International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.7, No.8, Jul. 2015

Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs

Full Text (PDF, 712KB), PP.39-48

Views:112   Downloads:1


Himadri N. Saha, Rohit Singh, Debika Bhattacharyya

Index Terms

Mobile Ad hoc Networks (MANETs);Secure;Low Cost;Fidelity;Hardware Implementation; Arduino; Zigbee


With the advent of real applications in fields like defense and domestic fields, MANET is becoming more popular. MANET does not require any infrastructure, moreover it can behave as mobile networks. These features have boosted up the popularity of MANET in the community. As more and more fields get dependent on MANET, the system needs to be more robust and less expensive. For example, in defense field security is the major issue, while in the domestic field maintaining the QoS is the major issue. To commercialize MANET the routing protocols need to be lightweight, secure and the hardware on which it is to be implemented should be low cost at the same time. We propose a lightweight, secure and efficient routing model for MANETs; which uses fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that secure neighbor or not. It also uses new packets like report and recommendation that help the protocol to detect and eliminate the malicious nodes from the network. To observe the results we implement this protocol in hardware, on the Arduino platform in ZigBee network. We observe that our protocol exhibits high packet delivery fraction, low normalize routing load and low end to end delay, compared to existing secure routing protocols. Thereby, maintaining a constant tradeoff between the QoS and the security of the network.

Cite This Paper

Himadri N. Saha, Rohit Singh, Debika Bhattacharyya,"Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs", IJCNIS, vol.7, no.8, pp.39-48, 2015.DOI: 10.5815/ijcnis.2015.08.05


[1]S. Corson andz J. Macker, "Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations," Network Working Group, RFC: 2501, January 1999.

[2]M. Frodigh, P. Johansson and P. Larsson, "Wireless ad hoc networking: the art of networking without a network," Ericsson Review, No. 4, pp. 248-263, 2000.

[3]K. Komali, V. Mahesh and R.Y. Kumar, "A novel secured protocol for data transmission in ad hoc networks using clustering," International Journal of Computer Science and Information Technologies (IJCSIT),Vol. 5(5),pp. 6567-6571, 2014.

[4]S. Sharmila1, G. Umamaheshwari and M. Ruckshana,"Hardware implementation of secure aodv for wireless sensor networks," ICTACT Journal On Communication Technology, Vol.1, Issue 04,pp.218-229, December 2010.

[5]S. Dalu, M.K. Naskar and C.K. Sarkar,"Implementation of a topology control algorithm for manets using nomadic community mobility model," Industrial and Information Systems,pp.1-5,2008.

[6]A. Passarella and F. Delmastro, Multi-hop Ad hoc Networks from Theory to Reality, Nova Science Publishers,ch.9,2007, pp.153-177.

[7]K. Sanzgiri, B. Dahill, B.N. Levine, C.Shields and E.M. Belding-Royer, "A secure routing protocol for ad hoc networks," In: Proceedings of 10th IEEE International Conference on Network Protocols (ICNP),pp.78-87, November 2002.

[8]M. Zapata and N. Asokan, "Securing ad hoc routing protocols," In: Proceedings of the 1st ACM Workshop on Wireless Security (WiSe), pp.1-10, September 2002.

[9]R.K. Guha, F. Zeeshan and M. Shahabuddin, "Discovering man-in-the-middle attacks in authentication protocols," Military Communications Conference, MILCOM IEEE, pp 29-31, October 2007.

[10]R.K. Nekkanti and C.W. Lee, "Trust based adaptive on demand ad hoc routing protocol," In: Proceedings of the 42nd Annual Southeast Regional Conference, pp 88–93,2004.

[11]H.N. Saha, D. Bhattacharyya, P.K. Banerjee,"Fidelity based on demand secure (FBOD) routing in mobile adhoc network," Advances in Parallel Distributed Computing, Springer Berlin Heidelberg, pp 615-627, 2011.

