In mobile ad hoc network (MANET), secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In MANET, attacks can be broadly classified in two categories: routing attacks and data forwarding attacks. Any action not following rules of routing protocols belongs to routing attacks. The main objective of routing attacks is to disrupt normal functioning of network by advertising false routing updates. On the other hand, data forwarding attacks include actions such as modification or dropping data packet, which does not disrupt routing protocol. In this paper, we address the “Packet Drop Attack”, which is a serious threat to operational mobile ad hoc networks. The consequence of not forwarding other packets or dropping other packets prevents any kind of communication to be established in the network. Therefore, there is a need to address the packet dropping event takes higher priority for the mobile ad hoc networks to emerge and to operate, successfully. In this paper, we propose a method to secure ad hoc on-demand distance vector (AODV) routing protocol. The proposed method provides security for routing packets where the malicious node acts as a black-hole and drops packets. In this method, the collaboration of a group of nodes is used to make accurate decisions. Validating received RREPs allows the source to select trusted path to its destination. The simulation results show that the proposed mechanism is able to detect any number of attackers.
DOI: j.msl.2012.08.018 Keywords: MANETs ,Ad hoc ,AODV ,Security ,Packet drop attack , How to cite this paper: Alishahi, Z., Mirabedini, J & Kuchaki Rafsanjani , M. (2012). A new method for improving security in MANETs AODV Protocol.Management Science Letters, 2(7), 2271-2280.
References
Abdalla, A.M., & Saroit, I.A., & Kotb, A., & Afsari, A.H.(2011). Misbehavior Nodes Detection and Isolation for MANETs OLSR Protocol. Procedia Computer Science, 115–12.
Haas, Z. J., Pearlman, M. R., & Samar, P. (2002). The inter zone routing protocol (IERP) for ad hoc networks. INTERNET DRAFT, MANET working group. Hu, Y., Johnson, D.B., & Perrig, A. (2002b). Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), 3-13. Hu, Y.C., Johnson, D.B., & Perrig, A. (2002a). Ariadne: A secure on-demand routing protocol for ad hoc networks. Proceeding of 8th Annual International Conference on Mobile Computing and Networking, ACM Press, 12-23. Hu, Y.C., & Perrig, A. (2004). A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2(3), 28-39. Kravets, R., Yi, S., & Naldurg, P. (2001). A security-aware routing protocol for wireless ad hoc networks. Proceedings of ACM MOBIHOC, 299-302. Murthy, C.S.R., & Manoj, B. (2004). Ad hoc Wireless Networks: Architectures and Protocols. Prentice Hall. Johnson, D.B., & