CHAPTER 1 INTRODUCTION 1.1 MOBILE AD HOC NETWORK

Size: px
Start display at page:

Download "CHAPTER 1 INTRODUCTION 1.1 MOBILE AD HOC NETWORK"

Transcription

1 CHAPTER 1 INTRODUCTION 1.1 MOBILE AD HOC NETWORK A Mobile Ad hoc Network (MANET) is a self configurable collection of any number of wireless mobile devices. All the nodes in a multi-hop wireless ad hoc network cooperate with each other to form a network without the presence of any infrastructure such as access point or base station as shown in Figure 1.1. In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside the transmission range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of wireless transmission such as attenuation, multipath propagation, interference etc. create a challenge for routing protocols operating in MANET. The challenges are enhanced by the various types of devices of limited processing power and capabilities that may join in the network. We quote the definition of a mobile ad hoc network from the charter of the corresponding Internet Engineering Task Force (IETF): A Mobile Ad hoc Network (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links-the union of which forms an arbitrary graph. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion, or may be connected to the larger Internet" [INT1994]. 1.2 MANET CHARACTERISTICS MANET is a new paradigm of networks, offering unrestricted mobility without any underlying infrastructure. Following are the characteristics of a MANET [SCO1999]: Dynamic Topologies: The network topology may change randomly and have no restriction on their distance from other nodes. As a result of this random movement, the whole topology 1

2 is changing in an unpredictable manner, which in turn gives rise to both directional as well as unidirectional links between the nodes. [STE2004] Figure 1.1: A Typical Mobile Ad hoc Network Energy Constrained Operation: Almost all the nodes in MANET rely on batteries or other exhaustive means for their energy. The battery depletes due to extra work performed by the node in order to survive the network. Therefore, energy conservation is an important design optimization criterion. Bandwidth Constraint: Wireless links have significantly lower capacity [SVA2001] than infrastructures networks. Throughput of wireless communication is much less because of the effect of the multiple access, fading, noise, interference conditions. As a result of this, congestion becomes a bottleneck in bandwidth utilization. Limited Physical Security: MANET are generally more prone to physical security threats than wireless networks because the ad hoc network is a distributed system and all the security threats relevant to such a system are pretty much present, as a result, there is an increased possibility of eavesdropping, spoofing, masquerading [VIK2006], and denial-of-service type attacks. 1.3 MANET APPLICATIONS To understand the nature of MANET and the origin of their unique characteristics, the potential applications of ad hoc networks are briefly considered. MANET have applications in two major fields: military and commercial environments. 2

3 Military Applications The origin of networks that rely on no pre-existing infrastructure can be traced back to the early 1970s with the DARPA and PRNET projects [CKT2001] [ZJH2002], where the initial focus was on military applications. The application of ad hoc networks in a military environment is particularly attractive because of their lack of infrastructure and self-organizing nature. Consider conventional networks that rely on infrastructure such as base stations: the infrastructure introduces points of vulnerability which may be attacked and, if eliminated, dismantle the operation of the entire network. In battlefield scenarios robust and guaranteed communication is essential with potentially fatal consequences if compromised. Ad hoc networks can continue to exist even in the event of nodes disappearing or becoming disconnected due to poor wireless connectivity, moving out of range, physical attack on users, broken nodes, battery depletion or physical node damage. Applications such as sensor networks [IFA2002], positional communication systems and tactical ad hoc networks [JJU1987] will continue to be one of the driving forces behind ad hoc network development. Commercial Applications Commercial applications of ad hoc networks may include deployment of connectivity in terrains where conventional networks, such as cellular networks, are not financially viable, cannot provide sufficient coverage or need by-passing. Private networks or personal area networks (for the purpose of teleconferencing, video conferencing, peer-to-peer communications, ad hoc meetings, or more generally, collaborative applications of all kinds) are possible applications of ad hoc networks. It is anticipated that these applications will gain momentum as soon as the flexibility and convenience of self-organized ad hoc networking is fully appreciated and protocols are implemented with commercially available products. Take for example cellular networks, what was once seen as an impractical technology has now become a necessity. Emergency situations caused by geopolitical instability, natural or man-made disaster could result in existing networking infrastructure being damaged or unreliable. For example, Hurricane Katrina struck New Orleans, Louisiana on August 29, The storm destroyed most of the fixed communication infrastructure as it blanketed approximately 90,000 square 3