[12]H.N. Saha, D. Bhattacharyya, B. Banerjee, S. Mukherjee, R. Singh and D. Ghosh, "Self-organized key management based on fidelity relationship list and dynamic path," International Journal of Application or Innovation in Engineering & Management, Vol 3, Issue 7, pp.97-100, July 2014.

[13]J.C. Cano and P. Manzoni, "Evaluating the energy-consumption reduction in a manet by dynamically switching-off network interfaces," In Proceedings of the 6th IEEE Symposium on Computers and Communications, pp 186-191, Juiy 2001. 

[14]M. Tarique and R. Islam, "Minimum energy dynamic source routing protocol for mobile ad hoc networks," International Journal of Computer Science and Network Security,Vol 7, Issue 11,pp.304-311,2007.

[15]Z. Alliance, "Zigbee specification v1.0," June 2005.

[16]"Zigbee alliance," Available:

[17]C. Perkins and E. Royer, "Ad hoc on-demand distance vector routing," In Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100, 1999.

[18]D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Kluwer Academic Publishers, 1996, vol. 353, ch. 5, pp. 153–181.

[19]P. Jacquet, P. Muhlethaler, A. Qayyum, A. Laouiti, L. Viennot, and T. Clausen, "Optimized link state routing protocol (olsr)," Network Working Group, RFC:3626, October 2003.

[20]I. Chakeres, E. Belding-Royer and C. Perkins, "Dynamic manet ondemand routing protocol (dymo)," Mobile Ad hoc Networks Working Group, Internet Draft, version: draft-ietf-manet-dymo-10, October 2005.

[21]V. Park and S. Corson, "Temporally-ordered routing algorithm (tora) version 1," Mobile Ad hoc Networks Working Group, Internet Draft, version: draft-ietf-manet-tora-spec- 03, June 2001.

[22]Z. J. Haas, M. R. Pearlman and P. Samar, "The zone routing protocol (zrp) for ad hoc networks," Mobile Ad hoc Networks Working Group,Internet Draft, version: draft-ietf-manet-zone-zrp- 04, July 2002.

[23]B. N. Karp and H. T. Kung, "Gpsr: Greedy perimeter stateless routing for wireless networks," In Proceedings of ACM Mobicom, pp. 243–254, August 2000.

[24]H.N. Saha, D. Bhattacharyya, B. Banerjee, S. Mukherjee, R. Singh and D. Ghosh, "A Review On Attacks And Secure Routing Protocols In MANET," International Journal of Innovative Research and Review (JIRR), CIBTech, Vol. 1, No. 2, October-December 2013.

[25]P. Papadimitratos and Z.J. Haas,"Secure Routing for Mobile Ad Hoc Networks.," In Proceedings of International conference on SCS Communication Networks and Distributed Systems (CNDS), pp.112-118, January 27-31, 2002. 

[26]Z. Wan, K. Ren and M. Gu, "USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks," IEEE Trans. Wireless Communication., Volume 11, Issue 5, 2012, DOI: 10.1109/TWC.2012.030512.111562.

[27]S. K. Dhurandher, M. S. Obaidat, K. Verma, P. Gupta, and P. Dhurandher, "FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems," IEEE, Systems Journal, Vol. 5, Issue 2, pp. 176-188, 2011.

[28]R. Kaur and P. Singh,"Review of black hole and grey hole attack," The International Journal of Multimedia & Its Application (IJMA),Vol 6,No 6,December 2014.

[29]V. Mahajan, M. Natu, A. Sethi, "Analysis of wormhole intrusion attacks in MANETS," In IEEE Military Communications Conference (MILCOM), pp. 1-7, 2008.

[30]A. Kaur, D.S. Wadhwa, "Effects of Jelly Fish Attack on Mobile Ad-Hoc Network's Routing Protocols," Int. Journal of Engineering Research and Application (IJERA), Vol. 3, Issue 5, pp 1694-1700, September-October 2013.