3385
www.ijifr.com Copyright © IJIFR 2015
Research Paper
International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697
Volume 2 Issue 9 May 2015
Abstract
In the recent years, the area of mobile ad hoc networking is of quite interest to researchers. A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary/short-lived network without any fixed infrastructure where all nodes are free to move about arbitrarily and where all the nodes configure themselves. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference, less infrastructure and lack of security. A variety of routing protocols have been proposed that targets the issue of security in the ad hoc networks. However, little information about the various robust security measures has previously been available. Therefore secure routing in mobile ad hoc network is still a critical task due to highly dynamic environment. In this paper, a method is proposed to secure ad hoc on-demand distance vector (AODV) routing protocol. The proposed method provides security for routing packets and can efficiently modifying routing information and impersonation. We simulate and compare the proposed method with original AODV and secure AODV (SAODV) protocol using network simulator tool (NS2). Simulation result shows that proposed method minimizes the time delay and network routing load involved in computation and verification of security fields during route discovery process and performs better than the original AODV protocol in the presence of malicious nodes.
Secured Routing Strategy over MANET Paper ID IJIFR/ V2/ E9/ 081 Page No. 3385-3402 Research Area
Mobile Adhoc
Networks
Key Words AODV, Security Attacks, Authentication, Impersonation, MANET, Routing
Strategies, NS 2.34, OTcl
Mani Goyal 1
Research Scholar Department of Computer Science Ganpati Institute of Technology & Management, Bilaspur, Yamunanagar-Haryana
Dr. Sunil Taneja 2
Associate Professor & Head Department of Computer Science Government College, Chhachhrauli, Yamunanagar-Haryana
3386
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
1. Introduction MANET is a collection of wireless mobile nodes forming a temporary/short-lived network without
any fixed infrastructure where all nodes are free to move about arbitrarily and where all the nodes
configure themselves. Unlike traditional networks whereby routing functions are performed by
dedicated nodes or routers, in MANET, routing functions are carried out by all available nodes.
There are no fixed base stations and each node acts both as a router and as a host. Even the topology
of network may also change rapidly. The mobile nodes in the Ad Hoc network dynamically establish
routing among themselves to form their own network „on the fly‟. In essence, the network is created
in ad-hoc fashion by the participating nodes without any central administration. Further ad hoc
networks can be classified as single-hop or multi-hop. In single-hop ad hoc networks, nodes are in
their reach area and can communicate directly but in case of multi-hop, some nodes are far and
cannot communicate directly. The traffic has to be forwarded by other intermediate nodes. Ad hoc
networks are primarily meant for use by military forces or for emergency rescue situations. At the
state of war an army cannot rely on fixed infrastructure, as it is an easy and attractive target for the
enemy. Ad hoc networks are optimal solution in such cases. For civil use ad hoc networks are
crucial if the fixed infrastructure has been torn down by some natural disaster, like a flood or an
earthquake. Then rescue operations could in such a situation be managed through utilizing ad hoc
networks.
2.Major Challenges In Implementation Of MANET
Mobile ad hoc networks have several advantages over traditional wireless networks including ease
of deployment, speed of deployment and decreased dependence on a fixed infrastructure but there
are certain challenges too in implementation of ad hoc networks. Some of these challenges include:
1. Unicast routing
2. Multicast routing
3. Dynamic network topology
4. Bandwidth constrained
5. Network overhead
6. Frequency of updates
7. Scalability
8. QoS support
9. Mobile agent based routing
10. Energy efficient/Power aware routing
11. Secure routing
2. Security Criteria’s [5,8,9,10]
The dilemma is that how should we judge whether the mobile ad hoc network is secure or not. We
shall briefly discuss the main security criteria‟s that are used to inspect the security state of the
mobile ad hoc network.
Confidentiality: Confidentiality ensures that certain information is only accessible to those who
have been authorized to access the same. This information is never disclosed to unauthorized
entities. In order to maintain the confidentiality of some confidential information, we need to keep
them secret from all entities that do not have the privilege to access them. Network transmission of
sensitive information, such as strategic or tactical military information, requires confidentiality.
Leakage of such information to enemies could have devastating consequences. Routing information
3387
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
must also remain confidential in certain cases, because the information might be valuable for
enemies to identify and to locate their targets in a battlefield. The technique of encryption/decryption
can prevent unauthorized users from accessing the contents of packets.
