Open Access Open Access  Restricted Access Subscription Access

Design Secure Routing Protocol for MANET

K. Thamizhmaran

Abstract


Current research developing year’s lot of young research’s interested in Mobile Ad-hoc Networks (MANET’s) a collection of independent mobile nodes dynamically form a network connection temporarily without any base station of static infrastructure.  The self-configuring ability of nodes in MANETs made it popular among critical applications like military use or natural emergency recovery. Many of the suggested protocols assume that all nodes in the network are supportive, and do not address any safety problem. To adjust to such trend, it is vital to address its potential security issues. The main objective of this paper is design new secure routing protocol namely, Secure Dynamic On-Demand Routing Protocol (SDORP) to define the path for security and to further improve throughput, routing overhead, packet delivery ratio and at the same time to create energy enhanced way with excellent security.  We are implementing secure dynamic on-demand routing protocol   in order to achieve security goals for following parameters packet delivery ratio, routing overhead, end-to-end delay, average energy,  packet loss and throughput.  The proposed model test SDORP with existing AODV reactive routing protocol and analysis stimulated through Network Simulated (NS2).

 

Keywords: MANET, security issues, routing protocol, SDORP, NS2


Full Text:

PDF

References


Perkins, C. E. (2000). Quality of service for ad hoc on-demand distance vector routing. draft-ietf-manet-aodvqos-00. txt. IETF Internet draft.

Hu, Y. C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad hoc networks, 1(1), 175-192.

Huang, Y. A., & Lee, W. (2003, October). A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (pp. 135-147).

Huang, Y. A., & Lee, W. (2003, October). A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (pp. 135-147).

Jawhar, I., & Wu, J. (2005). Quality of service routing in mobile ad hoc networks. In Resource Management in Wireless Networking (pp. 365-400). Springer, Boston, MA.

Patwardhan, A., Parker, J., Joshi, A., Iorga, M., & Karygiannis, T. (2005, March). Secure routing and intrusion detection in ad hoc networks. In Third IEEE International Conference on Pervasive Computing and Communications (pp. 191-199). IEEE.

Balakrishnan, K., Deng, J., & Varshney, V. K. (2005, March). TWOACK: preventing selfishness in mobile ad hoc networks. In IEEE Wireless Communications and Networking Conference, 2005 (Vol. 4, pp. 2137-2142). IEEE.

Yu, J. Y., & Chong, P. H. J. (2005). A survey of clustering schemes for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 7(1), 32-48.

Choi, J., Cha, S. H., Park, G., & Song, J. (2005). Malicious Nodes Detection in AODV-Based Mobile Ad Hoc Networks. GESTS Int’l Trans. Computer Science and Engr, 18(1), 49.

Reddy, T. B., Karthigeyan, I., Manoj, B. S., & Murthy, C. S. R. (2006). Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions. Ad Hoc Networks, 4(1), 83-124.

Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE transactions on mobile computing, 6(5), 536-550.

Pahlevanzadeh, B., Seno, S. H., Wan, T. C., Budiarto, R., & Kadhum, M. M. (2008). A cluster-based distributed hierarchical IDS for MANETs. Executive Development, 21, 22.

Shen, Z., & Thomas, J. P. (2008). Security and qos self-optimization in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 7(9), 1138-1151.

Wu, H., & Jia, X. (2007). QoS multicast routing by using multiple paths/trees in wireless ad hoc networks. Ad Hoc Networks, 5(5), 600-612.

Ukey, A. S. A., & Chawla, M. (2010). Detection of packet dropping attack using improved acknowledgement based scheme in MANET. IJCSI International Journal of Computer Science Issues, 7(4), 12-17.

Sahadevaiah, K., & Reddy, P. P. (2011). Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks. Netw. Protoc. Algorithms, 3(4), 122-140.

Nandy, R., & Roy, D. B. (2011). Study of various attacks in MANET and elaborative discussion of rushing attack on DSR with clustering scheme. International Journal of Advanced Networking and Applications, 3(1), 1035.

Burmester, M., & De Medeiros, B. (2009). On the security of route discovery in MANETs. IEEE Transactions on Mobile Computing, 8(9), 1180-1188.

Thamizhmaran, K. et al. (2012). Secure Routing Protocol in MANET – A Survey. International Journal of Advance Research in Technologies, 3(3), 9-14.

Thamizhmaran, K. et al. (2012). Authentication and Intrusion Detection in MANET. International Journal of Advance Research in Technology, 3(3), 15-21.

Butun, I. et al. (2012). Survey of intrusion detection System in wireless Sensor Networks. IEEE Communications survey and tutorials, 1-17.

Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2012). EAACK—a secure intrusion-detection system for MANETs. IEEE Transactions on industrial electronics, 60(3), 1089-1098.

Nahak, K., & Kubde, B. (2013). Security and Privacy issues in high level MANET protocol. International Journal of science and research, 2, 1-7.

Prabu, K., & Subramani, A. (2014). Energy efficient routing in MANET through edge node selection using ESPR algorithm. International Journal of Mobile Network Design and Innovation, 5(3), 166-175.

Basabaa, A., Sheltami, T., & Shakshuki, E. (2014). Implementation of A3ACKs intrusion detection system under various mobility speeds. Procedia Computer Science, 32, 571-578.

Patil, S., & Borade, D. A Survey on IDS Techniques to Detect Misbehavior Nodes in Mobile Ad-hoc Network.


Refbacks

  • There are currently no refbacks.