SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) 
Volume No.2 Issue No. 4, August 2014 
(ETACICT-2014) 
24 
Security Issues and Performance Analysis for Ad Hoc on Demand Distance Vector Routing Protocol Networks By Dr. Brijesh Kr. Gupta, Tarun Chugh Prof. & Head, Dept. of Computer Applications, Galgotias College of Engineering & Technology, Greater Noida - 201 306, India, Asst. Prof., Department of Info. Tech. ITS Engineering College, Greater Noida – 201 306, India profbkgupta@gmail.com 
ABSTRACT Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator. Keywords: AODV, Mobile Ad-hoc Networks, Packet Dropped, Secure Networks, Throughput. 1. INTRODUCTION 
Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time [2], [4],and [7]. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. Typical challenges include routing, bandwidth constraints, security and power. 
Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too[6], [8] and [12]. Any malicious or misbehaving nodes can generate hostile attacks. These types of attacks can seriously damage basic aspects of security, such as integrity, confidentiality and privacy of the node. Current ad-hoc routing protocols are completely insecure. Moreover, existing secure routing mechanisms are either too expensive or have unrealistic requirements. Security requirements for ad-hoc routing protocols includes: 
• Certain discovery, meaning the route should always be found, if it exits between two nodes; 
• Isolating misbehaving nodes, making sure misbehaving nodes should always be identified and isolated from routing; and 
• Location privacy, protecting information about node location and network structure. 
2. NEED OF SECURITY IN MANET Security is one of the important aspects of this technology and it needs some serious attention. Users within the network want their communication to be secure. As current mobile ad-hoc networks do not have any strict security policy, this could possibly lead active attackers to easily exploit or possibly disable the mobile ad-hoc network. Security goals in mobile ad- hoc networks are reached through cryptographic mechanisms such as public key encryption or digital signature[13]. These mechanisms are backed by centralized key management where a trusted Certificate Authority (CA) provides public key certificate to mobile nodes in order to develop mutual trust between nodes. Any disturbance with the Certificate Authority can easily affect the security of the entire network[1]. 2.1. Attacks in Ad-hoc Routing Protocols
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) 
Volume No.2 Issue No. 4, August 2014 
(ETACICT-2014) 
25 
An active attack injects arbitrary packets and tries to disrupt the operation of the protocol in order to limit the availability, gain authentication, or attract packets destined or other nodes. A passive attack does not disrupt the operation of the protocol, but tries to discover valuable information by listening to traffic. Incorrect traffic generation includes attacks which consist in sending false control messages i.e. control messages sent on behalf of another node ( identity spoofing),or control messages which contain incorrect or outdated routing information. The consequences of this attack are degradation in network communications, unreachable nodes and possible routing loops[9]. Incorrect traffic relaying disrupts network communications coming from legitimate, protocol compliant nodes that are polluted by misbehaving nodes. In conclusion, most of the proposed routing solutions are, as yet, incomplete when it comes to security issues[10], and [11]. We can trust a routing mechanism only when it guarantees that all transmission will be protected. Rather than treating these problems on individual basis, we'll need to work out routing along with security in mobile ad-hoc network designs going into the future. 2.3 Security Implementation Issues in MANETs Securing wireless ad hoc networks is particularly difficult for many reasons including the following: 
• Vulnerability of channels. As in any wireless network, messages can be eavesdropped and fake messages can be injected into the network without the difficulty of having physical access to network components. 
• Vulnerability of nodes. Since the network nodes usually do not reside in physically protected places, such as locked rooms, they can more easily be captured and fall under the control of an attacker. 
• Absence of infrastructure. Ad hoc networks are supposed to operate independently of any fixed infrastructure. This makes the classical security solutions based on certification authorities and on-line servers inapplicable. 
• Dynamically changing topology. In mobile ad hoc networks, the permanent changes of topology require sophisticated routing protocols, the security of which is an additional challenge. A particular difficulty is that incorrect routing information can be generated by compromised nodes or as a result of some topology changes and it is hard to distinguish between the two cases. 
3. AD HOC ON DEMAND DISTANCE VECTOR (AODV) ROUTING PROTOCOL 
In AODV [3] nodes that do not lie on active paths neither maintain any routing information nor participate in any periodic routing table exchanges. Further a node does not have to discover and maintain a route to another node until the two needs to communicate unless the former node is offering its services as an intermediate forwarding station to maintain connectivity between two other nodes[5]. The algorithm’s primary objectives are: 
• To broadcast discovery packets only when necessary. 
• To disseminate information about changes in local connectivity to those neighboring mobile nodes those are likely to need the information. 
AODV is a combination of both DSDV (Destination sequenced distance vector) and DSR (Distance vector routing protocol), which can be explained as follows: AODV uses a broadcast route discovery mechanism as is also used with modifications in the Dynamic Source Routing (DSR) algorithm. To maintain the most recent routing information between nodes the concept of destination sequence number from DSDV is borrowed. The combination of these techniques yields an algorithm that uses bandwidth efficiently by minimizing the network load for control and data traffic is responsive to changes in topology and ensures loop free routing. Limitations In fact we consider AODV as the default routing protocol as it is presently going to be the acceptable standard for ad hoc network. So, we will highlight the major attacks on AODV or major flaws of this protocol. It is to be noted that it is not hard to transform similar type of attacks on other protocols, DSR for example. Known attacks on AODV are as follows: 