Authenticity: Authenticity is essentially assurance that participants in communication are genuine
and not impersonators. It is necessary for the communication participants to prove their identities as
what they have claimed using some techniques so as to ensure the authenticity. If there is not such
an authentication mechanism, the adversary could impersonate a benign node and thus get access to
confidential resources, or even propagate some fake messages to disturb the normal network
operations.
Integrity: Integrity guarantees the identity of the messages when they are transmitted. Integrity can
be compromised mainly in two ways:
– Malicious altering
– Accidental altering
A message can be removed, replayed or revised by an adversary with malicious goal, which is
regarded as malicious altering; on the contrary, if the message is lost or its content is changed due to
some benign failures, which may be transmission errors in communication or hardware errors such
as hard disk failure, then it is categorized as accidental altering. This can be accomplished by using
message digests or digital signatures.
Availability: The term Availability means that a node should maintain its ability to provide all the
designed services regardless of the security state of it. This security criterion is challenged mainly
during the denial-of-service attacks, in which all the nodes in the network can be the attack target
and thus some selfish nodes make some of the network services unavailable, such as the routing
protocol or the key management service. This implies that resources are available, where desired or
it can be considered that it provides survivability of network services despite denial of service
attacks.
Non repudiation: Non repudiation ensures that the sender and receiver of a message cannot deny
that they have ever sent or received the message. In other words the routers cannot repudiate
ownership of routing protocol messages they send. This is useful especially when we need to
discriminate if a node with some abnormal behavior is compromised or not: if a node recognizes that
the message it has received is erroneous, it can then use the incorrect message as an evidence to
notify other nodes that the node sending out the improper message should have been compromised.
The origin or the receipt of a specific message must be verifiable by a third party. The ad hoc nodes
obtain information from their neighbours and forward it to other neighbours which in turn forward
the same to other neighbours and so on. In most of the existing protocols, nodes cannot guarantee for
the authenticity of updates that are not generated by their immediate neighbours. Therefore, to
preserve trust relationships, it is necessary to form chain of routers using digital signatures and
authenticate everyone in turn following the chain to source node.
Authorization: Authorization is a process in which an entity is issued a credential, which specifies
the privileges and permissions it has and cannot be falsified, by the certificate authority.
Authorization is generally used to assign different access rights to different level of users. For
instance, we need to ensure that network management function is only accessible by the network
administrator. Therefore there should be an authorization process before the network administrator
accesses the network management functions.
Anonymity: Anonymity means that all the information that can be used to identify the owner or the
current user of the node should default be kept private and not be distributed by the node itself or the
3388
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
system software. This criterion is closely related to privacy preserving, in which we should try to
protect the privacy of the nodes from arbitrary disclosure to any other entities.
Having dealt with the main security criteria‟s let us now discuss the main threats that violate the
security criteria, which are generally called as attacks [5]. All attacks on a computer system are a
violation of one or more of these security criteria‟s. On one side, many organizations including
hospitals, airports, and business enterprises plan to capitalize the various benefits provided by
wireless technologies. But on the other side, there have been numerous published reports and papers
describing attacks on wireless networks that expose organizations to security risks such as attacks on
confidentiality, authenticity, integrity, availability, and non repudiation etc. These attacks include:
– Denial of Service: A network service is not available due to overload or malfunction.
– Information theft: Information is read by an unauthorized instance.
– Intrusion: An unauthorized person gains access to some restricted service.
– Tampering: Data is modified by an unauthorized person.
In mobile networks, radio transmission is the most common means of communication.
Eavesdropping on a node is far easier than in wired networks. Since intermediate nodes no longer
belong to a trusted infrastructure, but may be eavesdroppers as well, consequent end-to-end
encryption is mandatory. Next, as all nodes in an Ad hoc network cooperate in order to discover the
network topology and forward packets, denial of service attacks on the routing function are very
easy to mount. Nodes may create stale or wrong routes, creating black holes or routing loops.
Furthermore, in Ad hoc networks exists a strong motivation for non-participation in the routing
system. Both the routing system and the forwarding of foreign packets consume a node‟s battery
power, CPU time, and bandwidth, which are restricted in mobile devices. Consequently, selfish
nodes may want to save their resources for own use. There are three main causes for a node not to
work according to the common routing protocol:
– Malfunctioning nodes are simply suffering from a hardware failure or a programming
error. Although this is not an attack, they may cause severe irritation in the routing system of
an ad hoc network.
