Preventive Security Mechanism Based on AODV

2011 ◽  
Vol 225-226 ◽  
pp. 565-568 ◽  
Author(s):  
Chiu Ching Tuan ◽  
Kuen Yang Chen ◽  
Yi Chao Wu

In a mobile ad-hoc network, MANET, designing a security routing protocol is an important issue since the mobile nodes and wireless medium are prone to be attacked. However, most of wireless routing protocols concentrated on how to reduce the data transmission time and energy consumption. Wireless routing paths in MANET may be broken or fabricated by attacking. Hence, sending data packets to the destination may failure. For defending the active black hole attacks and the passive fabricated routing attacks, we proposed a preventive security mechanism based on ad-hoc on-demand distance vector routing (AODV), called PSM-AODV. PSM-AODV modified some field in RREQ, RREP, and RERR packets based on AODV. PSM-AODV thus may defend the possible black hole and fabricated routing attacks. Simulation results showed that PSM-AODV could promote the packet delivery rate based on little overhead in control packets.

Author(s):  
Arudra Annepu ◽  
◽  
Priti Mishra ◽  

Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MANET is numerous threats types of attacks due to dynamic changing topologies and wireless medium. Security of the MANET becomes one of the challenging tasks. Black hole attacks is the main type of attack that are possible in MANET. Black hole node not forward any data packets to the neighbour node instead it drops all the data packets. Black hole attacks are bit hard to detect due to lack of centralized access. This research work concentrates to enhance the security of MANET by identifying and blocking black hole assaults from occurring. A reactive routing system such as Ad-Hoc on Demand Distance Vector has previously been used to address security problems in the MANET (AODV). Various attack types were investigated, and the consequences of these assaults were detailed by describing how MANET performance was disrupted. Network Simulator 3 (NS3) is used for the simulation process.


Mobile Ad Hoc network (MANET) is a self-configuring network consisting of mobile nodes without any fixed infrastructure. However due to the nodes has not any fixed infrastructure in MANET, it is susceptible to various security attacks like data modification, information sniff, due to low energy, computing ability and bandwidth. In MANET Black hole is also an attack and it is difficult to detect and prevent. The lack of quality in security aspects of ad-hoc routing protocols won’t provide reliability in the data packets movement between source and destination nodes. Implementing the routing decision with trust is an important one in the MANNET security. Hence, this research work propose an enhanced Fuzzy based combined trust scheme (FCTRS) based on public trust and Quality of Service (QoS) trust to detect black hole attack. It provides secure routing based on certificate authority (CA) to improve the performance of Ad-hoc On-demand Distance Vector (AODV). The results will show the performance improvement of proposed protocol over Enhanced Trusted Routing Scheme with Pattern Discovery (ETRS-PD) and the protocol AODV. The metrics in the performance of network examined with different conditions of mobility and the presence of black hole node positions.


Integrating the Mobile Ad-Hoc Network (MANET) with Internet has many advantages. The Data collected from the Mobile nodes can be broadcasted to the world by connecting the Internet to it via Gateway. Clustering is a practical way to enhance the system performance. Security is a significant issue in the Integrated MANETInternet climate in light of the fact that in this climate we need to think about the assaults on Internet availability. So, to overcome this issue, we have proposed Secure and Authenticated routing protocol (SARP) to enhance security performance of the networks. This routing protocol is used to discover a secure route and to transmit data packets securely. In this protocol clusters are formed and security relies on the hardness of the symmetric and asymmetric key algorithms. We show the practicality of this convention as for the security prerequisites and security investigation against different assaults. The estimations and reproductions are given to show the security of the proposed convention. The outcomes show that, the proposed convention have preferred execution over the current secure conventions for Cluster based Internet Integrated with MANETs, in terms of security.


Mobile Ad hoc Network is a decentralized network which can be deployed instantly. Routing is a very challenging task in this network due to dynamic movement of mobile nodes. Various routing protocols such as OLSR, DYMO and ZRP are proposed to establish the route for the data packets in MANET’s. As deploying of the protocols into real environment is a cost expensive process, the protocols are initially evaluated through a simulated arena. Many of the mobile devices are battery equipped and each protocol consumes energy in different manner. In this paper, energy consumption evaluation is carried out on OLSR, DYMO and ZRP protocols in a grid environment. The experiments have shown that DYMO protocol has less energy consumption when compared to OLSR and ZRP protocols.