4 miles of the Unites States, a region almost as large as the United Kingdom [FEM2005]. In order to launch an effective disaster relief operation, communication is of the essence, even between a localized group of relief workers. Open MANET will make it possible for relief workers from various countries to establish communication on the fly, therefore eliminating the time penalty in setting up and managing conventional, fixed infrastructure networks. Search and rescue missions could also be conducted in locations not allowing access to existing communication networks [MRA2005]. Vehicular ad hoc networks allow vehicles travelling along a highway to exchange data for traffic congestion monitoring, inter vehicle communication and early warning of potential dangers ahead such as an accident, road obstruction or stationary vehicle. Several research projects have been initiated to deal with vehicular ad hoc networking [RMO2000] [WFR2001]. 1.4 CLASSIFICATION OF MANET ROUTING For the nature and challenges found in designing an ad hoc network routing protocol, a large amount of work has been done in the research community to find a perfect routing protocol for wireless ad hoc networks [STE2003]. The research has resulted to a number of routing protocols which can be classified as table-driven or proactive, on-demand or reactive and hybrid routing protocols [CSI2004] and shown in Figure 1.2. Table-Driven or Proactive Protocols: Proactive routing protocols attempt to maintain consistent, up-to-date routing information between every pair of nodes in the network by propagating, proactively, route updates at fixed intervals. As the resulting information is usually maintained in tables, the protocols are sometimes referred to as table-driven protocols. Representative proactive protocols include: Destination-Sequenced Distance Vector (DSDV) routing [CEP1994], Clustered Gateway Switch Routing (CGSR) [CCC1997], Wireless Routing Protocol (WRP) [SMU1996], and Optimized Link State Routing (OLSR) [PJA1998]. On-Demand or Reactive Protocols: A different approach from table-driven routing is reactive or on-demand routing. These protocols depart from the legacy Internet approach. Reactive protocols, unlike table-driven ones, establish a route to a destination when there is a demand for it, usually initiated by the source node through discovery process within the 4

5 network. Once a route has been established, it is maintained by the node until either the destination becomes inaccessible or until the route is no longer used or has expired. Representative reactive routing protocols include: Dynamic Source Routing (DSR) [DBJ1996], Ad hoc On Demand Distance Vector (AODV) routing [CEP1999], Temporally Ordered Routing Algorithm (TORA) [VDP1997] and Associativity Based Routing (ABR) [CKT1996]. Figure 1.2: Classification of MANET Routing Protocols Hybrid Routing Protocols: Purely proactive or purely reactive protocols perform well in a limited region of network setting. However, the diverse applications of ad hoc networks across a wide range of operational conditions and network configuration pose a challenge for a single protocol to operate efficiently [GEO2004]. For example, reactive routing protocols are well suited for networks where the call-to-mobility ratio is relatively low. Proactive routing protocols, on the other hand, are well suited for networks where this ratio is relatively high. The performance of either class of protocols degrades when the protocols are applied to regions of ad hoc networks space between the two extremes. Researchers advocate that the issue of efficient operation over a wide range of conditions can be addressed by a hybrid routing approach, where the proactive and the reactive behavior is mixed in the amounts that best match these operational conditions. Representative hybrid routing protocols include: Zone Routing Protocol (ZRP) [HAA2002] and Zone-based Hierarchal Link State routing protocol (ZHLS) [MJO1999]. 5

6 In the following sub sections we examine three protocols, the Dynamic Source Routing (DSR) Protocol, Ad hoc On-demand Distance Vector (AODV) routing protocol and Optimized Link-State Routing (OLSR), as they were found useful for the thesis work. DSR and AODV fall under reactive family, where as, OLSR is a proactive routing protocol Dynamic Source Routing (DSR) DSR [DAV2003] is a source routing protocol which means every packet will carry the list of the nodes that it will traverse to reach the destination. Every node which receives the packet first verifies whether it is the destination of the packet. If it is not, it checks its own identifier in the list of nodes carried by the packet. If the node finds itself in the list then it forwards the packet to the next node in the list which must be a direct neighbor. Otherwise it drops the packet. DSR have three main advantages. First, it is trivial to detect routing loops by identifying the repeating values in the list of node identifiers in the packet header. Second, the forwarding nodes need not to keep updated routing information to forward the packet towards the destination as it is available in the packet header and is provided by the packet source. Third, each node that receives the packet can extract routes from the packet header and cache it locally for future use. The main disadvantage of DSR is the communication overhead that each packet has to carry. This limits the applicability of the protocol in highly resource constrained environment such as sensor network and in large network where routes can be very long. DSR contains 2 phases * Route Discovery (find a path) * Route Maintenance (maintain a path) Route Discovery Route Request: Source broadcasts Route Request message for specified destination. Intermediate node adds itself to path in message and forwards (broadcasts) message toward destination as shown in Figure 1.3. Route Reply: Destination unicasts Route Reply message to source that contains complete path built by intermediate nodes. Route Maintenance In DSR, every node is responsible for confirming that the next hop in the source route 6

