A Comparative study on secure routing algorithms SAODV and A-SAODV in Mobile AdHoc Networks (MANET) – The Enhancements of AODV

2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols

2018 ◽  
Vol 7 (3.3) ◽  
pp. 279
Author(s):  
Ms Divya ◽  
Dr R. Gobinath

The secured routing protocol expresses an underlying elementary unit confide in information interchanging system. Miserably, presently no anatomy remains to supports in the layout and inquiry of secured routing protocols. This work investigates the structured approaches of secured routing and the interrelating attacker standards to contribute a structure for modeling prime protocols. Based on this anatomy, it is detected that the powerful attacks are targeting the data in the control plane. In this paper the strength of attackers are classified with respect to the locations under its direct control.  


Author(s):  
L Raghavendar Raju ◽  
C R K Reddy Reddy

<p>Mobile ad hoc networks (MANETs) are collection of wireless mobile devices with restricted broadcast range and resources. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both from efficiency and security point of view. This paper presents a proficient and secure routing, based on asymmetric authentication using key exchange approach (KEA). The proposed mechanism ensures secure routing and quality of service in MANETs and minimizes the network overhead. The KEA mechanism can be effectively used to develop a new routing protocol for Mobile Adhoc Networks which will provide maximum security against all kinds of attacks. In this paper, KEA is compared with other secure routing protocols like EEACK, AODV, and ARIADANE, to evaluate the efficiency of KEA in Ad Hoc Networks. The empirical results shows that there is an increase of 20% packet delivery ratio and a reduction of 10% routing overhead.</p>


Author(s):  
AVINASH GIRI ◽  
JITENDRA PRITHVIRAJ ◽  
ASHOK VERMA

A MANET is an interconnection of mobile devices by wireless links, which forms a dynamic topology. Routing protocols play a vital role in transmission of data across the network. The two major classifications of routing protocols are uni path and multi path. In this paper, we have evaluated the performance of a widely used on-demand uni path routing protocol called AODV and multi path routing protocol AOMDV and MDART . These protocol has been selected due to its edge over other protocols in various aspects, such as reducing delay, routing load etc. The evaluation of all the protocols is carried out in terms of different scenarios using NS2.


2014 ◽  
Vol 39 (2) ◽  
pp. 129-154 ◽  
Author(s):  
Ditipriya Sinha ◽  
Uma Bhattacharya ◽  
Rituparna Chaki

Abstract In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs). This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR), secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.


Mobile Adhoc Networks enforces certain level of challenges for the researchers since they operate without a fixed infrastructure. Moreover the constant movement of nodes gives additional challenges while implementing any type of solutions. Similarly enforcing secure mode of routing in mobile adhoc networks creates lot of hurdles for the implementers. This paper addresses these issues, by computing the trust of each node and updating the trust tables of the respective nodes and the cluster head. This paper focus in designing a trusted secure mechanism for routing. The objective of this work is to calculate the trust of nodes using various trust methods. Later the calculated trust is updated with the trust table of the cluster head by forming a web of trust. This will enable a secure channel of communication among the adhoc nodes. After incorporating the newly computed trust, the routing performance of well known routing protocol say AODV, is evaluated for various routing parameters and it is compared with the performance of Trusted AODV(TODV).


Sign in / Sign up

Export Citation Format

Share Document