SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012

             A New Scheme for Secured on Demand Routing

                                      Vijay Kumar1* Ashwani Kush 2
    1.   Department of Computer Science,Guru Nanak Khalsa College Karnal – India vk.gnkc@gmail.com
    2.   Department of Computer Science University College, Kurukshetra University, Kurukshetra, India


Abstract

A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity,
Non infrastructural environment and dynamic topology. A recent trend in Ad Hoc network routing is the
reactive on-demand philosophy where routes are established only when required. Stable Routing, Security
and Power efficiency are the major concerns in this field. This paper is an effort to achieve security
solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network
users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing
protocol AODV. The study will help in making protocol more robust against attacks to achieve stable
routing in routing protocols.
Keywords: Ad hoc Networks, Modified AODV, AODV, Performance evaluation.


1. Introduction
The wireless network can be classified into two types: (Kush A.2009, Kush et al.2009) Infrastructured and
Non-Infrastructural. In Infrastructured wireless networks, the mobile node can move while communicating,
the base stations are fixed and as the node goes out of the range of a base station, it gets into the range of
another base station. In non Infrastructural or Ad Hoc wireless network, the mobile node can move while
communicating, there are no fixed base stations and all the nodes in the network act as routers. The mobile
nodes in the Ad Hoc network dynamically establish routing among themselves to form their own network
‘on the fly’. A Mobile Ad Hoc Network is a collection of wireless mobile nodes forming a temporary/ short
lived network without any fixed infrastructure where all nodes are free to move about arbitrarily and where
all the nodes configure themselves. In this network, each node acts both as a router and as a host & even the
topology of network may also change rapidly. Some of the challenges in this network include:( Kush A.
2009)Unicast/Multicast routing, Dynamic network topology, Network overhead, Scalability, QoS, Stable
routing, Secure routing and Power aware routing. In this paper, a particularly challenging attack to defend
against wormhole attack, and present a new, general mechanism for detecting and thus defending against
wormhole attacks has been discussed. In this attack, an attacker records a packet, or individual bits from a
packet, at one location in the network, tunnels the packet to another location, and replays it there. Rest of
the apepr is organzed as: In section 2 problem statement is discussed, section 3 explains working of
wormhole attack in AODV, section 4 is about proposed algorithm and its analysis and Conclusion have
been made in section 6.


2. Problem Statement
The dynamics of Mobile Ad hoc Networks pose a problem in finding stable multi-hop routes for
communication between a source and a destination. Since the nodes in mobile ad hoc network can move
randomly, the topology may change arbitrarily and frequently at unpredictable times. So it is very difficult
to find and maintain an optimal route. Basically, the routing algorithm must react quickly to topological
changes. Most of the existing protocols maintain single routing path and rediscover the new path whenever
a link fails. Popular ad hoc routing protocol normally uses the minimum number of hop routes or shortest
routes for sending information. These routes tend to contain long-range links, therefore routes frequently
fail and are not reliable. Stable routing makes the protocol robust and ready to use and is most important for
transfer of packets.


                                                      1
Network and Complex Systems                                                                     www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012

2.1 Security Requirements
There have been numerous published reports and papers describing attacks on wireless networks that
expose organizations to security risks such as attacks on confidentiality, integrity, non repudiation and
network availability. There are several proposals to solve these issues but they target specific threats
separately. Therefore, there is a requirement to have an efficient security system which takes care of all
aspects of security.
Security Threats: (Bouam S.et al. 2003, Ghazizadeh S.et al 2002) Network security attacks are typically
divided into passive & active attacks as summarized in table 1.
Passive Attack: An attack in which an unauthorized party gains access to an asset and does not modify its
content. Passive attacks can be either eavesdropping or traffic analysis (sometimes called traffic flow
analysis). These two passive attacks are described as;
‱   Eavesdropping: The attacker monitors transmissions for message content. An example of this attack is
    a person listening into the transmissions on a network topology between two workstations or tuning
    into transmissions between a wireless handset and a base station.
‱   Traffic analysis: The attacker, in a more subtle way, gains intelligence by monitoring the transmissions
    for patterns of communication. A considerable amount of information is contained in the flow of
    messages between communicating parties.