7 receives the packet. Also each packet is only forwarded once by a node (hop-by-hop routing). If a packet can t be received by a node, it is retransmitted up to some maximum number of times until a confirmation is received from the next hop. Figure 1.3: Route Discovery by DSR Figure 1.4: DSR Route Error As shown in Figure 1.4, if retransmission results in a failure, a Route Error message is sent to the initiator that can remove that Source Route from its Route Cache. So the initiator can check his Route Cache for another route to the target. If there is no route in the cache, a Route Request packet is broadcasted Ad hoc On-demand Distance Vector Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol for MANET and other wireless ad-hoc networks. It is jointly developed in Nokia Research Center, University of California, Santa Barbara and University of Cincinnati. AODV [CPE2003] Routing protocol uses an on-demand approach for finding routes, that is, a route is established only when it is required by a source node for transmitting data packets as shown in figure 1.5. It employs destination sequence numbers to identify the most recent path. AODV performs the following operations: Route Discovery: whenever a node needs a next hop to forward a packet to a destination 7

8 Route Maintenance: when link breaks, rendering next hop unusable[jua2000] 1 D S 2 Figure 1.5: Route Discovery by AODV Figure 1.6: AODV Protocol s Events AODV has following events as shown in Figure 1.6. Hello: Hello messages are beacon signals used for link level acknowledgement with neighboring nodes. RREQ: AODV builds routes using a route request / route reply query cycle. When a source node desires a route to a destination for which it does not already have a route, it broadcasts a Route Request (RREQ) packet across the network. Nodes receiving this packet update their information for the source node and set up backwards pointers to the source node in the route tables. In addition to the source node's IP address, current sequence number, and broadcast ID, the RREQ also contains the most recent sequence number for the destination of which the source node is aware. A node receiving the RREQ may send a Route Reply (RREP) RREP: A node receiving the RREQ may send a route reply (RREP) if it is either the destination or if it has a route to the destination with corresponding sequence number greater than or equal to that contained in the RREQ. If this is the case, it uncast a 8

9 RREP back to the source. Otherwise, it rebroadcasts the RREQ. Nodes keep track of the RREQs source IP address and broadcast ID. If they receive a RREQ which they have already processed, they discard the RREQ and do not forward it. As the RREP propagates back to the source, nodes set up forward pointers to the destination. Once the source node receives the RREP, it may begin to forward data packets to the destination. If the source later receives a RREP containing a greater sequence number or contains the same sequence number with a smaller hop-count, it may update its routing information for that destination and begin using the better route. RERR: If a link break occurs while the route is active, the node upstream of the break propagates a route error (RERR) message to the source node to inform it of the now unreachable destination(s). After receiving the RERR, if the source node still desires the route, it can reinitiate route discovery. Advantages and Disadvantages The main advantage of this protocol is that routes are established on demand and destination sequence numbers are used to find the latest route to the destination. The connection setup delay is lower. One of the disadvantages of this protocol is that intermediate nodes can lead to inconsistent routes if the source sequence number is very old and the intermediate nodes have a higher but not the latest destination sequence number, thereby having stale entries. Also multiple Route-Reply packets in response to a single Route Request packet can lead to heavy control overhead. Another disadvantage of AODV is that the periodic beaconing leads to unnecessary bandwidth consumption [JUA2000] Optimized Link State Routing Protocol (OLSR) The Optimized Link State Routing protocol [TCL 2003] is a proactive link state routing protocol. OLSR is explained in IETF s [RFC 3626] and it is largely still in the experimental phase. There are two types of control packets used in OLSR: Hello packets and Topology Control packets (TC). Neighborhood Discovery: Hello packets are used to build the neighborhood of a node and to discover the nodes that are within the vicinity of the node and hello packets are also used to compute the multipoint relays of a node. OLSR uses the periodic broadcast of hello packets 9

