Tactical Mobile Ad
Hoc Networks, IEEE Transactions on Network and Service
Management. 2010 December; 7(4):258-67.
26. Tomar Parul, Suri PK, Soni MK. A Comparative Study for
Secure Routing in MANET, International Journal of Com-
puter Applications (0975-8887). 2010 July. 4(5):17-22.
27. Nakayama H, Kurosawa S, Jamalipour A. A Dynamic
Anomaly Detection Scheme for AODV-Based Mobile Ad
Hoc Networks. IEEE Transactions on Vehicular Technolo-
gy. 2009 June; 58(5):2471-81.
28. Krutika K. Chhajed, Ali MS. Distributed Security System
for Mobile Ad-Hoc Computer Networks. International
Journal of Computer Science & Communication Networks.
2015; 5(3):184-91.
... Among the security challenges, the black hole assault is a genuine risk to MANET. The black hole assault is a kind of active attack 4 and also a routing layer assault in which the malignant nodes misuse a routing protocol for propagation itself as having the most undeviating path to the destination hub. ...
... Step 4: Message ( : N i , N r , E{Ke}(ID i , ID r' , sa', SIG{r})(g r , N r , g i , N i )), HMAC {Ka}('R' E(Ke)(ID r , Sa', SIG{r}(g r , N r , g i , N i ))) (4) where, is the digital signature of using the private key of the responder represents the information that the receiver wish to send to the sender } The CBHDAP protocol consumes the inputs such as PL, src, Dst, next hop, transmission time, timer and processing time for deploying the key agreement algorithm. Initially, the source node (I) broadcasts the HELLO packets using (1) for discovering its neighbors. ...
Article
Full-text available
Objective: The various features of mobile adhoc networks (MANET’s) are open medium, dynamic topology and absence of centralized monitoring point which introduces various security challenges. One among the security attacks are defined as the black hole attack in this article. Methods: In this paper we introduce a protocol for detecting and avoiding the black hole attacks in MANET’s by an efficient Crypto-key based Black Hole Detection and Avoidance Protocol (CBHDAP). Findings: The suggested protocol generates a group key using Diffie-Hellman (DH) based key agreement black hole detection algorithm then the generated key is forwarded to the authenticated group members. The validation of the nodes in the route from the source to the destination is done before initiating the transmission. The black hole attacks are avoided during transmission by considering the parameters such as time taken for Route Reply (RREP), hop count, Packet Delivery Ratio (PDR) are used. To validate the performance of the proposed approach, it is compared with the existing protocols for the metrics such as detection probability, throughput, end-to-end delay, etc. Improvements: The validation results prove that the CBHDAP provides optimal results for all the metrics like detection probability, throughput, E2E delay etc when compared with the algorithms existed.
... Neighbor nodes send data packets through the black hole, which the black hole node drops. e method's strength comes in its ability to pinpoint optimal values for such variables as detection probability and throughput. is approach aids in both the detection and prevention of black hole attacks in MANET [10]. When malicious nodes misinterpret routing for dissemination, only the least diverted packets eventually make it to the target hub, and a route layer vulnerability known as a black hole assault is launched. ...
Article
Full-text available
Security in MANETs is a highly contentious topic in the field of network management. e availability and functionality of a MANET might be compromised by a variety of attacks. One of the most prevalent active attacks used to degrade network speed and reliability is the black hole attack, which leads the compromised agent to discard all data packets. e purpose of a black hole node is to trick other access points into thinking that they must use their node as their route to a certain destination. e black hole node in a cable network cannot be detected or eliminated in an AODV network. We improved AODV in this study by utilizing a lighter-weight technique based on timing and baiting for detecting and separating single and collaboration black hole attacks. MANETs have a dynamic topology, an open medium, and a lack of a highly centralized monitoring point, all of which offer security problems. Attacks on security are one of the sorts of attacks. In MANETs, it has no central administration, and mobile devices link to other devices wirelessly. Black holes, insider attacks, gray holes, parallel universes, faulty nodes, and packet drops are all threats that can cause considerable disruption in secure communication. Simulation findings demonstrate that the proposed method significantly outperforms previous techniques in terms of end-to-end delay, throughput, packet delivery ratio, and average energy. A multipath methodology is used in our proposed method to mitigate the black hole attack in MANET. e proposed technique is tested in a simulation reality to see how stable it is in the face of an attack. When the proposed method's results are compared to those of existing state-of-the-art approaches, it is discovered that the acquired results are satisfactory.
... To provide security services the previous studies in [1] [4] have outlined several solutions classified in two categories namely prevention mechanism or detection and reaction mechanism [5][1]. The first one involves encryption techniques particularly to ensure the authenticity and integrity of messages. ...