• Traffic redirection by modification 
• Replay attacks 
• Loop formation by spoofing 
• False Route Error 
Abu Raihan Mostofa Kamal [1] studied various types of existing routing protocols extensively with a view to finding security vulnerabilities. It is followed by highlighting major security attacks on Ad hoc On-demand Distance Vector (AODV) routing protocol which is on the verge of being the default routing standard for ad hoc network. Both the security requirement of applications and limitations of the mobile nodes have been carefully considered in order to design a feasible solution to counter possible attacks. Manel Gerrero Zapata and N. Asokan [8] gave a solution of securing AODV termed as Secure AODV (SAODV). The basic principal of SAODV protocol depends on the authenticating most of the fields of the RREQ/RREP packets and the use of hash chain to authenticate hop count field. In this work, authors proposes a solution which provides security for AODV routing protocol and study the relative performance of insecure AODV in ad-hoc networks. We used “Network Simulator” (version 2), developed at Berkley, to simulate the respective environment of ad-hoc network and then study the behavior of AODV protocol under different conditions. 
4. SIMULATION RESULTS FOR NETWORK SIZE OF 5 NODES 
In the following section, we have obtained results for AODV protocol keeping the network size of five nodes in terms of following parameters: 4.1 Throughput of Received Packets
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) 
Volume No.2 Issue No. 4, August 2014 
(ETACICT-2014) 
26 
After analyzing the graph below (Figure 1), we can conclude that AODV protocol performs fairly better when comes the case of throughput of received packets. During the whole transmission there is consistent reception of packets. Therefore, for a smaller number of nodes, both proactive and reactive protocols show same performance. But when our modified AODV protocol will be implemented then throughput may decrease due to process encryption and decryption that are used to provide security. So performance of AODV will be considerable but will provide security. 4.2 Packets Dropped When number of dropped packets / TIL (Time Interval Length) was plotted against simulation time (Figure 2) following results were obtained: AODV performs better among the four routing protocols because packets are not sent until a route is not found. This is the major characteristic of a reactive routing protocol. But still packets are dropped due to absence of security. So when our proposed solution will be simulated packets dropped will be low. Fig 1: Throughput of receiving packets Fig 2: Throughput of Dropped Packets 4. 3 End-to-End Delay 
This parameter comprises all kind of delay i.e. delay that occurs when the packet is stored in a buffer before the node transmits it to other node, transmission delay etc. The results of simulation are: In AODV route recovery is not very fast, therefore does not show a better delay performance than the other reactive protocols like DSR.It can be seen from graph (Figure 3). 
But AODV with only HELLO messages has lowest delay on data packets that are received. The reason is that it finds route faster or that the routes that are shorter or more optimal, instead AODV with only Hello messages is the AODV version that gets significantly fewest packets through the network. The packets that it successfully gets through the network have approximately the same low delay as for other AODV versions. The difference is that other AODV versions have portion of packets that have higher delay. So the average delay becomes higher. 
5. CONCLUSIONS 
Our purpose of obtaining these simulation results is to analyze how AODV protocol performs in the absence of security in different network scenario. From the simulation results we have seen the performance of insecure AODV taking different parameters and network sizes. Our proposed methodology provides secure routing and data transmission for AODV and will provide satisfactory performance results in simulation environment. Fig 3: Throughput Vs delay 6. REFERENCES [1] A. Perrig, R. Canetti, J. D. Tygar, and D. X. Song, “Efficient authentication and signing of multicast streams over lossy channels”, IEEE Symposium on Security and Privacy, 2000, pp 56–73. [2] A.S Tenenbaum, “Computer Networks”, 3rd Edition. Prentice Hall, 2000 [3] Charles E. Perkins and Elizabeth M. Belding-Royer, “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF, Internet draft, draft-ietf-manet-aodv-13.txt, 2003. [4] Elizabeth Royer and C-K Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications Magazine, April 1999, pp. 46-55. [5] George Coulouris, Jean Dollimore and Tim Kindberg “Distributed Systems Concepts and Design”, 3rd Edition, Pearson Education, 2004, pp 251-289. 
[6] Josh Broch, David A. Maltz, David B. Johnson, et al. “A Performance Comparison of Multi-Hop Wireless Ad Hoc
Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) 
Volume No.2 Issue No. 4, August 2014 
(ETACICT-2014) 
27 
Network Routing Protocols”, MOBICOM’98, October 1998. [7] L. Zhou and Z.J. Haas, “Securing ad hoc networks,” IEEE Network, 0890-8044, November/December 1999, pp. 24- 30. [8] M. Guerrero Zapata and N. Asokan, “Securing Ad Hoc Routing Protocols”, Proc. ACM Workshop on Wireless Security (WiSe), ACM Press, 2002, pp. 1–10. [9] Mike Burmester, Tri Van Le and Matt Weir, “Tracing Byzantine Faults In Ad Hoc Networks” ,Department of Computer Science, Florida State University, Tallahassee, Florida 32306, USA. [10] N.Asokan and P. Ginzboorg, “Key agreement in adhoc networks”, Elsevier Science, Computer Communications 23, 0140-3664/00, PII:S0140- 3664(00)00249-8, 2000, pp.1627-1637. [11] S. Marti et al. Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. Proc. 6th Ann. Int’l Conf. Mobile Computing and Networking (MobiCom 2000), ACM Press, 2000, pp. 255–265. [12] T. Clausen and P. Jacquet “Optimized Link State Routing Protocol (OLSR).” RFC 3626, IETF Network Working Group, October 2003. [13] William Stallings, Cryptography and Network Security, 2nd Edition, 1999, Chapter 13, 403.

