IJCNIS Vol. 10, No. 4, 8 Apr. 2018
Cover page and Table of Contents: PDF (size: 1151KB)
Full Text (PDF, 1151KB), PP.48-64
Views: 0 Downloads: 0
Mobile Ad-Hoc Network, Trust Model, Fidelity, Energy efficiency, Secure Routing Protocol, Battery Threshold, Blacklist, Glomosim
Mobile Ad-Hoc Networks are very flexible networks, since they do not depend on any infrastructure or central authority. Due to this property, MANETs are highly ubiquitous in defense, commercial and public sectors. Despite the usage, MANET faces problems with security, packet drops, network overhead, end-to-end delay and battery power. To combat these shortcomings, we have proposed a new trust based on-demand routing protocol that can adapt to the specific energy conditions of nodes in a MANET. It uses the concept of fidelity which varies depending on packet drops. This fidelity is monitored through direct and indirect methods. The main aim of the protocol is to develop a model that considers both trust and battery power of the nodes, before selecting them as prospective nodes for secure transmission of data. With dynamic battery threshold calculations, the nodes make an intelligent choice of the next hop, and packet losses are effectively minimized. In addition to providing data origin authentication services, integrity checks, the proposed “Intelligent Energy Aware Fidelity Based On-Demand Secure Routing (IEFBOD)” protocol is able to mitigate intelligent, colluding malicious agents which drop packets or modify packets etc. that they are required to forward. New packets called report and recommendation have been used to effectively detect and eliminate these malicious nodes from a network. Our protocol has been compared to other existing secure routing protocols using simulation, and it displays improved performance metrics, namely high packet delivery fraction, low normalized routing load and low end-to-end delay.
Himadri N. Saha, Prachatos Mitra, "Intelligent Energy Aware Fidelity Based On-Demand Secure Routing Protocol for MANET", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.4, pp.48-64, 2018. DOI:10.5815/ijcnis.2018.04.06
[1]A. Kaur and D. Singh (2013)"Effects of Jelly Fish Attackon Mobile Ad-Hoc Network’s Routing Protocols" Int. Journal of Engineering Research and Applications, www.ijera.com, Vol. 3, Issue 5, pp.1694-1700.
[2]C. Perkins and E. Royer, (1999). Ad hoc on-demand distance vector routing. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1999), 80–100.
[3]C. Perkins and P. Bhagwat, (1994). Highly dynamic destination-sequenced distance- vector routing (dsdv) for mobile computers. In Proceedings of ACM SIGCOMM Conference on Communications Architectures, Protocols and Applications, 234–244.
[4]D. Johnson and D. Maltz,(1996). Dynamic source routing in ad-hoc wireless networks routing protocols. In Mobile Computing. Kluwer Academic Publishers, 153–181.
[5]D.V. Park and M.S. Corson,(1997). A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings of the 2nd IEEE INFOCOM, 405–1413.
[6]H.N Saha., D. Bhattacharyya, B. Banerjee, S. Mukherjee, R. Singh and Ghosh D.,(2014) Different Routing Protocols And Their Vulnerabilities And Their Measures. In Proceedings. of the International. Conference on Advances in Computer Science and Electronics Engineering CSEE, 192-202.
[7]H.N. Saha, D. Bhattacharyya, B. Banerjee, S. Mukherjee, R. Singh and Ghosh D.,(2013) A Review On Attacks And Secure Routing Protocols In Manet,in CIBTech,
International Journal of Innovative Research and Review (JIRR) Vol. 1, No. 2, 12-36.
[8]H.N. Saha, D. Bhattacharyya, B. Banerjee, S. Mukherjee, R. Singh and D. Ghosh,(2014). Self-Organized key management based on fidelity relationship list and dynamic path. International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 7.
[9]H.N. Saha, D. Bhattacharyya, P.K. Banerjee (2011). Fidelity Based On Demand Secure (FBOD) Routing in Mobile Adhoc Network,(IJACSA) International Journal of Advanced Computer Science and Applications, Special Issue on Wireless & Mobile Networks.
