Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

An Overview of Secure Routing Protocols Mobile AdHoc Network

V.Vandhana,
S.Eswaran,
Department of ECE, Sasurie Academy of Engineering, Coimbatore, India

Abstract:
Mobile Ad hoc Networks are assortment of mobile terminals or nodes, allowing no
Stationary infrastructure and centralized administration. Several routing protocols have been proposed in
recent years for possible deployment of Mobile Ad hoc Networks (MANETs) in military, government and
commercial applications. The strength of its infrastructure (wireless nature) also becomes the point of its
greatest vulnerability. Thus decreasing the confidence level of the system as it pertains to availability,
reliability, data integrity and privacy concerns. Protocols are introduced for improving the routing
mechanism to find route between any source and destination host across the network. In this paper we
present a survey on routing protocols and we review OLSR protocol and improvements on this protocol.

Keywords Ad hoc networks, routing protocols, security, wireless systems, mobile routing.

INTRODUCTION advances, when the high-tech communication

With the widespread rapid development of equipment, the size, weight continuously
computers and the wireless communication, the decreases, power consumption is getting low,
mobile computing has already become the field Personal Communication System (Personal
of computer communications in high-profile Communication System, PCS) concept evolved,
link. Mobile Ad Hoc Network (MANET) is a from the past few years the rapid popularization
completely wireless connectivity through the of mobile phones can be seen to communicate
nodes constructed by the actions of the network, with others anytime, anywhere, get the latest
which usually has a dynamic shape and a limited information, or exchange the required
bandwidth and other features, network members information is no longer a dream, And we have
may be inside the laptop, Personal Digital gradually become an integral part of life.
Assistant (PDA), mobile phones, MP3 players, Military purposes, as is often considerable
and digital cameras and so on. On the Internet, danger in field environment, some of the major
the original Mobility (mobility) is the term used basic communication facilities, such as base
to denote actions hosts roaming in a different stations, may not be available, in this case,
domain; they can retain their own fixed IP different units, or if you want to communicate
address, without the need to constantly between the forces, we must rely on This cannot
changing, which is Mobile IP technology. MANET network infrastructure limitations. In
Mobile IP nodes in the main action is to deal emergency relief, the mountain search and
with IP address management, by Home Agent rescue operations at sea, or even have any
and Foreign Agent to the Mobile Node to packet infrastructure cannot be expected to comply with
Tunneling, the Routing and fixed networks are the topographical constraints and the pressure of
no different from the original; however, Ad Hoc time under the pressure, Ad Hoc Network
Network to be provided by Mobility is a fully completely wireless and can be any mobile
wireless, can be any mobile network feature is especially suited to disaster relief
infrastructure, without a base station, all the operations. When personal communication
nodes can be any link, each node at the same devices and more powerful, some assembly
time take Router work with the Mobile IP occasions, if you need to exchange large
completely different levels of Mobility. Early amounts of data, whether the transmission of
use of the military on the Mobile Packet Radio computer files or applications that display. if
Networked in fact can be considered the We can link into a temporary network structure,
predecessor of MANET, with the IC technology then the data transmission will be more efficient
Without the need for large-scale projection network depends ad hoc wireless networks by
equipment would not have point to point link eliminating the various factors like mobility,
equipment (such as network line or transmission bandwidth, periodic table-update messages
line). The current wireless LAN technology, required in the resource constraint, hidden and
Bluetooth is has attracted considerable attention exposed table-driven approach. The major
as a development plan. Bluetooth's goal is to difference between this and the other on-demand
enable wireless devices to contact with each routing protocols is that it is beacon-less and
other, if the adding the design of Ad Hoc hence does not require periodic hello packet
Network (MANET). (beacon) transmissions, which are used by a
The security of communication in ad hoc node to inform its neighbors of its presence. The
wireless networks is important, especially in basic approach of this protocol (and all other on-
military applications. The absence of any central demand routing protocols) during the route
coordination mechanism and shared wireless construction phase is to establish a route by
medium makes MANETs more vulnerable to flooding Route Request packets in the network.