Weitere ähnliche Inhalte

Was ist angesagt?

A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...IJCNCJournal
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231IJRAT
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks IJNSA Journal
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
 

Was ist angesagt? (19)

A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
U0 vqmtq2o tk=
U0 vqmtq2o tk=U0 vqmtq2o tk=
U0 vqmtq2o tk=
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
 
Ijariie1170
Ijariie1170Ijariie1170
Ijariie1170
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
 

Ähnlich wie Security Issues and Performance of AODV Routing Protocol

A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
 

Ähnlich wie Security Issues and Performance of AODV Routing Protocol (20)

A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
ant2
ant2ant2
ant2
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
 
Aodv
AodvAodv
Aodv
 

Mehr von Editor Jacotech

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Editor Jacotech
 
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISMOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISEditor Jacotech
 
Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Editor Jacotech
 
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...Editor Jacotech
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...Editor Jacotech
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesEditor Jacotech
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using androidEditor Jacotech
 
Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Editor Jacotech
 
Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Editor Jacotech
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...Editor Jacotech
 
Design of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachDesign of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachEditor Jacotech
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Editor Jacotech
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
 
Leader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyLeader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyEditor Jacotech
 
Leader election approach a comparison and survey
Leader election approach a comparison and surveyLeader election approach a comparison and survey
Leader election approach a comparison and surveyEditor Jacotech
 
Modeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientModeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientEditor Jacotech
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using androidEditor Jacotech
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofEditor Jacotech
 

Mehr von Editor Jacotech (20)

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
 
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSISMOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
MOVIE RATING PREDICTION BASED ON TWITTER SENTIMENT ANALYSIS
 
Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...Non integer order controller based robust performance analysis of a conical t...
Non integer order controller based robust performance analysis of a conical t...
 
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
FACTORS CAUSING STRESS AMONG FEMALE DOCTORS (A COMPARATIVE STUDY BETWEEN SELE...
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...The Impact of Line Resistance on the Performance of Controllable Series Compe...
The Impact of Line Resistance on the Performance of Controllable Series Compe...
 