– Selfish nodes try to save their own resources, as described above.
– Malicious nodes are trying to sabotage other nodes or even the whole network, or
compromise security in some way.
Before developing a security framework that prevents selfish or malicious nodes from harming the
network, it is worthwhile to first create a structured overview on what kinds of attacks are possible
in Ad hoc networks.
4. Classification Of Security Attacks [4,6]
Network security attacks are typically divided into two categories: passive vs. active attacks and
external vs. internal attacks.
Passive vs. Active Attacks
An attack in which an unauthorized party gains access to an asset and does not modify its contents is
called as passive attack. The passive attacker does not send messages; it only eavesdrops on the
network. The malicious entity in this type of attack only listens to the traffic, without modifying or
disturbing it in any way. The main threat by such an attack is that some confidential information is
leaked to the attacker. Passive attacks can be either eavesdropping or traffic analysis.
3389
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
– Eavesdropping: The attacker monitors transmissions for message content. An example of
this attack is a person listening into the transmissions on a network topology between two
workstations or tuning into transmissions between a wireless handset and a base station.
– Traffic analysis/Traffic flow analysis: The attacker, in a more subtle way, gains
intelligence by monitoring the transmissions for patterns of communication. A considerable
amount of information is contained in the flow of messages between communicating parties.
Table 1: Passive vs. active attacks
Passive attacks: Eavesdropping, traffic analysis
Active attacks: Masquerading/Spoofing, Replaying, Message modification, DoS
An attack whereby an unauthorized party makes modifications to a message, data stream, or file is
called as an active attack. In an active attack, the malignant node actively disturbs the normal
operation of the network. This can be done by forging packets, disrupting normal routing or
consuming network resources etc. Active attacks may take the form of one of four types
masquerading, replay, message modification, and denial-of-service (DoS). These attacks are
summarized as under and are shown in table 1:
– Masquerading: The attacker impersonates an authorized user and thereby gains certain
unauthorized privileges. A spoofing attack is a situation in which one person or program
successfully masquerades as another by falsifying data and thereby gaining an illegitimate
advantage.
– Replay: The attacker monitors transmissions (passive attack) and retransmits messages as
the legitimate user.
– Message modification: The attacker alters a legitimate message by deleting, adding to,
changing, or reordering it.
– Denial-of-service: The attacker prevents or prohibits the normal use or management of
communications facilities.
External vs. Internal attacks [10]
External attacks, in which the attacker aims to cause congestion, propagate fake routing information
or disturb nodes from providing services. Internal attacks, in which the adversary wants to gain the
normal access to the network and participate the network activities, either by some malicious
impersonation to get the access to the network as a new node, or by directly compromising a current
node and using it as a basis to conduct its malicious behaviours. In the two categories shown above,
external attacks are similar to the normal attacks in the traditional wired networks in that the
adversary is in the proximity but not a trusted node in the network, therefore, this type of attack can
be prevented and detected by the security methods such as membership authentication or firewall,
which are relatively conventional security solutions. However, due to the pervasive communication
nature and open network media in the mobile ad hoc network, internal attacks are far more
dangerous than the external attacks: because the compromised nodes are originally the benign users
of the ad hoc network, they can easily pass the authentication and get protection from the security
mechanisms. As a result, the adversaries can make use of them to gain normal access to the services
that should only be available to the authorized users in the network, and they can use the legal
identity provided by the compromised nodes to conceal their malicious behaviours. Therefore, we
3390
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
should pay more attention to the internal attacks initiated by the malicious insiders when we
consider the security issues in the mobile ad hoc networks.
5. Security Solutions [1]
The consequences of these attacks include, but are not limited to, loss of proprietary information,
legal and recovery costs, tarnished image, and loss of network service. Some of the measures that can
be incorporated after broad analysis of various security criteria‟s and attack are as under:
Virtual Private Networks (VPN): This offers a solid solution to many security issues, where an
authenticated key provides confidentiality and integrity for IP (Internet Protocol) data grams.
Software are available to implement VPNs on just about every platform. Authentication depends
upon three factors as password, Fingerprints and a security Token. Using two factors is desirable and
using all three is most secured. VPN only support IP suite so it cannot be solution for all
environments.