digital/cyber attacks than wired networks. The destination node, on receiving a Route
Designing of routing protocol in AdHoc network Request packet, responds by sending a Route
depends various factors like mobility, Reply packet back to the source, which carries
bandwidth, resource constraint, hidden and the route traversed by the Route Request packet
exposed terminal problems etc. Thus, routing received.
protocol is structured for purposes such as fully
distributed, adaptive frequent and stable AODV Protocol:
topology, loop free and minimum number of An adhoc network is the cooperative
collisions. engagement of a collection of mobile nodes
DSR Protocol: without the required inter vention of any
The Dynamic Source Routing protocol centralized access point or existing infrastructure
(DSR)(MANET) is a set of mobile devices In this paper we present Adhoc On Demand
(nodes), which over a shared wireless medium is Distance Vector Routing AODV a novel
a simple and efficient routing protocol algorithm for the operation of such adhoc
communicate with each other without the networks Each Mobile Host operates as a
designed specifically for use in multi-hop specialized router and routes are obtained as
presence of a predefined infrastructure or a needed on demand with little or no reliance on
wireless ad hoc networks of mobile nodes. DSR periodic advertisements Our new routing
central authority. Due to no stationary allows the algorithm is quite suitable for a dynamic self
network to be completely self- infrastructure, all starting network as required by users wishing to
nodes can move freely, organizing and self- utilize adhoc networks. The AODV (Ad-Hoc
configuring, without the topology may change On-Demand Distance Vector) routing protocol
rapidly and unpredictably need for any existing is a reactive routing protocol that uses some
network infrastructure or over time, and nodes characteristics of proactive routing protocols.
have to form their own administration. The Routes are established on-demand, as they are
protocol is composed of the mutual needed. However, once established a route is
infrastructures. The security of two mechanisms maintained as long as it is needed. Reactive (or
of Route Discovery and Route communication on-demand) routing protocols find a path
in ad hoc wireless networks is Maintenance, between the source and the destination only
which work together to allow important, when the path is needed (i.e., if there are data to
especially in military applications. nodes to be exchanged between the source and the
discover and maintain source routes to The destination). An advantage of this approach is
absence of any central coordination arbitrary that the routing overhead is greatly reduced. A
destinations in the ad hoc network. mechanism disadvantage is a possible large delay from the
and shared wireless medium makes Dynamic moment the route is needed (a packet is ready
source routing protocol (DSR) is an MANETs to be sent) until the time the route is actually
more vulnerable to digital/cyber on-demand acquired.
protocol designed to restrict attacks than wired
networks. Designing of the bandwidth consumed DSDV Protocol:
by control packets in routing protocol in AdHoc DSDV (Destination-Sequenced Distance
Vector Routing DSDV) is a table driven routing This usually occurs from a router becoming
scheme. Its based on Bellman-Ford algorithm. compromised from a number of different
Each entry in the routing table contains a causes. One cause mentioned in research is
sequence number which is generated by the through a denial-of-service attack on the
destination by the destination and the emitter router using a known DDOS tool. Because
needs to send out the next update using this
packets are routinely dropped from a lossy
Number Routing information is distributed
between nodes by sending full dumps network, the packet drop attack is very hard
infrequently and smaller incremental updates to detect and prevent.
more frequently. Attacks on AODV Protocol:
At the start of communication routes are
II Routing Algorithms Comparisons: generated by Network Each and every node
has its own sequence number, and this
DPRAODV Protocol: number increases whenever a link changes.
DPRAODV received signal is higher Sends a route request (RREQ) message by
than the threshold value, then the sender node is using broadcasting. The RREQ ID increases
regarded as black hole node and then a blacklist by one every time node S sends an RREQ
is constructed with the attacker node increases
message If they have a valid route to the
the packet delivery ratio with nominal increase
in routing overhead. This method cannot detect destination, then they send an RREP
the cooperative black hole attacks. Also the false message to node.
detection ratio of this scheme is high. Bootstrapping Security Associations for
Routing:
Secure Adhoc Routing:
Ad hoc network routing protocols A Cyclic Dependency Problem:
have been based in part on distance vector Routing service depends on security services
approaches, they have generally assumed a trusted to authenticate the source of a message (i.e., its
environment. In this research project, we design IP address) and the message content. To acquire