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-BoxesSecurity Strength Evaluation of Some Chaos Based Substitution-Boxes
Security Strength Evaluation of Some Chaos Based Substitution-Boxes
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
 
Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...Performance analysis of aodv with the constraints of varying terrain area and...
Performance analysis of aodv with the constraints of varying terrain area and...
 
Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...Modeling of solar array and analyze the current transient response of shunt s...
Modeling of solar array and analyze the current transient response of shunt s...
 
License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...License plate recognition an insight to the proposed approach for plate local...
License plate recognition an insight to the proposed approach for plate local...
 
Design of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approachDesign of airfoil using backpropagation training with mixed approach
Design of airfoil using backpropagation training with mixed approach
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
 
Leader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and SurveyLeader Election Approach: A Comparison and Survey
Leader Election Approach: A Comparison and Survey
 
Leader election approach a comparison and survey
Leader election approach a comparison and surveyLeader election approach a comparison and survey
Leader election approach a comparison and survey
 
Modeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transientModeling of solar array and analyze the current transient
Modeling of solar array and analyze the current transient
 
Traffic detection system using android
Traffic detection system using androidTraffic detection system using android
Traffic detection system using android
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints of
 

Kürzlich hochgeladen

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Kürzlich hochgeladen (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Security Issues and Performance of AODV Routing Protocol