Encryption: Encryption is a technique used for many years for passing information from one place
to other in a secured manner. A message in its original shape is referred to as a plaintext (or Text)
and a message used to conceal original message is called Ciphertext (or Cipher). The process of
changing plaintext into ciphertext is called Encryption and the reverse process is called decryption.
There are many algorithms available for these processes. Some of them are Data Encryption
Standard (DES), International Data Encryption algorithm (IDEA) and Public key algorithm (RSA).
These algorithms are key based algorithms. There is one popular key algorithm as Digital signature
algorithm. In Digital signature, Signer encrypts the message with key, this is sent to recipient, the
message is then decrypted with sender‟s public key. In case of ad hoc networks this may not be the
best method as it uses a lot of space and is also slow.
One Way Hash Function: There is another algorithm called one way hash Function: it is like
checksum of a block of text and is secure in that it is impossible to generate the same hash function
value without knowing the correct algorithm and key. It accepts a variable size message and
produces a affixed size tag as output. This algorithm can be combined with encryption to provide an
efficient and effective digital signature.
Digital Signature: External attacks can be checked using Confidentiality of the routing information
and also by authentication and integrity assurance features. Encryption can be solution to this.
Digital signatures and one way functions can be applied. Permian used complex robustness to
protect routing data from compromised nodes. It is ability to continue correct operation in presence
of arbitrary nodes with complex failures.
6. Proposed Plan
It was found that not one method can carried out to make MANET routing secured. Many
combinations were tried and it was found that each protocol behaves differently in each proposed
plan. New scheme is incorporated on AODV because most of the work has been carried out using
AODV as a base protocol. Proposed Scheme is compared with existing AODV without malicious
nodes, with malicious nodes and results are analyzed based on the proposed approach. It was found
malicious nodes are big issue in MANET routing. These malicious nodes drop the packets by using
fake routes and it is very difficult to identify a malicious node. The proposed approach is designed to
detect and isolate the malicious node from the network under certain assumptions based on which
the proposed algorithm works.
Assumptions
3391
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
The following assumptions are considered in order to design the proposed algorithm:-
• A node interacts with its 1-hop neighbours directly and even with other mobile nodes
through intermediate nodes using, multi-hop packet forwarding technique.
• Every mobile node is uniquely identified using unique id in the network. This identification
is provided to every node entering the network according to the existing mobile nodes in the
network.
• The network is considered to be layered.
• The source and destination are not the intruders.
Proposed Algorithm
Steps of INTRU_SecureIDS algorithm
Phase 1: Route Request phase
Start route Request
Initialize sequence numbers 1 to N as number of nodes varying 1 to N
Name Source node as ‘S’ and Destination as ‘D’
Route Request is forwarded as Source routing
AODV Route request is followed
Route reply is confirmed based on Shortest path as in AODV
Route is established
Call INTRUDETECT
Phase 2: Local Repair LREPAIR
Check link break = true
Node upstream repair the route locally
If destination not far than MAX_REPAIR_TTL
Node increments sequence no. for destination broadcasts Route Request
Discovery phase starts node waits for Route Reply
Route is established
Else call INTRUDETECT
Phase 3: Intrusion detection INTRUDETECT
Check route table entry for each node
If seq no. is greater than assigned N , follow steps 3 else return
Check for node having higher seq no.
Block the node as M-Node
Initialize Route request again
Call RREQ
Call INTRUISOLATE
Phase 4: Intrusion isolation INTRUISOLATE
Source send ICMP packets to route path.
Route path sends ICMP packets to the neighboring intermediate nodes and update the
route table and delete M-node entry
ISOLATE the node as M-node.
Initialize Route request again
Call RREQ
3392
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
7. Network Simulations And Results
NS 2.34 has been used as simulator. It provides support for both wired and wireless networking with
multicast capabilities and satellite networks. It provides substantial support for simulation of
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) routing. Network
Simulator has two components as under:
Object oriented simulator, written in C++ and
OTcl (an object oriented extension of Tool Command Language TCL) interpreter which is
used to execute user‟s command scripts.