                                       Table 1: Passive vs. active attacks
               Passive attacks: Eavesdropping, traffic analysis

               Active attacks: Masquerading/Spoofing, Replaying, Message modification, DoS



Active Attack: (Inkinen Kai 2004, Wenjia Li et al. 2008) An attack whereby an unauthorized party makes
modifications to a message, data stream, or file. It is possible to detect this type of attack but it may not be
preventable. Active attacks may take the form of one of four types masquerading, replay, message
modification, and Denial-of-Service (DoS). These attacks are summarized as:
‱   Masquerading: The attacker impersonates an authorized user and thereby gains certain unauthorized
    privileges. A spoofing attack is a situation in which one person or program successfully masquerades
    as another by falsifying data and thereby gaining an illegitimate advantage.
‱   Replay: The attacker monitors transmissions and retransmits messages as the legitimate user.
‱   Message modification: The attacker alters a legitimate message by deleting, adding to, changing, or
    reordering it.
‱   Denial-of-Service: The attacker prevents or prohibits the normal use or management of
    communications facilities.
The consequences of these attacks include, but are not limited to, loss of proprietary information, legal and
recovery costs, tarnished image, and loss of network service. Due to the dynamically changing topology
and infrastructure less, decentralized characteristics, security is hard to achieve in mobile ad hoc networks.
Hence, security mechanisms have to be a built-in feature for all sorts of ad hoc network based applications.




3. Working of Wormhole Attack in AODV
In this study wormhole attack is considered (Lazos L. et al.2005, Khalil I. et al. 2005, Chiu H.S. et al.
2006). Wormhole attack is not that difficult to set up, but still can be immensely harmful for a MANET.
Moreover, finding better techniques for detection of wormhole attacks and securing AODV against them


                                                       2
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
still remains a big challenge in Mobile Ad-hoc Networks. Working of AODV in the presence of wormhole
attack is described using Figure1.
In Figure 1 during path discovery process, sender “S” broadcasts RREQ to a destination node D. Thus
nodes 24, 1, 2 and 3 neighbours of S, receive RREQ and forward RREQ to their neighbours. Now the
malicious node M1 that receives RREQ forwarded by 25 records and tunnels the RREQ via the high-speed
wormhole link to its partner M2. Malicious node M2 forwards RREQ to its neighbour 10, 9 and 26. Finally
26 forwards it to 27 and it will forward it to destination D. Thus, RREQ is forwarded via S-24-25-26-27-D.
On the other hand, other RREQ packet is also forwarded through the path S-4-13-22-14-15-16-17-18-19-
20-21-27-D. However, as M1 and M2 are connected via a high speed bus, RREQ from S-24-25-26-27-D
reaches first to D. The wormhole attack exits in the route selected in AODV according to shortest path S-
24-25-26-27-D. After getting the route requests to destination from the sender destination it will unicast a
route reply packet to source “S” using shortest path. Source will select the shortest path as best route from
source to destination for transmitting the data and other routes will be discarded. In above example
destination “D” ignores the RREQ that reaches later and chooses D-27-26-25-24-S to unicast an RREP
packet to the source node S. As a result, S chooses S-24-25-26-27-D route to send data that indeed passes
through malicious M1 and M2 nodes that are very well placed in comparison to other nodes in the network.


4. Proposed Algorithm
The following assumptions are taken in order to design the proposed algorithm.
1.    A node interacts with its 1-hop neighbours directly and with other nodes via intermediate nodes using
      multi-hop packet forwarding.
2.    Every node has a unique id in the network, which is assigned to a new node collaboratively by existing
      nodes.
3.    The network is considered to be layered.
4.    Source and Destination node will not be wormhole node.
Steps of Modi_AODV Algorithm
1.    Source node sends route request
2.    Intermediate node forward request
3.    If intermediate node is wormhole it tunnels the packet to next end
4.    If packet reaches destination it send reply to source
5.    If wormhole receive reply then it tunnels to another wormhole end
6.    Reply reaches source node and start transmitting data packet through shortest path
7.    Then source node send path message to all intermediate node upto destination
8.    Intermediate node receive path message and select 2nd hop path node as target node
9.    It sends route message to one hop neighbour alongwith other nodes in path
10.   One hop neighbour receive route message and find alternate path to target node
11.   If hop count of alternate path > hop count threshold
12.   Then previous hop node of target is detected as wormhole node
13.   Else no wormhole present.