and evaluate the Secure Efficient Adhoc Distance secure bindings between a nodes IP address and
vector routing protocol (SEAD), a secure ad hoc
key, it must either reach a trusted authority node
network routing protocol based on the design of
the Destination-Sequenced Distance-Vector or establish trust relationships with other nodes
routing protocol (DSDV). without relying on trusted authorities.
Intrusion Detection System:
Breaking the Cyclic Dependency :
An intrusion detection system (IDS) is a
We remove dependency by using a secure
device or software application that monitors binding mechanism for establishing secure node-
network or system activities for malicious to node associations that is independent of
activities or policy violations and produces secure routing and other security services. Idea
reports to a management station. IDS come of a secure binding between an IP address and a
in a variety of flavors and approach the key that is independent of any other security
goal of detecting suspicious traffic in services by control messages of MIPv6.
different ways. There are network based
(NIDS) and host based (HIDS) intrusion Intrusion Detection:
detection systems. Some systems may The Optimized Link State Routing (OLSR)
attempt to stop an intrusion attempt but this protocol is a proactive Mobile Ad hoc Network
(MANET) routing protocol.
is neither required nor expected of a
monitoring system. Intrusion detection and The OLSR Protocol:
prevention systems (IDPS) are primarily The protocol is an optimization of the
focused on identifying possible incidents, classical link state algorithm tailored to the
logging information about them, and requirements of a mobile wireless LAN. The key
reporting attempts. concept used in the protocol is that of multipoint
Gray Hole Attack relays (MPRs). MPRs are selected nodes which
forward broadcast messages during the flooding ECE Department for this guidance and
process. This technique substantially reduces the precious time allotted me for this work. Also
message overhead as compared to a classical a heartily thank to SASURIE ACADEMY
flooding mechanism, where every node OF ENGG,CBE for valuable inputs and
retransmits each message when it receives the directions for shaping this project.
first copy of the message. In OLSR, link state
information is generated only by nodes elected
as MPRs. Thus, a second optimization is
Reference:
achieved by minimizing the number of control [1] A. Fatemeh Sarkohaki, B. Shahram
messages flooded in the network. As a third Jamali A Survey of Routing Protocols for
optimization, an MPR node may chose to report Mobile AdHoc Networks with
only links between itself and its MPR selectors. Comprehensive Study of OLSR
International journal of Computer Science &
PRISM: Privacy-friendly Routing in Network Solutions- 2014.
Suspicious [2] S. Sutha , Dr. B. Anandhi Routing
Protocols towards Security objective of
MANETs (and VANETs): Mobile Adhoc Networks A Survey
IJISET - International Journal of Innovative
Mobile Ad-Hoc Networks (MANETs) play
Science, Engineering & Technology, Vol. 1
an increasingly important role in many
environments and applications, especially, in Issue 8, October 2014
critical settings that lack fixed network [3] Sudhir Agrawal, Sanjeev Jain, Sanjeev
infrastructure, such as: emergency rescue, Sharma A Survey of Routing Attacks and
humanitarian aid, as well as military and law Security Measures in Mobile Ad-Hoc
enforcement. Privacy aspects of mobility. Unlike Networks Journal of computing, volume 3,
most networks, where communication is based issue 1, January 2011, 2151-9617.
on long-term identities (addresses), we argue [4] Loay Abusalah, Ashfaq Khokhar, and
that the location-centric communication Mohsen Guizani A Survey of Secure
paradigm is better-suited for privacy in Mobile Ad Hoc Routing Protocols IEEE
suspicious MANETs. To this end, we construct communications surveys & tutorials, vol. 10,
an on-demand location-based anonymous
no. 4, fourth quarter 2008.
MANET routing protocol (PRISM) that achieves
privacy and security against both outsider and [5] S.Ranjithkumar, N. Thillaiarasu, A
insider adversaries. We analyze security, privacy Survey of Secure Routing Protocols of
and performance of PRISM and compare it to Mobile AdHoc Network International
alternative techniques. Results show that PRISM Journal of Computer Science and
is more computationally efficient and offers Engineering volume 2 issue 2 February
better privacy than prior work. 2015.
[6] V. Shanmuganathan Mr.T.Anand A
Application Examples: Survey on Gray Hole Attack in MANET
Military and law enforcement MANETs IRACST International Journal of
are compelling examples of settings where Computer Networks and Wireless
privacy, in addition to security, is very Communications (IJCNWC), ISSN: 2250-
important. Zooming in on the military 3501.
example, one can imagine a battlefield
MANET composed of different types of
nodes, like infantry soldiers, vehicles, and
aircrafts as well as other types of personnel
and equipment.
ACKNOWLEDGEMENT
I would like to thank my guide,
Mrs.V.Vandhana (HOD/ECE) and staff of

You might also like