The OTcl scripts for different scenarios can be written in any text editor like vi or emacs. The script
defines the network components such as nodes, links, protocols and traffic requirements. The output
is generated by simulator in two files: Trace file and NAM file. To analyze the trace files, other
independent tools will be needed to filter, compute and display the results (e.g. Awk). The graphs
can also be plotted using XGRAPH with help of trace file and the same can be used for better
analysis. NAM, Network Animator, is a very good animation tool supported by NS-2.34 which is
used for viewing network simulation traces and real world packet trace data. The output generated
by network simulator in the form of trace and NAM file is used to calculate packet delivery ratio,
end-to-end delays, network throughput, power consumption, normalized routing load, packet loss
and other performance measures. Some of the snapshots during simulation are given below.
Figure 1: NAM file showing AODV with 10 Nodes with Varying Pause Time
Figure 2: NAM file showing AODV with 10 Nodes with Varying Speed
Figure 3: NAM file showing AODV with 20 Nodes with Varying Pause Time
3393
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
Figure 4: NAM file showing AODV with 20 Nodes with Varying Speed
Figure 5: NAM file showing AODV with 50 Nodes with Varying Pause Time
Figure 6: NAM file showing AODV with 50 Nodes with Varying Speed
The results of simulations using various metrics on AODV and DSR protocols are given beow.
Graph 1: Average Delay vs. Pausetime for 10 Nodes
This graph works as per the conditions and parameters assigned for 10 nodes ,shows the delay is
more in case of AODV with respect to the pause time .
3394
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
Graph 2: Average Delay vs. Pausetime for 20 Nodes
This graph shows the variance in average delay for 20 nodes and as resulted in case of DSR average
delay is increasing with increasing the number of nodes .
Graph 3: Average Delay vs. Pausetime for 50 Nodes
This graphs shows that AODV is much better than DSR as the delay is decreasing while the nodes
are increased to 50.Which is as per the theory Thus, AODV gives better results.
Graph 4: Throughput vs. Pausetime for 10 Nodes
This works at 10 nodes and observerd results shows that throughput of DSR is more in case of 10
nodes. While in case of AODVthe throughput increases with increase in pause time . Thus, AODV
gives better throughput as compared to DSR.
Graph 5: Throughput vs. Pausetime for 20 Nodes
This graph shows that throughput is increasing in case of AODV while nodes are increased to 20.
Hence AODV works much better as per the theory suggested for AODV.
Graph 6: Throughput vs. Pausetime for 50 Nodes
3395
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
This graph shows that throughput is almost similar in case of both protocols, while observed results
shows that ADOV gives more throughput while increasing the number of nodes to 50. So as per the
theory AODV is preffered over DSR with more congested networks.
Graph 7: PDR vs. Pausetime for 10 Nodes
This graph works as per the plan at 10 nodes while varing the pause time. Though the delay is more
in AODV but it is as per the theory DSR works better when nodes are less.
Graph 8: PDR vs. Pausetime for 20 Nodes
This graph shows the results at 20 nodes .Though the PDR is approximately remains in the range of
97-99% which is considered good for both the protocols.
Graph 9: PDR vs. Pausetime for 50 nodes
This graph works at 50 nodes while varying the pause time. Though the PDR remains almost stable
for DSR protocol but it increases in case of AODV it is as per theory. PDR increases in AODV with
increase in number of nodes.
Proposed algorithm implementation and Result Analysis
3396
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
Following are the Ns-2 animations which show the working of proposed approach in the network
simulator according to the parameters considered for the system. These NAM files show the
implementation of the proposed algorithm in the network simulator. These are the graphs obtained
with the implementation of the proposed approach:-
Graph 10: Graph for Pause Time vs. Average Delay for 10 Nodes
This graph works as per suggested plan at 10 nodes using varying pause time our proposed plan
would work better. Though delay decreases with increase of pause time still it is more in proposed
plan but it is as per the theory. As more time is required to search the malicious node.
Graph 11: Graph for Pause Time vs. Throughput for 10 Nodes
This graph works as per suggested plan at 10 nodes using varying pause time our proposed plan
would work better. Though throughput increases with increase of pause time still it is more in
proposed plan but it is as per the theory. Thus throughput decrease as with the malicious node.
Graph 12: Graph for Pause Time vs. PDR for 10 Nodes
3397
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
This graph works as per suggested plan at 10 nodes using varying pause time our proposed plan
would work better. Though PDR increases with increase of pause time still it is more in proposed
plan but it is as per the theory. Thus PDR must increase with the malicious node.