The working of routing largely depends upon successful transmission of packets to the destination. This
requires proper selection of Routing path and algorithm. AODV and Modified AODV have been used in
this paper for routing solutions. All the simulations have been performed using Network Simulator Ns-2.32
on the platform Fedora 13. The traffic sources are CBR (continuous bit–rate). The source-destination pairs
are spread randomly over the network. The mobility model uses ‘random waypoint model’ in area 1000m x
750m with 25, 50, 75 and 100 nodes. During the simulation, each node starts its journey from a random
spot to a random chosen destination. Once the destination is reached, the node takes a rest period of time in
second and another random destination is chosen after that pause time. This process repeats throughout the
simulation, causing continuous changes in the topology of the underlying network. Different network
scenario for different number of nodes and different node transmission range are generated.

                                                      3
Network and Complex Systems                                                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Performance Metric: There are number of qualitative and quantitative metrics that can be used to compare
reactive routing protocols. Most of the existing routing protocols ensure the qualitative metrics. Therefore
we have used the following metrics. These performance metrics determines the completeness and
correctness of the routing protocol. Performance metrics used here are: Packet Delivery Ratio, Throughput
and Average end to end delay.
In Figure 2 the End to End Delay Ratio is compared in AODV and Modified AODV protocol using number
of mobile nodes as a parameter. This performance metric has been evaluated using 25, 50, 75 and 100
mobile nodes. The results shows that the End to End Delay Ratio is though increasing with the increase in
number of nodes in AODV but still the performance of Modified AODV is excellent than AODV in all
cases. Figure 3 shows the performance of throughput is compared for AODV and modified AODV by
increasing the number of nodes. The results show that modified AODV gives stable good throughput in all
cases but in the case of AODV’s throughput fluctuate and is low with the number of nodes 50. In Figure 4
packet delivery ratio has been evaluated for AODV and modified AODV protocols using 25, 50, 75 and
100 nodes. The PDR is very good of modified AODV in the comparison of AODV in all the situations. The
result of modified AODV is slightly less with the high mobile nodes i.e. 100.
In Figure 5 and Figure 6 control packets are displayed. In any wireless network if control packets are high
the overhead will be high. In above mentioned both figures modified AODV have more routing overhead
compared to AODV. Routing overhead increases when the number of nodes increases in the scenario.
6. Conclusion
This paper has proposed an effective mechanism for AODV called modified AODV to detect and react to
wormhole attacks and enhance the stability for MANETs. In all the comparisons shows that the results of
modified AODV is much better and stable in the comparison of AODV. In AODV there are more
fluctuations in the case of end to end delay ratio, PDR and throughput. But in the case of routing overhead
its high compare to AODV.
Finally, stability is getting the cost in the shape of routing overhead. In next paper trying to detect and
remove wormhole attack from the MAENT.