10 to sense the neighborhood of a node and to verify the symmetry of radio links. The Hello messages are received by all one-hop neighbors, but are not forwarded. For every fixed interval, known as Hello Interval, the nodes will broadcast hello messages. Hello messages also allow the nodes to discover its two-hop neighbors since the node can passively listen to the transmission of its one-hop neighbor. The status of these links with the other nodes in its neighborhood can be asymmetric, symmetric or MultiPoint Relay (MPR). A symmetric link means that connectivity is bi-directional whereas asymmetric links are unidirectional. Given the set of one-hop and two-hop neighbors, a node can then proceed to select its multipoint relays, which will enable the node to reach out to all the neighbors within a two-hop range. Every node k will keep a MPR selector set, which contains all the nodes that has selected node k as a MPR. Hence, node k can only re-broadcast messages received from the nodes found in the MPR selector set [TCL 2003]. Topology Dissemination and Routing Table Calculation: Topology control (TC) messages contain the MPR selector set information of a particular node k. These TC messages are broadcast periodically within the TC interval, to other MPRs, which can further relay the information to further MPRs. Thus, any nodes within a network can be accessed either directly or through the MPRs. With the neighborhood and topological information, nodes can construct the entire network routing table. Routing to other nodes is calculated using the shortest path algorithm such as Dijkstra s algorithm. Sequence numbers are used to ensure that the routing update information is not stale. Whenever there are changes to the topology or within the neighborhood, the MPR set is re-calculated, updates are sent to the entire network so that the routing has to be re-calculated to update the route information to each known destination in the network. Full Flooding Vs Multipoint Relays: As specified above, hello messages are exchanged only between nodes one-hop away. Since the size of the MANET can be considerable, there is a need for a more efficient way of disseminating topological information. The traditional method would be pure full flooding into the network. While simple in implementation, it is not efficient since a great many control overheads are generated and not all are useful. Since a node within a network can be reached via many nodes (within the radio transmission range), only one node is necessary to transmit the message to it instead of multiple copies of the same message. MPR is a concept designed to reduce these control overheads by allowing 10

11 selective flooding to occur. Only selected MPR nodes are allowed to re-broadcast topological information as shown in Figure 1.7. (a) Pure Flooding (b) MPR Flooding Figure 1.7: Comparison of Pure Flooding and MPR Flooding 1.5 FLAWS IN MANET SECURITY MANET is very flexible for the nodes i.e. nodes can freely join and leave the network. There is no main body that keeps watching on the nodes entering and leaving the network. All these features of MANET make it vulnerable to different types of attacks. Non Secure Boundaries: MANET is vulnerable to different kind of attacks due to no clear secure boundary. In MANET, Node can join a network automatically if the network is in the radio range of the node, thus it can communicate with other nodes in the network. Due to no secure boundaries, MANET is more susceptible to attacks [SLU2009]. The attacks may be passive or active, leakage of information, false message reply, denial of service or changing the data integrity. The links are compromised and are open to link spoofing attack. [AMI2003]. There is no protection mechanism such as firewalls or access control, which may result the vulnerability of MANET to attacks. Spoofing of node s identity, data tempering, confidential information leakage and impersonating node are the results of such attacks when security is 11