  • 1. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 4, August 2014 (ETACICT-2014) 24 Security Issues and Performance Analysis for Ad Hoc on Demand Distance Vector Routing Protocol Networks By Dr. Brijesh Kr. Gupta, Tarun Chugh Prof. & Head, Dept. of Computer Applications, Galgotias College of Engineering & Technology, Greater Noida - 201 306, India, Asst. Prof., Department of Info. Tech. ITS Engineering College, Greater Noida – 201 306, India profbkgupta@gmail.com ABSTRACT Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too. Security in Mobile Ad hoc Networks (MANETs) is an important issue in need of a solution that not only works well with a small network, but also sustains efficiency and scalability. In ad hoc environment, much of the research has been done focusing on the efficiency of the network. Therefore, there are a number of routing protocols that provide good efficiency. Considering security has radically changed the situation, for all of the existing routing protocols are designed with an assumption that the participating players and the network environment do not harm the security. It highly contradicts with the reality. Most of the secure routing protocols have the various disadvantages. In this paper a trusted solution is provided for routing in ad hoc network. The routing protocol is modified by relating the security components. Finally, the simulation results of insecure AODV are studied using simulator. Keywords: AODV, Mobile Ad-hoc Networks, Packet Dropped, Secure Networks, Throughput. 1. INTRODUCTION Mobile ad-hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time [2], [4],and [7]. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. Typical challenges include routing, bandwidth constraints, security and power. Mobile ad-hoc networks are highly dynamic; topology changes and link breakage happen quite frequently. Therefore, we need a security solution, which is dynamic, too[6], [8] and [12]. Any malicious or misbehaving nodes can generate hostile attacks. These types of attacks can seriously damage basic aspects of security, such as integrity, confidentiality and privacy of the node. Current ad-hoc routing protocols are completely insecure. Moreover, existing secure routing mechanisms are either too expensive or have unrealistic requirements. Security requirements for ad-hoc routing protocols includes: • Certain discovery, meaning the route should always be found, if it exits between two nodes; • Isolating misbehaving nodes, making sure misbehaving nodes should always be identified and isolated from routing; and • Location privacy, protecting information about node location and network structure. 2. NEED OF SECURITY IN MANET Security is one of the important aspects of this technology and it needs some serious attention. Users within the network want their communication to be secure. As current mobile ad-hoc networks do not have any strict security policy, this could possibly lead active attackers to easily exploit or possibly disable the mobile ad-hoc network. Security goals in mobile ad- hoc networks are reached through cryptographic mechanisms such as public key encryption or digital signature[13]. These mechanisms are backed by centralized key management where a trusted Certificate Authority (CA) provides public key certificate to mobile nodes in order to develop mutual trust between nodes. Any disturbance with the Certificate Authority can easily affect the security of the entire network[1]. 2.1. Attacks in Ad-hoc Routing Protocols
  • 2. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 4, August 2014 (ETACICT-2014) 25 An active attack injects arbitrary packets and tries to disrupt the operation of the protocol in order to limit the availability, gain authentication, or attract packets destined or other nodes. A passive attack does not disrupt the operation of the protocol, but tries to discover valuable information by listening to traffic. Incorrect traffic generation includes attacks which consist in sending false control messages i.e. control messages sent on behalf of another node ( identity spoofing),or control messages which contain incorrect or outdated routing information. The consequences of this attack are degradation in network communications, unreachable nodes and possible routing loops[9]. Incorrect traffic relaying disrupts network communications coming from legitimate, protocol compliant nodes that are polluted by misbehaving nodes. In conclusion, most of the proposed routing solutions are, as yet, incomplete when it comes to security issues[10], and [11]. We can trust a routing mechanism only when it guarantees that all transmission will be protected. Rather than treating these problems on individual basis, we'll need to work out routing along with security in mobile ad-hoc network designs going into the future. 2.3 Security Implementation Issues in MANETs Securing wireless ad hoc networks is particularly difficult for many reasons including the following: • Vulnerability of channels. As in any wireless network, messages can be eavesdropped and fake messages can be injected into the network without the difficulty of having physical access to network components. • Vulnerability of nodes. Since the network nodes usually do not reside in physically protected places, such as locked rooms, they can more easily be captured and fall under the control of an attacker. • Absence of infrastructure. Ad hoc networks are supposed to operate independently of any fixed infrastructure. This makes the classical security solutions based on certification authorities and on-line servers inapplicable. • Dynamically changing topology. In mobile ad hoc networks, the permanent changes of topology require sophisticated routing protocols, the security of which is an additional challenge. A particular difficulty is that incorrect routing information can be generated by compromised nodes or as a result of some topology changes and it is hard to distinguish between the two cases. 