References
Bouam S. and J. B. Othman (2003), “Data Security in Ad hoc Networks using MultiPath Routing”, in Proc.
of the 14th IEEE PIMRC, pp. 1331-1335, Sept. 7-10, 2003.
Chiu H.S. and K.S. Lui,(2006), “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless
Networks”, In Proc. International Symposium on Wireless Pervasive Computing, Phuket, Thailand.
D.B.J., Yih-Chun Hu, Adrian Perrig, (2002), “Ariadne: A secure on-demand routing protocol for ad-hoc
networks”, Proceedings of the Eighth Annual International Conference on Mobile Computing and
Networking (MobiCom 2002).
Ghazizadeh S., O. Ilghami, E. Sirin, and F. Yaman, (2002), “Security-Aware Adaptive Dynamic Source
Routing Protocol”, In Proc. of 27th Conference on Local Computer Networks, pp. 751-760, Nov. 6-8.
Hu Y.C., A. Perrig, and D.B. Johnson,(2006), “Wormhole Attacks in Wireless Networks”, In IEEE JSAC,
Vol. 24, No. 2, pp. 370-380.
Inkinen Kai (2004), “New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed
Schemes”, Helsinki University of Technology T-110.551, Seminar on Internetworking, Sjökulla.
Khalil I., S. Bagchi, and N.B. Shroff,(2005), “LITEWORP: A Lightweight Countermeasure for the
Wormhole Attack in Multihop Wireless Networks”, In Proc. International Conference on Dependable
System and Networks (DSN), Yokohama, Japan.
Kush A. (2009) “Security Aspects in AD hoc Routing”, Computer Society of India Communications, Vol.
no 32 Issue 11, pp. 29-33.
Kush A. (2009), “Security and Reputation Schemes in Ad-Hoc Networks Routing”, International Journal
of Information Technology and Knowledge Management, Volume 2, No. 1, pp. 185-189.



                                                     4
Network and Complex Systems                                                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Lazos L., R. Poovendan, C. Meadows, P. Syverson, and L.W. Chang,(2005), “Preventing Wormhole
Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach”, In Proc. IEEE Wireless
Communications & Netwoking Conference (IEEE WCNC), New Orleans, USA.
Qian ., N. Song, and X. Li (2005), “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc
Networks through Statistical Analysis of Multi-path”, In Proc. IEEE Wireless Communications &
Netwoking Conference (IEEE WCNC), New Orleans, USA.
Wenjia Li, Anupam Joshi, (2008), “Security Issues in Mobile Ad Hoc Networks- A Survey”, Department
of Computer Science and Electrical Engineering, University of Maryland, Baltimore County,
http://www.cs.umbc.edu/~wenjia1/ 699_report.pdf.


Author 1: Mr. Vijay is research scholar at Graphic Era University Dehradun - India and is working as
assistant professor at Guru Nanak Khalsa College Karnal – India. He has 8 research papers to his credit. His
area of interest is security and stability in Mobile ad-hoc networks.


Author 2: Dr. Ashwani Kush is working as Associate professor and head at university college, computer
department, Kurukshetra university kurukshera India. He earned PhD in association with IIT Kanpur and
KUK India on Ad hoc networks and has teaching experience of 20 years. Dr kush is member of IEEE,
ACM, IAENG, IACSIT, CSI India and many other professional organizations. He has chaired sessions at
Singapore, USA, India and Canada. He has more than 80 research papers to his credit. His areas of interest
are Wireless networks, security, power awareness in Manet and e-goverance. He can be reached at
akush@kuk.ac.in




                                   Figure1. Wormhole attack in AODV




                                                     5
Network and Complex Systems                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012




                      Figure 2: End to End Delay Ratio versus no. of nodes




                      Figure 3: Throughput versus no. of packets per second




                                               6
Network and Complex Systems                                                          www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012




                  Figure 4: Packet Delivery Ratio versus no. of packets per second




                Figure 5: Send Control Packets (RREQ/ REPLY) versus no. of nodes




                                                 7
Network and Complex Systems                                                          www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012




              Figure 6: Received Control Packets (RREQ/ REPLY) versus no. of nodes




                                               8
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

Weitere Àhnliche Inhalte

Was ist angesagt?

Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters usingeSAT Publishing House
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...IJCNCJournal
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
 

Was ist angesagt? (18)

Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
B43011014
B43011014B43011014
B43011014
 
E0432933
E0432933E0432933
E0432933
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 

Andere mochten auch

G04734450
G04734450G04734450
G04734450IOSR-JEN
 
Russell Bennett And Neale Uk Academy Paper Social Networking Final
Russell Bennett And Neale Uk Academy Paper Social Networking FinalRussell Bennett And Neale Uk Academy Paper Social Networking Final
Russell Bennett And Neale Uk Academy Paper Social Networking FinalDrBekMarketing
 