12 compromised [CKT2002]. Compromised Node: Some of the attacks are to get access inside the network in order to get control over the node in the network using unfair means to carry out their malicious activities. Mobile nodes in MANET are autonomous and due to this autonomy during communication, ad-hoc network mobility makes it easier for a compromised node to change its position so frequently making it more difficult and troublesome to track the malicious activity [DBR2009]. It can be seen that the threats from compromised nodes inside the network is more dangerous than attacking threats from outside the network. No Central Management: MANET is a self-configurable network, which consists of mobile nodes where the communication among these nodes is done without a central control. Each and every node act as router and can forward and receive packets [CAR2005]. MANET works without any preexisting infrastructure. Detecting attacks and monitoring the traffic in highly dynamic and for large scale ad hoc network is very difficult due to no central management. The node connect with each other on the basis of blind mutual trust, a central entity can manage this by applying a filter on the nodes to find out the suspicious one, and let the other nodes know which node is suspicious [YON2005] [CKT2002] Shared Broadcast Radio Channel: This is in opposition to wired networks, where a separate dedicated transmission line can be provided between two end users. The radio channel used for communication in a MANET is broadcast in nature, and is shared by all nodes in the network, allowing a malicious node to easily obtain data being transmitted [JAM2002]. Lack of Association: Because of dynamic topology of MANET, there is no proper authentication mechanism that associates nodes with a network. Thus, an intruder would be able to join the network easily and carry out attacks [CKT2002]. Limited Resource Availability: The resources in MANET such as bandwidth, battery power, and computational power are limited, making it difficult to implement complex cryptography-based security mechanism in such networks [JAM2002]. Problem of Scalability: In traditional networks, where the network is build and each machine is connected to the other machine with help of wire. The network and the scale of the network, while designing it is defined and that do not change much during the use. In other words we can say that the scalability of the network is defined in the beginning phase 12

13 of the designing of the network [PAN2003]. The case is quite opposite in MANET because the nodes are mobile and due to their mobility in MANET, the scale of the MANET is changing. It is too hard to know and predict the numbers of nodes in the MANET in the future. The nodes are free to move in and out of the ad hoc network which makes the MANET very much scalable and shrinkable. Keeping this property of the MANET, the protocols and all the services including security that a MANET provides must be adaptable to such changes [YON2005]. 1.6 PROBLEM AREA IN MANET SECURITY Despite the evolution of MANET over the past decade there are still a number of security related problems that are open. This means that although solutions have been proposed none seem to satisfy all the constraints of MANET. Figure 1.8 illustrates the areas investigated within the MANET field with particular focus on security issues. Key areas of MANET security focused in this research are described next Secure Routing MANET routing protocols are designed considering efficiency as a primary concern and assume nodes cooperation. Thus, number of attacks based on routing mechanism are in MANET i.e. blackhole attack, wormhole attack, routing table overflow attack, sleep depreciation attack, location disclosure and impersonation attack, Denial of Service (DoS) attack. In blackhole attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In wormhole, two malicious collaborating nodes which are connected through a private network, can record packets at one location in the network and tunnel them to another location through the private network and retransmits them into the network. In routing table overflow, the attacker attempts to create routes to nonexistent nodes. The goal is to create enough routes to prevent new routes from being created or to overwhelm the protocol implementation. Sleep deprivation attack is practical only in mobile ad hoc networks, where battery life is a critical parameter. Battery powered devices try to conserve energy by transmitting only when absolutely necessary. An attacker can attempt to consume batteries by requesting routes, or by forwarding unnecessary packets to the node using, for 13

14 example, a black hole attack. A location disclosure attack can reveal something about the locations of nodes or the structure of the network. Routing Protocol Reasoning about Trust Power Management Self organizing Networks Quality of Service Novel threats Vulnerabilities Sensor Networks Intrusion Detection Ad hoc Networking Security DoS prevention Vehicular Networks PKI Implementation Symmetric key Management Multicasting Protocols Secure Routing Public key Management MAC protocols Access Control Key Transport (Centralized) Peer-to-Peer Key Management Key Management Key Agreement (Contributory) Group Key Management Figure1.8: Area of Interest in MANET The information gained might reveal which other nodes are adjacent to the target, or the 14

15 physical location of a node. DoS attacks are among the most prominent types of attacks. In denial of service attacks the adversary prevents or prohibits the normal use or management of network facilities or functionality. DoS attacks can be launched at any layer of an ad hoc network to exhaust node resources. Thus, secure routing in MANET is necessary that allow only authorized nodes to perform route computation and discovery even if few nodes in the network have been compromised Key Management Cryptographic schemes are used to protect both routing information and data traffic. Use of such schemes usually requires a key management service. Key management is a fundamental security service, which, by providing and managing the basic cryptographic keying material, fundamentals security services preserving confidentiality, integrity and authenticity. Secure key management with a high availability feature is at the center of providing network security [AME1996]. However, all routing schemes neglect the crucial task of secure key management and assume pre-existence and pre-sharing of secret and/or private/public key pairs [LZH1999]. This leaves key management considerations as an open research area in the ad hoc network security field. Conventional key management techniques may either require an online trusted server or not. The infrastructureless nature of MANET precludes the use of server based protocols such as Kerberos. The design of key management mechanisms for MANET is a particularly complex issue. Firstly, because of the lack of an infrastructure (e.g. dedicated servers), MANET require self-organized key management protocols. Secondly, in order to maximize MANET longevity, because nodes typically run on batteries, energy efficiency is a strict requirement in the design of key management mechanisms and protocols. Thirdly, MANET scalability, membership dynamics and sudden changes on network topology must be also contemplated in the design of a performance-aware key management service. Finally, the operational requirements and the use model of MANET applications need to be considered to design consistent key management systems Secure Group Communication Many emerging applications in MANET involve group-oriented communication using clustering. It improves the efficiency and performance in mobile environment with limited 15