Graph 13: Graph for Speed vs. Average Delay for 10 Nodes
This graph works as per suggested plan at 10 nodes using varying speed our proposed plan would
work better. Though delay is inconsistent with increase of speed still it is approximately same in
proposed plan but it is as per the theory. As more time is required to search the malicious node.
Graph 14: Graph for Speed vs. Throughput for 10 Nodes
This graph shows throughput at 10 nodes while varying the speed. Though the throughput is stable
but its high in AODV which is par the theory.
Graph 15: Graph for Speed vs. PDR for 10 Nodes
This graph works as per suggested plan at 10 nodes using varying speed our proposed plan would
work better. Though throughput decreases with increase of speed still it is more in proposed plan but
it is as per the theory. Thus PDR must decrease with the malicious node.
3398
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
Graph 16: Graph for Pause Time vs. Average Delay for 20 Nodes
This graph works as per suggested plan at 20 nodes using varying pause time our proposed plan
would work better. Though delay decreases with increase of pause time still it is more in proposed
plan but it is as per the theory. As more time is required to search the malicious node.
Graph 17: Graph for Pause Time vs. Throughput for 20 Nodes
This graph works as per suggested plan at 20 nodes using varying speed our proposed plan would
work better. Though throughput decreases with increase of pause time still it is more in proposed
plan but it is as per the theory. Thus throughput must decrease with the malicious node.
Graph 18: Graph for Pause Time vs. PDR for 20 Nodes
This graph works as per suggested plan at 10 nodes using varying pause time our proposed plan
would work better. Though throughput is approximately same for both with increase of pause time
still it is more in proposed plan but it is as per the theory. Thus PDR must increase with the
malicious node.
Graph 19: Graph for Speed vs. Average Delay for 20 Nodes
3399
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
This graph works as per suggested plan at 20 nodes using varying Speed our proposed plan would
work better. Though delay is approximately constant with increase of speed but it is as per the
theory. As more time is required to search the malicious node.
Graph 20: Graph for Speed vs. Throughput for 20 Nodes
This graph works as per suggested plan at 20 nodes using varying speed our proposed plan would
work better. Though delay is constant in both the cases but the throughput is more with proposed
approach. As malicious nodes decreases the throughput.
Graph 21: Graph for Speed vs. PDR for 20 Nodes
This graph works as per the suggested plan at 20 nodes using varying speed our proposed plan
would work better. Though PDR is constant in both the cases but the PDR is less in proposed
approach but it is as per the theory. As malicious node has suspected behavior.
Graph 22: Graph for Pause Time vs. Average Delay for 50 Nodes
This graph works as per suggested plan at 50 nodes using varying pause time our proposed plan
would work better. Though delay decreases with increase of pause time still it is more in proposed
plan but it is as per the theory. As more time is required to search the malicious node.
Graph 23: Graph for Pause Time vs. Throughput for 50 Nodes
3400
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
This graph works as per suggested plan at 50 nodes using varying pause time our proposed plan
would work better. Though throughput decreases with increase of pause time still it is more in
proposed plan but it is as per the theory. Thus throughput decreases with the malicious node.
Graph 24: Graph for Pause Time vs. PDR for 50 Nodes
This graph works as per suggested plan at 50 nodes using varying pause time our proposed plan
would work better. Though throughput is variable with increase of pause time still it is more in
proposed plan but it is as per the theory. Thus throughput must decrease with the malicious node.
Graph 25: Graph for Speed vs. Average Delay for 50 Nodes
This graph works as per suggested plan at 50 nodes using varying speed our proposed plan would
work better. Though delay decreases with increase of speed still it is more in proposed plan but it is
as per the theory. As more time is required to search the malicious node.
Graph 26: Graph for Speed vs. Throughput for 50 Nodes
This graph works as per suggested plan at 50 nodes using varying speed our proposed plan would work better.
Though throughput decreases with increase of pause time still it is more in proposed plan but it is as per the
theory. Thus throughput must decrease with the malicious node.
Graph 27: Graph for Speed vs. PDR for 50 Nodes
3401
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
This graph works as per suggested plan at 50 nodes using varying speed our proposed plan would
work better. Though PDR is varying continuously with increase of speed still it is more in proposed
plan but it is as per the theory. Thus PDR must decrease with the malicious node.