Evaluation of Uncertain Location
Evaluation of Uncertain Location Evaluation of Uncertain Location
Evaluation of Uncertain Location IOSR Journals
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
Network analysis q.papers
Network analysis q.papersNetwork analysis q.papers
Network analysis q.papersswapnil shinde
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
VoIP 101 White Paper
VoIP 101 White PaperVoIP 101 White Paper
VoIP 101 White PaperBraun Mincher
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksijcsa
 
Securing cluster based adhoc network through
Securing cluster based adhoc network throughSecuring cluster based adhoc network through
Securing cluster based adhoc network througheSAT Publishing House
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksambitlick
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsIDES Editor
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsIJORCS
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...csandit
 
Active networking on a programmable networking platform
Active networking on a programmable networking platformActive networking on a programmable networking platform
Active networking on a programmable networking platformTal Lavian Ph.D.
 

Andere mochten auch (20)

Cp35508515
Cp35508515Cp35508515
Cp35508515
 
G04734450
G04734450G04734450
G04734450
 
Russell Bennett And Neale Uk Academy Paper Social Networking Final
Russell Bennett And Neale Uk Academy Paper Social Networking FinalRussell Bennett And Neale Uk Academy Paper Social Networking Final
Russell Bennett And Neale Uk Academy Paper Social Networking Final
 
Evaluation of Uncertain Location
Evaluation of Uncertain Location Evaluation of Uncertain Location
Evaluation of Uncertain Location
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
H0261047055
H0261047055H0261047055
H0261047055
 
Network analysis q.papers
Network analysis q.papersNetwork analysis q.papers
Network analysis q.papers
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
H0261047055
H0261047055H0261047055
H0261047055
 
VoIP 101 White Paper
VoIP 101 White PaperVoIP 101 White Paper
VoIP 101 White Paper
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
Securing cluster based adhoc network through
Securing cluster based adhoc network throughSecuring cluster based adhoc network through
Securing cluster based adhoc network through
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networks
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated Clouds
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...
 
Active networking on a programmable networking platform
Active networking on a programmable networking platformActive networking on a programmable networking platform
Active networking on a programmable networking platform
 

Ähnlich wie 11.a new scheme for secured on demand routing

PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
 
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...IJCSEA Journal
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc NetworksMuhammad Yousuf Khan
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETsIOSR Journals
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 

Ähnlich wie 11.a new scheme for secured on demand routing (20)

PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
 
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETs
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
D0961927
D0961927D0961927
D0961927
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

