Open Access Open Access  Restricted Access Subscription Access

Analyses of Secure Hybrid Routing Protocol for MANET

K. Thamizhmaran

Abstract


The self-configuring ability of nodes in MANETs made it popular among critical applications like military use or natural emergency recovery. Mainly of the suggested protocols assume that all nodes in the network are cooperative, and do not address any safety issue. To modify to such trend, it is important to address its potential safety issues. The main objective of this paper is design new secure routing protocol namely, Secure Hybrid Hierarchical Link State (SHHLS) routing protocol to define the path for security, reduce misbehaviors node and to further improve performance and at the same time to create energy enhanced way with excellent security. We are implementing secure dynamic on-demand routing protocol in order to achieve security goals for following parameters packet delivery ratio, routing overhead, average energy and throughput. The proposed model test SHHLS with existing Zone Hierarchical Link State (ZHLS) hybrid routing protocol and analysis secure method is implemented to avoid any type of attacking model on the network with SHHLS routing algorithm besides avoiding delay and packet loss, it increases the node speed also. Network Simulator (NS2) is used to simulate the proposed method and implemented in the test system. The proposed SHHLS provides secure transmission and further reduces routing overhead, delay and packet loss since SHHLS algorithm increases efficiency of network topology.

 

Keywords: MANET, security issues, routing protocol, ZHLS, SHHLS, packet delivery ratio, routing overhead, throughput, remaining energy, NS2.

 


Full Text:

PDF

References


Perkins, C. E. (2000). Quality of service for ad hoc on-demand distance vector routing. draft-ietf-manet-aodvqos-00. txt.

Hu, Y. C., Johnson, D. B., &Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad hoc networks, 1(1), 175-192.

Huang, Y. A., & Lee, W. (2003, October). A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (pp. 135-147).

Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. IEEE wireless communications, 11(1), 38-47.

Patwardhan, A., Parker, J., Joshi, A., Iorga, M., &Karygiannis, T. (2005, March). Secure routing and intrusion detection in ad hoc networks. In Third IEEE International Conference on Pervasive Computing and Communications (pp. 191-199). IEEE.

Balakrishnan, K., Deng, J., &Varshney, V. K. (2005, March). TWOACK: preventing selfishness in mobile ad hoc networks. In IEEE Wireless Communications and Networking Conference, 2005 (Vol. 4, pp. 2137-2142). IEEE.

Choi, J., Cha, S. H., Park, G., & Song, J. (2005). Malicious Nodes Detection in AODV-Based Mobile Ad Hoc Networks. GESTS Int’l Trans. Computer Science and Engr, 18(1), 49.

Reddy, T. B., Karthigeyan, I., Manoj, B. S., & Murthy, C. S. R. (2006). Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions. Ad Hoc Networks, 4(1), 83-124.

Liu, K., Deng, J., Varshney, P. K., &Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE transactions on mobile computing, 6(5), 536-550.

Shen, Z., & Thomas, J. P. (2008). Security and qos self-optimization in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 7(9), 1138-1151.

Wu, H., &Jia, X. (2007). QoS multicast routing by using multiple paths/trees in wireless ad hoc networks. Ad Hoc Networks, 5(5), 600-612.

Ukey, A. S. A., &Chawla, M. (2010). Detection of packet dropping attack using improved acknowledgement based scheme in MANET. IJCSI International Journal of Computer Science Issues, 7(4), 12-17.

Nandy, R., & Roy, D. B. (2011). Study of various attacks in MANET and elaborative discussion of rushing attack on DSR with clustering scheme. International Journal of Advanced Networking and Applications, 3(1), 1035.

Thamizhmaran, K., et al. (2012). Authentication and Intrusion Detection in MANET. International Journal of Advance Research in Technology, 3(3), 15-21.

Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2012). EAACK—a secure intrusion-detection system for MANETs. IEEE Transactions on industrial electronics, 60(3), 1089-1098.

Prabu, K., &Subramani, A. (2014). Energy efficient routing in MANET through edge node selection using ESPR algorithm. International Journal of Mobile Network Design and Innovation, 5(3), 166-175.


Refbacks

  • There are currently no refbacks.