Article
Full-text available
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc networks (MANET). Techniques and schemes have been proposed to secure the basic routing protocols in order to guarantee the availability of information routing services between network nodes. The majority of the solutions presented in the literature belong to two categories, namely those that use cryptographic techniques and those that use trust schemes. Given the characteristics of MANET networks, we need approaches that guarantee a level of honesty of the nodes to prevent possible routing attacks from malicious nodes. This study presents the security extensions of the basic routing protocols AODV, DSR and DSDV.A first part is devoted to extensions based on cryptography and a second part introduces extensions using trusted systems. Then we discussed and analyzed them while drawing up a comparative table to measure the effectiveness of the mechanisms used as well as the limits and strengths of each proposed extensions. In this study, we conclude that a new trust model that combines an access strategy with lightweight techniques must be developed to ensure honest node behavior can be a key to securing the routing protocol in MANET.
... Now here is the classification of routing attacks in MANET. In passive attack data exchanged in the network is done without interrupt the operation of the communications, whereas an active attack contain the information of interruption, modification, or fabrication, which disrupting the normal functionality of a MANET 5 is shown in Figure 2. The severity of the attack depends on midway distance of the malicious nodes between the nodes, dropping of packets, misrouting of packets, providing false information etc. 6 .The topology dynamic networks keep on changing so changes the attacks on these networks and in order to deal with these malicious attacks these routing protocols must be robustic 7 . This paper is structured in following sections: section 1 explains the introduction part. ...
... Now here is the classification of routing attacks in MANET. In passive attack data exchanged in the network is done without interrupt the operation of the communications, whereas an active attack contain the information of interruption, modification, or fabrication, which disrupting the normal functionality of a MANET 5 is shown in Figure 2. The severity of the attack depends on midway distance of the malicious nodes between the nodes, dropping of packets, misrouting of packets, providing false information etc. 6 .The topology dynamic networks keep on changing so changes the attacks on these networks and in order to deal with these malicious attacks these routing protocols must be robustic 7 . This paper is structured in following sections: section 1 explains the introduction part. ...
... The MANET can be secured using cryptography, secure routing mechanisms and IDS or may use the combination of these approaches. Cryptographic method and IDS can protect the MANET before information (control) and/or after information (data) forwarded while secure routing mechanism can protect the control (routing) information and discover dynamically reliable routes [6] which can be either proactive or reactive [7]. ...
Conference Paper
In recent years, individuals and organizations have been using digital services created by digital transformation. With smart mobile devices, there is a lot of enthusiasm for providing users with the ability to shop, communicate, and access to information anytime and from anywhere. The Ad hoc mobile network (MANET) as an important wireless technology can be used to exploit these services. In consideration of the sensitivity of users' data routed through network nodes, secure routing must be the priority of MANET networks. Due to their characteristics such as a dynamic topology, a distributed control system, limited resources and multi-hop communication, these networks are particularly vulnerable to different security threats. This study present the security extensions for some basic routing protocol in MANET networks such as AODV, DSR, and DSDV, and we focus on analyzing the techniques and mechanisms developed to perform security services. Next, we propose an analysis and comparative study of the effectiveness of these extensions to prevent potential routing attacks from malicious nodes.
Article
Background/Objectives: Multimedia Applications on Mobile Ad hoc Networks (MANETs) are gaining immense popularity recently due to their necessity in latest environments. Hence, multimedia applications like video streaming, video conferencing and environment monitoring must be made possible in real-time in Mobile Ad hoc Networks. Mobility of nodes, life of battery, changes in topology and protocols affect the performance of MANET. Hence providing good Quality of Service (QoS) for multimedia applications in MANET is a challenge. Methods/Statistical Analysis: The RED algorithm with video precedence called as SiViRED (Significant Video Information Random Early Detection) - AQM in the Network layer that provides service differentiation based on the pre-assigned service classes and video packet drop priority specified in packet header. This will reduce congestion and decrease delay and jitter when compared to conventional methods. Findings: Proposed a novel technique that uses a cross layer architecture in which information from application layer is used with UDPLite in Transport layer and Active Queue Management (AQM) with SiViRED in Network Layer with modified dynamic mapping in MAC layer that guarantees 14% increase in Peak Signal to Noise Ratio (PSR) and 40% decrease in delay compared to conventional methods. Application/Improvements: Developed a cross layer technique that improves the end-to-end performance of multimedia services over Mobile Ad hoc Networks.