3. AD HOC ON DEMAND DISTANCE VECTOR (AODV) ROUTING PROTOCOL In AODV [3] nodes that do not lie on active paths neither maintain any routing information nor participate in any periodic routing table exchanges. Further a node does not have to discover and maintain a route to another node until the two needs to communicate unless the former node is offering its services as an intermediate forwarding station to maintain connectivity between two other nodes[5]. The algorithm’s primary objectives are: • To broadcast discovery packets only when necessary. • To disseminate information about changes in local connectivity to those neighboring mobile nodes those are likely to need the information. AODV is a combination of both DSDV (Destination sequenced distance vector) and DSR (Distance vector routing protocol), which can be explained as follows: AODV uses a broadcast route discovery mechanism as is also used with modifications in the Dynamic Source Routing (DSR) algorithm. To maintain the most recent routing information between nodes the concept of destination sequence number from DSDV is borrowed. The combination of these techniques yields an algorithm that uses bandwidth efficiently by minimizing the network load for control and data traffic is responsive to changes in topology and ensures loop free routing. Limitations In fact we consider AODV as the default routing protocol as it is presently going to be the acceptable standard for ad hoc network. So, we will highlight the major attacks on AODV or major flaws of this protocol. It is to be noted that it is not hard to transform similar type of attacks on other protocols, DSR for example. Known attacks on AODV are as follows: • Traffic redirection by modification • Replay attacks • Loop formation by spoofing • False Route Error Abu Raihan Mostofa Kamal [1] studied various types of existing routing protocols extensively with a view to finding security vulnerabilities. It is followed by highlighting major security attacks on Ad hoc On-demand Distance Vector (AODV) routing protocol which is on the verge of being the default routing standard for ad hoc network. Both the security requirement of applications and limitations of the mobile nodes have been carefully considered in order to design a feasible solution to counter possible attacks. Manel Gerrero Zapata and N. Asokan [8] gave a solution of securing AODV termed as Secure AODV (SAODV). The basic principal of SAODV protocol depends on the authenticating most of the fields of the RREQ/RREP packets and the use of hash chain to authenticate hop count field. In this work, authors proposes a solution which provides security for AODV routing protocol and study the relative performance of insecure AODV in ad-hoc networks. We used “Network Simulator” (version 2), developed at Berkley, to simulate the respective environment of ad-hoc network and then study the behavior of AODV protocol under different conditions. 4. SIMULATION RESULTS FOR NETWORK SIZE OF 5 NODES In the following section, we have obtained results for AODV protocol keeping the network size of five nodes in terms of following parameters: 4.1 Throughput of Received Packets
  • 3. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 4, August 2014 (ETACICT-2014) 26 After analyzing the graph below (Figure 1), we can conclude that AODV protocol performs fairly better when comes the case of throughput of received packets. During the whole transmission there is consistent reception of packets. Therefore, for a smaller number of nodes, both proactive and reactive protocols show same performance. But when our modified AODV protocol will be implemented then throughput may decrease due to process encryption and decryption that are used to provide security. So performance of AODV will be considerable but will provide security. 4.2 Packets Dropped When number of dropped packets / TIL (Time Interval Length) was plotted against simulation time (Figure 2) following results were obtained: AODV performs better among the four routing protocols because packets are not sent until a route is not found. This is the major characteristic of a reactive routing protocol. But still packets are dropped due to absence of security. So when our proposed solution will be simulated packets dropped will be low. Fig 1: Throughput of receiving packets Fig 2: Throughput of Dropped Packets 4. 3 End-to-End Delay This parameter comprises all kind of delay i.e. delay that occurs when the packet is stored in a buffer before the node transmits it to other node, transmission delay etc. The results of simulation are: In AODV route recovery is not very fast, therefore does not show a better delay performance than the other reactive protocols like DSR.It can be seen from graph (Figure 3). But AODV with only HELLO messages has lowest delay on data packets that are received. The reason is that it finds route faster or that the routes that are shorter or more optimal, instead AODV with only Hello messages is the AODV version that gets significantly fewest packets through the network. The packets that it successfully gets through the network have approximately the same low delay as for other AODV versions. The difference is that other AODV versions have portion of packets that have higher delay. So the average delay becomes higher. 5. CONCLUSIONS Our purpose of obtaining these simulation results is to analyze how AODV protocol performs in the absence of security in different network scenario. From the simulation results we have seen the performance of insecure AODV taking different parameters and network sizes. Our proposed methodology provides secure routing and data transmission for AODV and will provide satisfactory performance results in simulation environment. Fig 3: Throughput Vs delay 6. REFERENCES [1] A. Perrig, R. Canetti, J. D. Tygar, and D. X. Song, “Efficient authentication and signing of multicast streams over lossy channels”, IEEE Symposium on Security and Privacy, 2000, pp 56–73. [2] A.S Tenenbaum, “Computer Networks”, 3rd Edition. Prentice Hall, 2000 [3] Charles E. Perkins and Elizabeth M. Belding-Royer, “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF, Internet draft, draft-ietf-manet-aodv-13.txt, 2003. [4] Elizabeth Royer and C-K Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications Magazine, April 1999, pp. 46-55. [5] George Coulouris, Jean Dollimore and Tim Kindberg “Distributed Systems Concepts and Design”, 3rd Edition, Pearson Education, 2004, pp 251-289. [6] Josh Broch, David A. Maltz, David B. Johnson, et al. “A Performance Comparison of Multi-Hop Wireless Ad Hoc
  • 4. Journal of Advanced Computing and Communication Technologies (ISSN: 2347 - 2804) Volume No.2 Issue No. 4, August 2014 (ETACICT-2014) 27 Network Routing Protocols”, MOBICOM’98, October 1998. [7] L. Zhou and Z.J. Haas, “Securing ad hoc networks,” IEEE Network, 0890-8044, November/December 1999, pp. 24- 30. [8] M. Guerrero Zapata and N. Asokan, “Securing Ad Hoc Routing Protocols”, Proc. ACM Workshop on Wireless Security (WiSe), ACM Press, 2002, pp. 1–10. [9] Mike Burmester, Tri Van Le and Matt Weir, “Tracing Byzantine Faults In Ad Hoc Networks” ,Department of Computer Science, Florida State University, Tallahassee, Florida 32306, USA. [10] N.Asokan and P. Ginzboorg, “Key agreement in adhoc networks”, Elsevier Science, Computer Communications 23, 0140-3664/00, PII:S0140- 3664(00)00249-8, 2000, pp.1627-1637. [11] S. Marti et al. Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. Proc. 6th Ann. Int’l Conf. Mobile Computing and Networking (MobiCom 2000), ACM Press, 2000, pp. 255–265. [12] T. Clausen and P. Jacquet “Optimized Link State Routing Protocol (OLSR).” RFC 3626, IETF Network Working Group, October 2003. [13] William Stallings, Cryptography and Network Security, 2nd Edition, 1999, Chapter 13, 403.