KĂŒrzlich hochgeladen

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

KĂŒrzlich hochgeladen (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

11.a new scheme for secured on demand routing

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 A New Scheme for Secured on Demand Routing Vijay Kumar1* Ashwani Kush 2 1. Department of Computer Science,Guru Nanak Khalsa College Karnal – India vk.gnkc@gmail.com 2. Department of Computer Science University College, Kurukshetra University, Kurukshetra, India Abstract A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, Non infrastructural environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to achieve security solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocol AODV. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols. Keywords: Ad hoc Networks, Modified AODV, AODV, Performance evaluation. 1. Introduction The wireless network can be classified into two types: (Kush A.2009, Kush et al.2009) Infrastructured and Non-Infrastructural. In Infrastructured wireless networks, the mobile node can move while communicating, the base stations are fixed and as the node goes out of the range of a base station, it gets into the range of another base station. In non Infrastructural or Ad Hoc wireless network, the mobile node can move while communicating, there are no fixed base stations and all the nodes in the network act as routers. The mobile nodes in the Ad Hoc network dynamically establish routing among themselves to form their own network ‘on the fly’. A Mobile Ad Hoc Network is a collection of wireless mobile nodes forming a temporary/ short lived network without any fixed infrastructure where all nodes are free to move about arbitrarily and where all the nodes configure themselves. In this network, each node acts both as a router and as a host & even the topology of network may also change rapidly. Some of the challenges in this network include:( Kush A. 2009)Unicast/Multicast routing, Dynamic network topology, Network overhead, Scalability, QoS, Stable routing, Secure routing and Power aware routing. In this paper, a particularly challenging attack to defend against wormhole attack, and present a new, general mechanism for detecting and thus defending against wormhole attacks has been discussed. In this attack, an attacker records a packet, or individual bits from a packet, at one location in the network, tunnels the packet to another location, and replays it there. Rest of the apepr is organzed as: In section 2 problem statement is discussed, section 3 explains working of wormhole attack in AODV, section 4 is about proposed algorithm and its analysis and Conclusion have been made in section 6. 2. Problem Statement The dynamics of Mobile Ad hoc Networks pose a problem in finding stable multi-hop routes for communication between a source and a destination. Since the nodes in mobile ad hoc network can move randomly, the topology may change arbitrarily and frequently at unpredictable times. So it is very difficult to find and maintain an optimal route. Basically, the routing algorithm must react quickly to topological changes. Most of the existing protocols maintain single routing path and rediscover the new path whenever a link fails. Popular ad hoc routing protocol normally uses the minimum number of hop routes or shortest routes for sending information. These routes tend to contain long-range links, therefore routes frequently fail and are not reliable. Stable routing makes the protocol robust and ready to use and is most important for transfer of packets. 1
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 2.1 Security Requirements There have been numerous published reports and papers describing attacks on wireless networks that expose organizations to security risks such as attacks on confidentiality, integrity, non repudiation and network availability. There are several proposals to solve these issues but they target specific threats separately. Therefore, there is a requirement to have an efficient security system which takes care of all aspects of security. Security Threats: (Bouam S.et al. 2003, Ghazizadeh S.et al 2002) Network security attacks are typically divided into passive & active attacks as summarized in table 1. Passive Attack: An attack in which an unauthorized party gains access to an asset and does not modify its content. Passive attacks can be either eavesdropping or traffic analysis (sometimes called traffic flow analysis). These two passive attacks are described as; ‱ Eavesdropping: The attacker monitors transmissions for message content. An example of this attack is a person listening into the transmissions on a network topology between two workstations or tuning into transmissions between a wireless handset and a base station. ‱ Traffic analysis: The attacker, in a more subtle way, gains intelligence by monitoring the transmissions for patterns of communication. A considerable amount of information is contained in the flow of messages between communicating parties. Table 1: Passive vs. active attacks Passive attacks: Eavesdropping, traffic analysis Active attacks: Masquerading/Spoofing, Replaying, Message modification, DoS Active Attack: (Inkinen Kai 2004, Wenjia Li et al. 2008) An attack whereby an unauthorized party makes modifications to a message, data stream, or file. It is possible to detect this type of attack but it may not be preventable. Active attacks may take the form of one of four types masquerading, replay, message modification, and Denial-of-Service (DoS). These attacks are summarized as: ‱ Masquerading: The