16 bandwidth and limited power. In an hostile environment,such as military, it is necessary to provide secure multicast group communication. Group confidentiality is one of the issues in secure multicast group communication which requires that only valid group users could decrypt the multicast data even if the data is broadcast to the entire network. The group confidentiality requirements can be translated into three rules. First, Non-group confidentiality means nodes that were never part of the group should not have access to any key that can decrypt any multicast data sent to the group. Second, forward secrecy means nodes which left the group should not have access to any future key. This ensures that a member cannot decrypt data after it leaves the group. Third, backward secrecy means a new node that joins the session should not have access to any old key. Thus, group confidentiality problem can be solved with dynamic and robust group key management scheme. The effectiveness of secure group communication not only requires forward secrecy and backward secrecy but also depends on how quickly rekeying process take place when group membership change. 1.7 RESEARCH METHODOLOGY Research methodology defines how the development work should be carried out in the form of research activity. Research methodology can be understand as a tool that is used to investigate some area, for which data is collected, analyzed and on the basis of the analysis conclusions are drawn. There are three types of research i.e. quantitative, qualitative and mixed approach as defined in [JWC2002]. Quantitative Approach This approach is carried out by investigating the problem by means of collecting data, experiments and simulation which gives some results, these results are analyzed and decisions are made on their basis. This approach is used when the researchers wants to verify the theories they proposed, or observe the information in greater detail. Qualitative Approach This approach usually involves the knowledge claims. These claims are based on a participatory as well as on constructive perspectives. This approach follows the strategies such as ethnographies, phenomenology and grounded theories. When the researcher wants to study the context or focusing on single phenomenon or concepts, they used qualitative 16

17 approach to achieve their desired goals. Mixed Approach Mixed approach glue together both quantitative and qualitative approaches. This approach is followed when the researchers wants to base their knowledge claims on matter of fact grounds. Mixed approach has the ability to produce more complete knowledge necessary to put a theory and practice as it combined both quantitative and qualitative approaches. State of Art Problem Identification & Selection Literature Study Building Simulation Result Analysis Author s Interest Feasibility Figure 1.9: Research Methodology Author s Approach Author s approach towards the thesis is quantitative. This approach starts by studying the related literature specific to security issues in MANET. Literature review is followed by simulation modeling. The results are gathered, analyzed and conclusions are drawn on the basis of the results obtained from simulation. Figure 1.9 depicts the author s research methodology. Research Design The author divided the whole research thesis into four stages. 1) Problem Identification and Selection. 2) Literature Study. 17

18 3) Building Simulation. 4) Result Analysis Simulation Tool Network Simulation is a technique where a program models the network behavior either by calculating the interaction between the different network entities by actually capturing and playing back observations from a production network. Network Simulators are relatively fast and inexpensive as they allow the engineers to test scenarios that might be particularly difficult or expensive to emulate using real hardware. These allow designers to test new networking protocols or change the existing ones in a controlled environment. Potential advantages of simulation are, it saves time, cost and provides detail results and good understanding of event s occurrence. There are many simulators such as OPNET, NetSim, GloMoSim and NS2. We have used NS2 [NET2010] for simulation during our research work Structure of NS2 NS2 is a discrete event simulator developed at UC Berkeley and written in C++ and OTCL. Primarily, NS2 was useful for simulating LAN and WAN only. Multi-hop wireless network simulation support is provided by the Monarch Research Group at Carnegie-Mellon University. For wireless simulation, it contains physical, data link and medium access control layer. The Distributed Coordination Function (DCF) of IEEE for wireless LANs is used as MAC layer protocol. For transmitting data packets, an unslotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is used. Radio model is similar to commercial radio interface, Lucent s wave LAN. Wave LAN has a share-media radio with a nominal bit rate of 2 Mb/s and a nominal radio range of 250m [PER1994] [NET2010]. NS2 interprets OTCL scripts defined by user. A user describes various network components in OTCL such as libraries and scheduler objects which are then simulated by main NS2 program written in C++. Figure 1.10 shows the framework of NS2. The widely acceptance of NS2 in research and education sector is because of its free distribution and open source. NS2 is being developed and contributed by researchers and developers over the time. It is suitable for comparing different protocols, traffics and developing new protocols. 18