[10]H.N. Saha, R. Singh, D. Bhattacharyya, (2015). Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs, IJCNIS, vol.7, no.8, pp.39-48, 2015.DOI: 10.5815/ijcnis.2015.08.05
[11]H.P Singh, V.P. Singh, R. Singh (2013), “Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review” IJCA Vol 64, No 3,pp.16-22.
[12]I. Ullah and S.U. Rahaman (2010).Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols. In Master Thesis Electrical Engineering Thesis no: MEE 10:62.pp.1-41.
[13]J.C Cano. and P. Manzoni,(2001). Evaluating the Energy-Consumption Reduction in a MANET by Dynamically Switching -Off Network Interfaces. In Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5.
[14]K. Konate and A. Gaye (2011).A Proposal Mechanism Againstthe Attacks: Cooperative Blackhole, Blackmail, Overflow and Selfish in Routing Protocol of Mobile AdHoc Network. International Journalof Future Generation Communication and Networking. Vol 4, Issue 2, pp.69-80.
[15]K. Sanzgiri., B. Dahill, B. Levine and E. Belding-Royer, (2002). A secure routing protocol for ad hoc networks. In Proceedings of 10th IEEE International Conference on Network Protocols (ICNP).
[16]L. Buttyan and J.P. Hubaux (2003). Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8(5) 579–592.
[17]L. Lamport, R.E. Shostak, and M. Pease (1982). The Byzantine Generals Problem.ACM Trans. Programming Languages and Systems, vol. 4, no. 3 pp.382-401.
[18]M. Abdelhaq, S. Serhan, R. Alsaqour and R. Hassan, (2011). A Local Intrusion Detection Routing Security over MANET Network. International Conference on Electrical Engineering and Informatics, Bandung, Indonesia.
[19]M. Tarique and R. Islam, (2007). Minimum Energy Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. In International Journal of Computer science and Network Security, Vol 7 No.11, 304-311.
[20]M. Zapata and N. Asokan (2002). Securing ad hoc routing protocols. In: Proceedings of the ACM Workshop on Wireless Security (WiSe’02).
[21]P. Johansson, T. Larsson., N. Hedman, & B. Mielczarek (1999). Routing Protocols for Mobile Ad-hoc Networks - A Comparative Performance Analysis. In Proceedings of the IEEE/ACM MOBICOM, 195–206.
[22]P. Papadimitratos and Z.J. Haas.,(2002). Secure Routing for Mobile Ad Hoc Networks. Mobile Computing and Communications Review 6(4).
[23]R. Bagrodia, R. Meyerr,(1997). PARSEC: A Parallel Simulation Environment for Complex System. UCLA technical report.
[24]R. Kalaivani and D. Ramya,(2013). Secure Protocol for Leader Election and Intrusion Detection in MANET. International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, Issue 3,62-66.
[25]R.K. Nekkanti and C.W. Lee (2004). Trust based adaptive on demand ad hoc routing protocol. In: Proceedings of the 42nd annual Southeast regional conference 88–93.
[26]S. Abbas, M. Merabti, D. Llewellyn-Jones, K Kifayat "Lightweight Sybil Attack Detection in MANETs "Systems Journal, IEEE Volume:7 , Issue: 2 June 2013. pp 236 – 248.
[27]S. Agrawal, S. Jain, S. Sharma (2011), “A survey of routing attacks and security measures in mobile ad-hoc networks”, journal of computing, Vol 3, Issue 1, pp.41-48.
[28]S. Corson and J. Macker, (1999). Mobile ad-hoc networking (MANET): routing protocol performance issues and evaluation considerations, RFC 2501.
[29]V. Girdhar and G. Banga (2015), A Incentive Based Scheme to Detect Selfish Nodes in MANET, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 8, pp. 561-565.
[30]V. Mahajan, M. Natu, A. Sethi(2008). “Analysis of wormhole intrusion attacks in MANETS”. In IEEE Military Communications Conference (MILCOM), pp. 1-7.
[31]Y. Hu, A. Perrig and D. Johnson, (2002). Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02) 3–13.
[32]Z.J. Haas, M. R. Pearlman, P. Samar,(2002). The Zone Routing Protocol (ZRP) for Ad Hoc Networks. IETF Internet Draft.