attacker impersonates an authorized user and thereby gains certain unauthorized privileges. A spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. ‱ Replay: The attacker monitors transmissions and retransmits messages as the legitimate user. ‱ Message modification: The attacker alters a legitimate message by deleting, adding to, changing, or reordering it. ‱ Denial-of-Service: The attacker prevents or prohibits the normal use or management of communications facilities. The consequences of these attacks include, but are not limited to, loss of proprietary information, legal and recovery costs, tarnished image, and loss of network service. Due to the dynamically changing topology and infrastructure less, decentralized characteristics, security is hard to achieve in mobile ad hoc networks. Hence, security mechanisms have to be a built-in feature for all sorts of ad hoc network based applications. 3. Working of Wormhole Attack in AODV In this study wormhole attack is considered (Lazos L. et al.2005, Khalil I. et al. 2005, Chiu H.S. et al. 2006). Wormhole attack is not that difficult to set up, but still can be immensely harmful for a MANET. Moreover, finding better techniques for detection of wormhole attacks and securing AODV against them 2
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 still remains a big challenge in Mobile Ad-hoc Networks. Working of AODV in the presence of wormhole attack is described using Figure1. In Figure 1 during path discovery process, sender “S” broadcasts RREQ to a destination node D. Thus nodes 24, 1, 2 and 3 neighbours of S, receive RREQ and forward RREQ to their neighbours. Now the malicious node M1 that receives RREQ forwarded by 25 records and tunnels the RREQ via the high-speed wormhole link to its partner M2. Malicious node M2 forwards RREQ to its neighbour 10, 9 and 26. Finally 26 forwards it to 27 and it will forward it to destination D. Thus, RREQ is forwarded via S-24-25-26-27-D. On the other hand, other RREQ packet is also forwarded through the path S-4-13-22-14-15-16-17-18-19- 20-21-27-D. However, as M1 and M2 are connected via a high speed bus, RREQ from S-24-25-26-27-D reaches first to D. The wormhole attack exits in the route selected in AODV according to shortest path S- 24-25-26-27-D. After getting the route requests to destination from the sender destination it will unicast a route reply packet to source “S” using shortest path. Source will select the shortest path as best route from source to destination for transmitting the data and other routes will be discarded. In above example destination “D” ignores the RREQ that reaches later and chooses D-27-26-25-24-S to unicast an RREP packet to the source node S. As a result, S chooses S-24-25-26-27-D route to send data that indeed passes through malicious M1 and M2 nodes that are very well placed in comparison to other nodes in the network. 4. Proposed Algorithm The following assumptions are taken in order to design the proposed algorithm. 1. A node interacts with its 1-hop neighbours directly and with other nodes via intermediate nodes using multi-hop packet forwarding. 2. Every node has a unique id in the network, which is assigned to a new node collaboratively by existing nodes. 3. The network is considered to be layered. 4. Source and Destination node will not be wormhole node. Steps of Modi_AODV Algorithm 1. Source node sends route request 2. Intermediate node forward request 3. If intermediate node is wormhole it tunnels the packet to next end 4. If packet reaches destination it send reply to source 5. If wormhole receive reply then it tunnels to another wormhole end 6. Reply reaches source node and start transmitting data packet through shortest path 7. Then source node send path message to all intermediate node upto destination 8. Intermediate node receive path message and select 2nd hop path node as target node 9. It sends route message to one hop neighbour alongwith other nodes in path 10. One hop neighbour receive route message and find alternate path to target node 11. If hop count of alternate path > hop count threshold 12. Then previous hop node of target is detected as wormhole node 13. Else no wormhole present. The working of routing largely depends upon successful transmission of packets to the destination. This requires proper selection of Routing path and algorithm. AODV and Modified AODV have been used in this paper for routing solutions. All the simulations have been performed using Network Simulator Ns-2.32 on the platform Fedora 13. The traffic sources are CBR (continuous bit–rate). The source-destination pairs are spread randomly over the network. The mobility model uses ‘random waypoint model’ in area 1000m x 750m with 25, 50, 75 and 100 nodes. During the simulation, each node starts its journey from a random spot to a random chosen destination. Once the destination is reached, the node takes a rest period of time in second and another random destination is chosen after that pause time. This process repeats throughout the simulation, causing continuous changes in the topology of the underlying network. Different network scenario for different number of nodes and different node transmission range are generated. 3