Article
Full-text available
In this digital world, which is currently involving a rapid change in technology, the security of digital information has become a primary concept. Cryptography plays a specific and important role to protect secret files and documents from unauthorized access. The cryptography algorithms are classified in to two categories, Public-key producing and symmetric-key producing algorithms. The principal goal of designing any encryption algorithm is to hide the original message and send the encrypted or secret text message to the receiver so that secret message communication can take place over the web. The strength and potentiality of an encryption algorithm depends on the difficulty of cracking the original message. A number of symmetric key encryption algorithms like DES, TRIPLE DES, AES, BLOWFISH have been developed to provide greater security affects one over the other. Although the existing algorithms have their own merits and demerits but in this we presents a new approach for data encryption and decryption based on multiple random keys generation. A new encryption algorithm based on block cipher generating mechanism is proposed herewith to analyze the time-consumed by the complete process (process starting from sender encryption to receiver decryption) of the selected cryptographic algorithms with proposed algorithm. Creating random keys for each block and interdependence of all keys in all stages of encrypting and decrypting provides high secure for the data. For the plaintext the corresponding key are generated by randomly. The expected results showing that, under the random keys generation and for the same size of the input block of data, the proposed algorithm will be about several times faster than existing algorithm, and there are other runtime characteristics which further highlight the difference between these cryptographic algorithms. This algorithm is safe against unauthorized attacks and runs faster than the popular existing algorithms. With this new approach we are implementing a technique to enhance the security level of this algorithm and to further reduce the time for encryption and decryption.
Article
Full-text available
Evaluating a routing protocol in MANETS is a difficult task due to mobility of nodes and decentralized administration. In Adhoc On demand Distance Vector routing (AODV) protocol the routes are found only on need and the connection setup delay is less. An authenticated secure data communication protocol E-AODV (Energy based AODV) is proposed in this work which ensures the security of Confidentiality, Integrity and Availability triangle. Confidentiality is provided by calculating Intermediate Trust Value (ITV) for all nodes between source and destination and only the nodes which possess highest ITV is used for data transmission. Integrity is attained by an encryption algorithm called digital signature algorithm which is used at the time of data transmission from source to destination node. Availability have been provided by calculating the residual energy of each node so that nodes which possess highest energy are used for data transmission. Simulation results using NS2 also prove that the performance level of throughput, Energy consumption and packet delivery ratio in E-AODV increases with that of AODV routing protocol. The results obtained are trained using Back propagation algorithm and the effectiveness of the proposed system is checked by ANN approach.
Article
Full-text available
Objective: Mobile Adhoc Networks contains set of mobile nodes does not have a fixed structure. It is very important to protect the network secure. The main aim of the paper is to protect the network from worm hole attack using path tracing algorithm with the advancement of aodv and compare the performance parameters. Methods: We propose path tracing algorithm for detection of worm hole attack as a extension of aodv protocols the path of the node effectively computes the per hop distance of its neighbor node with per hop distance of the previous node to identify the worm hole attack. NS2 simulator is used to compare the performance parameters of the worm hole attack. Conclusions: Simulated parameters like packet delivery ratio, delay, and packet loss with attacker and without attacker are done and the detection ratio is identified.
Article
Full-text available
Background: Security in Mobile Ad hoc Networks (MANETs) is an essential component for basic network function. Black hole attack may cause packet dropping, misrouting the information from source to destination. Methods: Biology-inspired techniques like as Ant Colony Optimization (ACO) is used to modify the Ad-hoc On Demand Distance Vector (AODV) routing protocol. The ant place of at each node calculates its pheromone value by using the forwarding ratio at node. This modified protocol is compared with existing protocol by using various parameters i.e. packet delivery ratio, end-to-end delay and throughput. Results: The results shows to increase in packet delivery ratio, throughput and decrease in end-to end delay show better performance of proposed work as compared existing.
Article
Evaluating a routing protocol in MANETS is a difficult task due to mobility of nodes and decentralized administration. In Adhoc On demand Distance Vector routing (AODV) protocol the routes are found only on need and the connection setup delay is less. An authenticated secure data communication protocol E-AODV (Energy based AODV) is proposed in this work which ensures the security of Confidentiality, Integrity and Availability triangle. Confidentiality is provided by calculating Intermediate Trust Value (ITV) for all nodes between source and destination and only the nodes which possess highest ITV is used for data transmission. Integrity is attained by an encryption algorithm called digital signature algorithm which is used at the time of data transmission from source to destination node. Availability have been provided by calculating the residual energy of each node so that nodes which possess highest energy are used for data transmission. Simulation results using NS2 also prove that the performance level of throughput, Energy consumption and packet delivery ratio in E-AODV increases with that of AODV routing protocol. The results obtained are trained using Back propagation algorithm and the effectiveness of the proposed system is checked by ANN approach.