19 Mobility Pattern and Generated Traffic We have used Random waypoint mobility (RWP) that is a mobility model and it defines node movement pattern that is widely used to evaluate the performance of MANET protocols. Figure 1.10: NS2 Framework Figure 1.11: NS2 Simulation Overview 19

20 In RWP node s speed, direction and destination are chosen randomly once parameters are set. It produces large amounts of relative nodes movement because of which network topology changes. NS2 offers setdest command to generate waypoint mobility. Continuous Bit Rate traffic (CBR) connections are used. Source generates 512-byte long UDP packets. Source and destination pairs are chosen randomly. NS2 provide cbrgen.tcl tool to generate traffic pattern file. Figure 1.11 shows the simulation flow/run. 1.8 RESEARCH OBJECTIVE In this research work, focus has been put on the strategy to address the security issue of MANETs. MANETs have some unique characteristics that make the design of suitable security mechanisms both challenging and interesting. The security issues in MANETs will have to be resolved before these networks will find wide scale deployment. The lack of any form of trusted authority makes the design of a secure routing and low complexity key management scheme for MANETs a difficult task. Thus, the issue to design and develop an efficient and secure data communication is MANETs is still wide open. The main objective of the present work can be stated as Secure Data Accessibility in Mobile Ad hoc Networks and in order to handle the above problem, the following outline is proposed: The assessment and study of different types of routing protocols will help in better understanding of the basic characteristics and functioning of the protocols. Analysis of some of the routing protocols can be carried through simulation, using synthetically generated data sets. Further, there are various mobility models proposed for MANET simulation, it would also be interesting to note the behavior of MANET protocols when subjected to simulation under these models. It aims towards suggesting, designing and implementing a highly efficient security solution for mobile ad hoc networks by establishing secure routing and effective key management mechanism. The proposed protocols should be built upon such a platform that it is not only efficient in terms of meeting the security requirements like message integrity, data confidentiality and end to end authentication but are also cost effective and applicable in practical environment. 20

21 The proposed protocols can be validated against different RFCs proposed by IETF and the verification can be done by taking various performance metrics such as average end-to-end delay, fraction of packets dropped. 1.9 THESIS ORGANIZATION This report is organized as follows: Chapter 1 discuss mobile ad hoc networking in closer details, covering their specific characteristics, complexities and design constraints. This is followed by a classification of existing routing algorithms in MANET. Chapter 2 examines the security issues and challenges associated with mobile ad hoc networks. We also identify the different kinds of attacks MANETs faces and explore new existing approaches to secure its communication related to routing and key management. Chapter 3 introduces a new security-aware route discovery for Dynamic Source Routing in MANET in the presence of malicious nodes. We analyze the effectiveness of the proposed scheme in the presence of malicious nodes using NS2 simulator. Chapter 4 describes the two-hop authentication mechanism which regulates the behavior of nodes in the MANET to prevent from routing attacks in Optimized Link State Routing. Chapter 5 introduces an identity-based Peer-to-Peer key management scheme to provide end-to-end authentication between two users without any online certification authority. A certificateless efficient group key management scheme to achieve forward secrecy as well as back secrecy is proposed in chapter 6. In chapter 7, we introduce the improvement in Secure AODV (SAODV) to mitigate various types of hop count attacks in the route request and route reply control messages. At the end, we summarize the research and give an outline of the broader impact of the thesis and provide the scope of future research SUMMARY In this chapter, we presented MANETs as a new paradigm for wireless communication. We identified the characteristics, complexities and design constraints associated with them, discussed some of their deployment scenarios, classify the existing routing algorithms in it and the areas investigated within the MANET field with particular focus on security issues including secure routing, key management and secure group communication. 21

