Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism

نویسندگان

  • Preeti Sachan
  • Pabitra Mohan Khilar
چکیده

In mobile ad hoc wireless network (MANET), secure communication is more challenging task due to its fundamental characteristics like infrastructure less, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In MANET, attacks can be broadly classified in two categories: routing attacks and data forwarding attacks. Any action not following rules of routing protocols belongs to routing attacks. The main objective of routing attacks to mislead or disrupt normal functioning of network by advertising false routing updates. On the other hand data forwarding attacks include actions such as modification or dropping of data packet that does not disrupt routing protocol. In this thesis work, we proposed a method to secure ad hoc on-demand distance vector (AODV) routing protocol. The proposed method provides security for routing packets and can efficiently prevent the attacks such as black hole, modifying routing information and impersonation. The proposed method uses hashed message authentication code (HMAC) function which provides fast message verification and sender as well as intermediate nodes authentication. We simulate and compare the proposed method with original AODV and secure AODV (SAODV) protocol using network simulator tool (NS2). Simulation result shows that proposed method minimizes the time delay and network routing load involved in computation and verification of security fields during route discovery process and performs better than the original AODV protocol in the presence of malicious nodes performing black hole attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Evaluation of Routing Protocol for Mobile Ad-Hoc Network

MANET is the compilation of wireless portable nodes which dynamically arranges a short term network without the use of any centralized administration or network infrastructure. Routing protocols used in mobile ad hoc networks must mechanically change to environments that can vary between the extremes of low mobility with high bandwidth, high mobility with low bandwidth. Various secure routing p...

متن کامل

Certification and Authentication Services for Securing MANET Routing Protocols

In this paper, we describe a new authentication service for securing mobile ad hoc network (MANET) routing protocols. A MANET authentication extension (MAE) is appended to each routing protocol message. Our design includes a self-organized certification service, adapted from [6] with the following improvements: appropriated initialization, correcting vulnerabilities in the original design; loca...

متن کامل

Security Enhancement over Ad-hoc Aodv Routing Protocol

For most existing routing protocols of mobile ad hoc network (MANET), more efficient security mechanisms against the attacks from malicious, compromised and selfish nodes are highly demanded. This paper proposes a series of security mechanisms for the Ad-hoc On-demand Distance Vector (AODV) Routing protocol. Three techniques, including digital signature, one-way hash function and double one-way...

متن کامل

A Survey on Security Analysis of Routing Protocols

: Mobile ad hoc networking (MANET) is gradually emerging to be very important in the growth of wireless technology. This is anticipated to offer a range of flexible services to mobile and nomadic users by means of integrated homogeneous architecture. The proper routing protocol is necessary for better communication in MANET. One of the existing reliable protocols is Ad Hoc On-Demand Vector Rout...

متن کامل

Securing AODV for MANETs using Message Digest with Secret Key

Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) are frequently established in insecure environments, which make them more vulnerable to attacks. These attacks are initiated by sharing malicious nodes against different services of network. The binding force in these...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011