Article
The objective of this review article is to offer an insight into the performance issues pertinent to routing in Mobile Ad hoc Networks. This work has studied the approaches for solving the performance issues such as changes in topology, energy consumption of mobile nodes, delay, routing overhead, message delivery time, throughput, packet delivery ratio, security of networks and mobility management. To provide a perception of solutions for these issues, this study concentrates on various methodologies such as Effective Hierarchical Routing Algorithm, Link Stability with Energy Aware Multipath Routing protocol, Path Encounter Rate metric and Trust-based Source Routing protocol. Effective Hierarchical Routing Algorithm computes the route and has decreased the load of routing protocols. Link Stability with Energy Aware Multipath Routing protocol finds routes with small delay. Delivery ratio of packet in LSEA is improved on par with Ad hoc On-demand Distance Vector Routing (AODV). Delivery ratio of packets in LSEA was enhanced by 40%. To get an efficient metric for routing in high mobility situations, Path Encounter Rate metric was proposed. Throughput achieved with this metric was 30% higher than those obtained by the hop-count metric. To choose a least-cost route with security constraints, TSR was proposed. TSR has improved the packet delivery ratio, ratio of identifying the malicious nodes as well as network throughput. This review of different methods can be used by researchers to find a better solution to these issues.
Article
Background/Objectives: Mobile Adhoc Networks (MANETS) are prone to different types of attacks due to lack of central monitoring facility. The objective is to investigate the effect of black hole attack on the network layer of MANET for different network scenarios. Method: A black hole attack is a network layer attack which utilizes the destination sequence number to claim that it has a fresh and a shortest path to the destination and consumes all the packets forwarded by the source. The various network scenarios of MANETS with AODV routing protocol are simulated using Network Simulator Version 2 (NS- 2) to analyse the performance with and without the black hole attack. The scenarios are created by varying the number of nodes and nodes speed, varying position and number of the black hole nodes and number of flows. The performance parameters like PDR, delay, throughput, packet drop and control overhead are measured. Findings: The black hole attack degrades the network performance. The impact of attack is severe when the attacker is near to the source node, less severe when it is in midway between source and destination and has least effect when it is farther from the source. The overall throughput and PDR increases with the number of flows but reduces with the attack. With the increase in the black hole attackers, the PDR and throughput reduces and close to zero as the number of black hole nodes are maximum. The packet drop also increases with the attack. The overall delay factor varies based on the position of the attackers. Throughput, PDR and control overhead decreases with the network size due to congestion and average delay reduces with black hole attack as the black node sends the Route ERRor (RREP) without performing any route checking. As the mobility varies, the delay and packet drop increases but PDR and throughput decreases as the nodes moves randomly in all directions. Conclusion: The simulation results gives a very good comparison of performance of MANETS with and with out black hole attack for different network scenarios.
Article
The concept of peer to peer mobile networks reflects on tactical network. This approach helps mobile nodes to scatter anywhere in the network and it also provide additional support for the MANET in terms of data distribution. This paper provides the result of such approach in terms of network cluster formation with secure node proximity within the boundary. This proximity paradigm will enhance the performance of network by avoid wide scattering of mobile nodes beyond the networks zone. The results shown in this paper were the work done in ns2 mobility package. The result also incorporates AODV routing protocol with IEEE 802.11 MAC for wireless network to improve network performance using mobile node proximity in conjunction with the previous work indicating the network performance degradation with these configuration. To device proximity among mobile nodes were done along with secure mechanism, such that every nodes data transmission was done only on the basis of IDS implementation with PSO fitness value. This will invoke security for every data transmission done on this network. This work has significant effect by improving network performance by 50%.
Article
In recent years, Multi hop wireless networks have caught wide attention in the areas of high speed traffic and applications with high bandwidth requirement such as video and audio transmissions. Congestion is one of the major factors which degrade the system performance while we are working with high speed multi hop networks. Congestion control plays a vital role to improve the bandwidth utilization and system performance. In this project, an accurate measurement of the Available Bandwidth in a network is calculated and an enhanced congestion control mechanism for such paths in wireless mesh networks is proposed. The performance evaluation of the proposed model is simulated in NS-2 simulator and the results were compared with existing model.
Article
Objective: The main intent of this research is to improve the quality of service in Wireless Mesh Networks by reducing the number of hops and communication overhead generated in the network. Methods: In this manuscript, the Angle based Multicast Routing Algorithm (AMRA) is introduced for reducing communication overhead and thus improving performance in the wireless mesh networks. Every intermediate node towards the destination is selected based on the angle towards the forwarding nodes. The next intermediate node is selected in the forwarding direction, if the angle is within 60° of the current node. This method reduces the number of hops in transmitting data. Results: The Angle based Multicast Routing Algorithm (AMRA) show higher performance when compared to the existing CAMP method. If the number of nodes is 50, the packet delivery rate is comparatively better in AMRA and the throughput in AMRA is 70%. According to the comparison results, the proposed approach works better than the other existing schemes with high quality of service. Conclusion: The simulation results demonstrate that the Angle based Multicast Routing Algorithm (AMRA) has high quality of service compared to the existing CAMP.