Two Variants of Secure Routing Algorithms in Mobile Ad Hoc Network

Author(s): Sulata Mitra*, Priyodarshini Dhar

Journal Name: International Journal of Sensors, Wireless Communications and Control

Volume 9 , Issue 1 , 2019


Become EABM
Become Reviewer
Call for Editor

Graphical Abstract:


Abstract:

Background and Objective: Two different variants of secure routing algorithms are proposed in the present work. In both the variants a stable route is established between source and destination.

Methods: The selected route is associated with the nodes having sufficient energy to establish the route and to transmit the data packets, minimum velocity to reduce the frequency of link failure, maximum distance from the source node to reduce the number of hops in the selected route, minimum number of neighbors to reduce the routing overhead. Each variant has two phases. In the first phase it is assumed that the selected route has no attackers. The first phase is made more realistic in the second phase by considering the presence of attacker in the selected route. In the first variant a node associated with the selected route overhears the transmission of the next forwarder node to detect an attacker node in the routing path. But a node may fail to overhear its next hop in presence of hidden node, due to limited overhear range etc. Such problem is eliminated in the second variant. In the second variant each node associated with the selected route searches its data packet buffer for the reception of the next data packet from its predecessor node associated with the same route and suspects the predecessor node as an attacker in case the next data packet is not found in the buffer. The performance of both the variants is compared on the basis of packet delivery ratio, throughput and average end-to-end delay.

Results: The throughput and packet delivery ratio are higher in the second variant than the first variant whereas the average end-to-end delay is less in the second variant than the first variant.

Conclusion: Moreover both the variants outperform the existing schemes in terms of packet delivery ratio, throughput and average end-to-end delay.

Keywords: Black hole, end-to-end delay, gray hole, MANET, routing, multihop network.

[1]
Aamir M, Zaidi MA. A buffer management scheme for packet queues in MANET. Sci Technol 2013; 18(6): 543-53.
[2]
Sreedevi M, Narasimha C, Seshadri R. Efficient data delivery over MANET’s through secured EGMP. Adv Asian Social Sci 2012; 2(3): 512-6.
[3]
Lou W, Liu W, Zhang Y, Fang Y. SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wireless Netw 2009; 15: 279-94.
[4]
Lee HO, Nam JS, Jeon JH. Cluster and location based overlay multicast in mobile ad hoc and sensor networks. Int J Distr Sensor Network 2014; 6: 1-10.
[5]
Bohra S, Choudhary N. An efficient misbehaving node detection algorithm in MANET. Global J Comp Sci Technol 2015; 15(2): 17-23.
[6]
Kumar R, Sharma SK. A relative speed based route selection in AODV to reduce packet drop in MANET. Int J Em Technol Adv Eng 2014; 4(5): 576-9.
[7]
Manish VM, Vaijayanthimala J. Diminution of packet drop by efficient selection of network route in MANET. Int J Comp Sci Info Technol 2014; 5(2): 1852-5.
[8]
Agrawal N, Choubey N, Mishra P. Energy efficient route selection in MANET. Int J Comp Sci Info Technol 2014; 5(3): 3267-73.
[9]
Talwar KA, Benakappa SM. An efficient route selection in MANETs by intelligent AODV. Int J Innov Res Comp Commun Eng 2014; 2(6): 4541-55.
[10]
Gupta N, Gupta R. LAR-1: affirmative influences on energy conservation and network lifetime in MANET. Int J Comp Commun Contr 2014; 9: 284-91.
[11]
Nayak P, Agrawal R, Verma S. Energy aware routing scheme for mobile ad hoc network using variable range transmission. Int J Ad Hoc 2012; 3(4): 53-63.
[12]
Jani HB, Prajapati H. Detection of black hole attack on MANET. Int J Curr Eng Sci Res 2016; 3(4): 31-5.
[13]
Yaser K, Ruba AS, Muneer BY. Malicious nodes detection in MANETs: behavioral analysis approach. J Network 2012; 7(1): 116-25.
[14]
Khattak H. Nizamuddin, Khurshid F, Amin N. Preventing black and gray hole attacks in AODV using optimal path routing and hash. IEEE Int Conf Net 2013; 13(4): 645-8.
[15]
Elboukhari M, Azizi M, Abdelmalek A. Impact analysis of black hole attacks on mobile ad hoc networks performance. Int J Grid Comp Appl 2015; 6: 1-2.
[16]
Gupta A. Mitigation algorithm against black hole attack using real time monitoring for AODV routing protocol in MANET. Int Conf Comp Develop 2015; pp. 134-8.
[17]
Mahmood MSAA, Hasan TM, Ibrahim MSDS. Modified AODV routing protocol to detect the black hole attack in MANET. Int J Adv Res Comp Sci Eng 2015; 5(7): 173-8.
[18]
Gopalakrishnan S, Mohan P. Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuit Syst 2016; 13: 748-58.
[19]
Rathiga P, Sathappan J. Hybrid detection of black hole and gray hole attackers in MANET. Int Conf Comput Syst Info 2016; 12: 135-40.
[20]
Sasilatha T, Vidhya P, Suresh MK. Detection and elimination of black hole and gray hole attack in MANET. Int J Pure Appl Math 2017; 116(24): 235-42.
[21]
Jotangiya PU, Agrawal R. An enhance approach of detection and prevention of black hole and gray hole attack on AODV routing protocol over MANET. Int J Eng Sci Comp 2016; 6(5)
[http://dx.doi.org/10.4010/2016.1339]
[22]
NI PXIe-4339, National Instrument http://sine.nicom/nips/cds/view/p/lang/en/nid/212632
[23]
Johnson DB, Maltz DA, Broch J. DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Network 2001; 11: 139-72.
[24]
Perkins CE, Royer EM. Ad hoc on demand distance vector routing. 2nd IEEE workshop on Mobile Computing Systems and Applications 1999; 90-100.
[25]
Marina MK, Das SR. Ad hoc on-demand multipath distance vector routing. Wireless Commun Mob Comp 2006; 6(7): 969-88.
[26]
Gopinath S, Sureshkumar N, Vijayalakshmi G, Natraj AN, Senthil T, Prabu P. Energy efficient routing protocol for MANET. Int J Comp Sci 2012; 9(2): 292-8.
[27]
Zhu J, Wang X. Model and protocol for energy-efficient routing over mobile ad hoc networks. IEEE Trans Mob Comp 2011; 10(11): 1546-57.
[28]
Rashmi A, Seehra A. A novel approach for preventing black-hole attack in MANETs. Int J Syst Appl 2014; 2(3): 1-9.
[29]
Khin EE, Phyu T. Impact of black hole attack on AODV routing protocol. Int J Info Technol Model Comp 2014; 2(2): 9-17.
[30]
Kumar J, Kulkarni M, Gupta D. Effect of black hole attack on MANET routing protocols. Int J Comp Network Info Sec 2013; 5: 64-72.
[31]
Rajaraman A, Palaniswami S. Malicious node detection system for mobile ad hoc networks. Int J Comp Sci Technol 2010; 1(2): 77-85.


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 9
ISSUE: 1
Year: 2019
Published on: 06 August, 2018
Page: [80 - 110]
Pages: 31
DOI: 10.2174/2210327908666180807100746
Price: $25

Article Metrics

PDF: 21
HTML: 2