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Performance Metric: There are number of qualitative and quantitative metrics that can be used to compare reactive routing protocols. Most of the existing routing protocols ensure the qualitative metrics. Therefore we have used the following metrics. These performance metrics determines the completeness and correctness of the routing protocol. Performance metrics used here are: Packet Delivery Ratio, Throughput and Average end to end delay. In Figure 2 the End to End Delay Ratio is compared in AODV and Modified AODV protocol using number of mobile nodes as a parameter. This performance metric has been evaluated using 25, 50, 75 and 100 mobile nodes. The results shows that the End to End Delay Ratio is though increasing with the increase in number of nodes in AODV but still the performance of Modified AODV is excellent than AODV in all cases. Figure 3 shows the performance of throughput is compared for AODV and modified AODV by increasing the number of nodes. The results show that modified AODV gives stable good throughput in all cases but in the case of AODV’s throughput fluctuate and is low with the number of nodes 50. In Figure 4 packet delivery ratio has been evaluated for AODV and modified AODV protocols using 25, 50, 75 and 100 nodes. The PDR is very good of modified AODV in the comparison of AODV in all the situations. The result of modified AODV is slightly less with the high mobile nodes i.e. 100. In Figure 5 and Figure 6 control packets are displayed. In any wireless network if control packets are high the overhead will be high. In above mentioned both figures modified AODV have more routing overhead compared to AODV. Routing overhead increases when the number of nodes increases in the scenario. 6. Conclusion This paper has proposed an effective mechanism for AODV called modified AODV to detect and react to wormhole attacks and enhance the stability for MANETs. In all the comparisons shows that the results of modified AODV is much better and stable in the comparison of AODV. In AODV there are more fluctuations in the case of end to end delay ratio, PDR and throughput. But in the case of routing overhead its high compare to AODV. Finally, stability is getting the cost in the shape of routing overhead. In next paper trying to detect and remove wormhole attack from the MAENT. References Bouam S. and J. B. Othman (2003), “Data Security in Ad hoc Networks using MultiPath Routing”, in Proc. of the 14th IEEE PIMRC, pp. 1331-1335, Sept. 7-10, 2003. Chiu H.S. and K.S. Lui,(2006), “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”, In Proc. International Symposium on Wireless Pervasive Computing, Phuket, Thailand. D.B.J., Yih-Chun Hu, Adrian Perrig, (2002), “Ariadne: A secure on-demand routing protocol for ad-hoc networks”, Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002). Ghazizadeh S., O. Ilghami, E. Sirin, and F. Yaman, (2002), “Security-Aware Adaptive Dynamic Source Routing Protocol”, In Proc. of 27th Conference on Local Computer Networks, pp. 751-760, Nov. 6-8. Hu Y.C., A. Perrig, and D.B. Johnson,(2006), “Wormhole Attacks in Wireless Networks”, In IEEE JSAC, Vol. 24, No. 2, pp. 370-380. Inkinen Kai (2004), “New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes”, Helsinki University of Technology T-110.551, Seminar on Internetworking, Sjökulla. Khalil I., S. Bagchi, and N.B. Shroff,(2005), “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks”, In Proc. International Conference on Dependable System and Networks (DSN), Yokohama, Japan. Kush A. (2009) “Security Aspects in AD hoc Routing”, Computer Society of India Communications, Vol. no 32 Issue 11, pp. 29-33. Kush A. (2009), “Security and Reputation Schemes in Ad-Hoc Networks Routing”, International Journal of Information Technology and Knowledge Management, Volume 2, No. 1, pp. 185-189. 4
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Lazos L., R. Poovendan, C. Meadows, P. Syverson, and L.W. Chang,(2005), “Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach”, In Proc. IEEE Wireless Communications & Netwoking Conference (IEEE WCNC), New Orleans, USA. Qian ., N. Song, and X. Li (2005), “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multi-path”, In Proc. IEEE Wireless Communications & Netwoking Conference (IEEE WCNC), New Orleans, USA. Wenjia Li, Anupam Joshi, (2008), “Security Issues in Mobile Ad Hoc Networks- A Survey”, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, http://www.cs.umbc.edu/~wenjia1/ 699_report.pdf. Author 1: Mr. Vijay is research scholar at Graphic Era University Dehradun - India and is working as assistant professor at Guru Nanak Khalsa College Karnal – India. He has 8 research papers to his credit. His area of interest is security and stability in Mobile ad-hoc networks. Author 2: Dr. Ashwani Kush is working as Associate professor and head at university college, computer department, Kurukshetra university kurukshera India. He earned PhD in association with IIT Kanpur and KUK India on Ad hoc networks and has teaching experience of 20 years. Dr kush is member of IEEE, ACM, IAENG, IACSIT, CSI India and many other professional organizations. He has chaired sessions at Singapore, USA, India and Canada. He has more than 80 research papers to his credit. His areas of interest are Wireless networks, security, power awareness in Manet and e-goverance. He can be reached at akush@kuk.ac.in Figure1. Wormhole attack in AODV 5
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Figure 2: End to End Delay Ratio versus no. of nodes Figure 3: Throughput versus no. of packets per second 6
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Figure 4: Packet Delivery Ratio versus no. of packets per second Figure 5: Send Control Packets (RREQ/ REPLY) versus no. of nodes 7
  • 8. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Figure 6: Received Control Packets (RREQ/ REPLY) versus no. of nodes 8
  • 9. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).