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

How To Write A Transport Layer Protocol For Wireless Networks

How To Write A Transport Layer Protocol For Wireless Networks Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

[email protected] [email protected]

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

Keywords: DSDV and AODV Protocol

Keywords: DSDV and AODV Protocol Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Power Aware

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

A Review of Secure Ad-hoc Routing

A Review of Secure Ad-hoc Routing www..org 30 A Review of Secure Ad-hoc Routing Tannu Arora 1, Deepika Arora 2 1 Computer Science, M.D.U/GIET, Sonipat, Haryana, India [email protected] 2 Computer Science, C.D.L.U, Sirsa, Haryana, India

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

An Efficient AODV-Based Algorithm for Small Area MANETS

An Efficient AODV-Based Algorithm for Small Area MANETS An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti

More information

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks

Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks Department of Computer Science Gonzalo Iglesias Aguiño Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks Computer Networks D-level thesis (20p) Date: 061221 Supervisor: Andreas Kassler Examiner:

More information

INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS. A Thesis by. Varun Khanna. Bachelor of Technology, Kurukshetra University, India, 2004

INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS. A Thesis by. Varun Khanna. Bachelor of Technology, Kurukshetra University, India, 2004 INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS A Thesis by Varun Khanna Bachelor of Technology, Kurukshetra University, India, 2004 Submitted to the Department of Electrical Engineering and Computer

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

How To Protect A Network From Black Hole Attack On A Network (Manet)

How To Protect A Network From Black Hole Attack On A Network (Manet) UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING AND INFORMATICS MASTERS DEGREE OF SCIENCE IN COMPUTER SCIENCE NETWORK IMPACT ANALYSIS OF SECURITY ATTACKS IN MOBILE AD HOC NETWORKS BY MULONZYA PAUL KALOKI REG

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6196-6201 A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of

More information

Robust Routing in Wireless Ad Hoc Networks

Robust Routing in Wireless Ad Hoc Networks Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

Routing Protocols Security in Ah Hoc Networks

Routing Protocols Security in Ah Hoc Networks Routing Protocols Security in Ah Hoc Networks Ebrahim Mohammed Louis Dargin Oakland University School of Computer Science and Engineering CSE 681 Information Security [email protected] [email protected]

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Internet Connectivity for Ad hoc Mobile Networks

Internet Connectivity for Ad hoc Mobile Networks Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins

More information

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :

More information

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India

More information

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY Nadher M. A. Al_Safwani, Suhaidi Hassan, and Mohammed M. Kadhum Universiti Utara Malaysia, Malaysia, {suhaidi, khadum}@uum.edu.my, [email protected]

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS

SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS Ganesan Veerappan 1 and C. Suresh Gnana Dhas 2 1 Research and Development Centre, Bharathiar University, Coimbatore, Tamil

More information

MASTER'S THESIS. Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Tony Larsson, Nicklas Hedman. Civilingenjörsprogrammet

MASTER'S THESIS. Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Tony Larsson, Nicklas Hedman. Civilingenjörsprogrammet 1998:362 MASTER'S THESIS Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study Tony Larsson, Nicklas Hedman Civilingenjörsprogrammet 1998:362 ISSN: 1402-1617 ISRN: LTU-EX--98/362--SE Master

More information

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks B. MALARKODI, B. VENKATARAMANI AND X.T. PRADEEP Department of Electronics and Communication Engineering National

More information

Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks

Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks Acta Polytechnica Hungarica Vol. 8, No. 6, 2011 Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks Liana Khamis Qabajeh, Miss Laiha Mat Kiah Faculty of Computer Science and Information

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

A Survey of Mobile Ad Hoc network Routing Protocols*

A Survey of Mobile Ad Hoc network Routing Protocols* Technical Report (Nr. 2003-08) A Survey of Mobile Ad Hoc network Routing Protocols* Changling Liu, Jörg Kaiser {changling.liu, joerg kaiser}@informatik.uni-ulm.de Department of Computer Structures University

More information

Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks

Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks T. Jagadeepak 1, Dr. B. Prabhakara Rao 2, B. A. S. Roopa Devi 3 PG Student, Dept. of ECE, UCEK, JNTU,

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks

Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks ISSN (Print) : 2319-594 ISSN (Online) : 2278-121 Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks Shawkat K. Guirguis 1, Ommelhana S.Saaid 2 Professor of Computer Science

More information