2019 ◽  
Vol 8 (4) ◽  
pp. 9203-9210

A wireless mobile ad-hoc network (WMANET) is endless self-organizing, infrastructure-less collection of movable devices which are connected by using a wireless communication system. In other word’s WMANET is an autonomous, decentralized, dynamic topology, provisional network system having wireless movable devices (nodes) moving randomly without an infrastructure of the network. Furthermore, the nodes communicate with every supplementary node, through forwarding data-packets toward other nodes in the WMANET. The node finds a path to the destination node by applying routing techniques. Due to the dynamic topology of movable nodes wireless mobile network is more vulnerable to security and unprotected to attacks by the malicious node. One of the attacks is Blackhole malware Attack, a malicious-node wrongly advertises shortest to the destination node among an intention of disrupting the network communication. Because the data packets did not arrive at the destination node due to this attack data is lost. In the literature, researchers have been proposed various preventive detection techniques. These techniques used to detect and prevent the black-hole malware attacks. Furthermore, in this paper Novel Detection and Prevention mechanism (INCMAODV) has been simulated the black-hole attack in WMANET scenario. The proposed technique tried to find quality of service (QoS) parameters for instance throughput (Th), packet delivery ratio (PDR) and delay of the network and compared with the state of the art.


Author(s):  
Hanadi Yahya Darwisho

    Due to the increased use of mobile devices with the high demand for applications such as video application, most companies have tended to pay attention to Mobile Ad hoc Networks. This type of network is characterized by multi-hop wireless networks where data packets are sent in a "store and forward" manner from the source to an arbitrary destination via intermediate nodes. The mobile nodes are connected by multi-routes routing as the nodes in this network not only serve as hosts but also as routers where data is routed to and from other nodes in the network and therefore the mobile node not only sends its data packets but also sends data packets of other mobile nodes. The network architecture changes dynamically, mainly because of Mobility of nodes, so we need routing protocols to establish the connection. Routing protocols are categorized into proactive routing protocols, reactive routing protocols and hybrid routing protocols. So in this research, we has been studied Geographical Routing Protocol (GRP ), Optimized Link State Routing Protocol (OLSR) routing protocols which is one of proactive routing protocols and hybrid routing protocols respectively on the basis of Throughput, Delay and Load..etc and evaluated the performance in a large mobile ad hoc network and in a small mobile ad hoc network as well as for different video resolutions, the OPNET 14.5 network simulator was used to obtain research results. It was found that the GRP protocol performs better for a small number of nodes whether the video resolution is low or high while its performance decreases when the number of nodes increases in the network but the OLSR protocol improves when the number of nodes is increased.    


Author(s):  
Baban Ahmed Mahmood ◽  
Aso Ahmed Majeed ◽  
Ahmed Chalak Shakir

<p>The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.</p>


2019 ◽  
Vol 8 (3) ◽  
pp. 8192-8198

Mobile Ad hoc Networks is configured by itself using the Mobile nodes in the Network, the maintenance also done by the wireless nodes itself. Dynamic topology, hop-to-hop communication and open-to-all are the features of MANETS, but these features made security of network highly challengeable. From security concern, routing protocols are highly vulnerable to many security threats like black hole attack. In black hole attack malicious node generates false routing information to the path requests about the route it asked for, which results all data packets forward toward it-self by the source and the black hole node manipulate its data. The cooperative black hole nodes in the other hand cooperate within the malicious nodes to fool the single black hole attack prevention algorithms. Here an approach is proposed to detecting the cooperative black holes nodes and eliminate them by broad casting there information into the network.


The Ad-hoc On-Demand Multipath Distance Vector (AOMDV)is an extension of AODV protocol in the mobile ad-hoc network (MANET). It utilizes the features of DSDV, DSR, and AODV Routing protocols for Secure, Reliable and confidential data transmission against the attacks in the MANET, butinblack hole attack malicious nodes utilize the behavior of AODV and show its malicious behavior at the data transmission, it causes the loss of data packets. So to avoid this loss more researchers have been conducted several techniques for detection and put several efforts to prevent the Blackhole attacks. But still, it isnot prevented completely, sothis paper proposes a Node Disjoint Multiple paths routing algorithm technique on AOMDV against black hole attacks in MANET and shows its better performance in Network Simulator (NS2).


Author(s):  
SHRADDHA RAUT ◽  
SD CHEDE

This paper gives information about the detection technique of black hole in the MANET. An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the central administration. Hence it becomes more susptable to the attacker .Mostly used on- demand routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand DistanceVector) protocol. The security of the AODV protocol is compromised by a particular of attack called “Black Hole” attack. In this attack, a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability, it is proposed to wait and check the replies from all the neighboring nodes to find a safe route.


Sign in / Sign up

Export Citation Format

Share Document