8. Conclusion The routing protocols proposed for Mobile Ad hoc networks seem to meet the basic requirements
like dynamically changing network topologies rather well. However, the security issues have been
left primarily ignored. The MANET routing protocols must be secured from the viewpoint of the
authentication, integrity and privacy. These requirements can be at least partially met by using
strong authentication and encryption mechanisms, digital signatures, hashing and MACs. Moreover,
the protection means can be optimized for every protocol based on the approach taken to routing.
Some MANET routing protocol developers suggest the application of IPSEC within the protocol to
achieve the necessary security goals. This kind of approach is not totally adequate, due to the
problems of replay etc. Moreover, the traditional security mechanisms such as link-level encryption
or bi-directional tunnels are not adequate, due to the dynamic and unpredictable nature of MANET
networks. The proposed security algorithm is for detection of malicious nodes present in the
network. The proposed approach presented a scheme to proactively prevent external attacks. The
solution is specifically targeted for AODV protocol. The results of implementation of proposed
algorithm show that the effect of the overheads caused by our scheme is marginal and has negligible
effects on network performance.
9. Future Work This addressed the security issues pertaining to the routing protocols. The focus has been on on-
demand protocols, specifically, AODV. It would be interesting to study the issues specific to table
driven protocols and look into schemes that work optimally when integrated with them. Though the
proposed approach has done a very limited analysis of the internal attacks. Some of the attacks,
especially those that are not deterministic, have not been handled. Intrusion detection schemes that
analyze traffic profiles/patterns to detect intruders would be another challenging area to explore. The
detection of compromised nodes is a very tough problem especially in a dynamically changing
network. In future we will try to enhance the capability of our IDS by making it more robust to
detect the intrusions of all the types and to overcome the damage caused to the system during the
hacking or intruding phase. The IDS capability to withstand more dynamic threats is to be enhanced
more in future and proposed algorithm can be enhanced more in terms of Quality of Service (QOS).
References [1] Ashwani Kush, “Security and Reputation Schemes in Ad-Hoc Networks Routing”, International Journal of
Information Technology and Knowledge Management, Volume 2, No. 1, pp. 185-189, January June 2009.
[2] B. Dahill, B. N. Levine, E. Royer and C. Shields, “A secure routing protocol for ad hoc networks”,
Technical Report UM-CS-2001-037, University of Massachusetts, Department of Computer Science, Aug.
2001.
[3] C.K. Toh, “Ad hoc mobile wireless Networks”, Prentice Hall, New Jersey, 2002.
[4] D. B. J. Yih-Chun Hu, Adrian Perrig, “Ariadne: A secure on-demand routing protocol for ad-hoc
networks”, Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking
(MobiCom 2002), Sept. 2002.
[5] Frank Kargl Stefan Schlott Andreas Klenk Alfred Geiss MichaelWeber,“Securing Ad hoc Routing
Protocols”, Proceedings of the 30th EUROMICRO Conference (EUROMICRO 2004)), PP: 514-519 ,
ISBN ~ ISSN:1089-6503 , 0-7695-2199-1, Publisher: IEEE Computer Society Washington, DC, USA, 2004
3402
ISSN (Online): 2347-1697 International Journal of Informative & Futuristic Research (IJIFR)
Volume - 2, Issue - 9, May 2015 21st Edition, Page No: 3385-3402
Mani Goyal, Dr. Sunil Taneja:: Secured Routing Strategy over MANET
[6] Kai Inkinen, “New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes”,
Helsinki University of Technology T-110.551, Seminar on Internetworking, Sjökulla, 2004-04-26/27.
[7] P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks”, SCS Communication
Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan 2002.
[8] Seung Yi, Prasad Naldurg, Robin Kravets, “Security-Aware Ad-hoc routing for wireless networks”,
Technical Report No. UIUCDCS-R-2001-2241,August 2001and in Proceedings of the 2nd ACM international
symposium on Mobile ad hoc networking & computing 2001, Long Beach, CA, USA, October 04 - 05,
2001.
[9] S. Yi, P. Naldurg, R. Kravets, “A security-aware ad hoc outing protocol for wireless networks”, 6th World
Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002), 2002.
[10] Wenjia Li, Anupam Joshi, “Security Issues in Mobile Ad Hoc Networks- A Survey”, Department of
Computer Science and Electrical Engineering, University of Maryland, Baltimore County,
http://www.cs.umbc.edu /~wenjia1/699_report.pdf, 2008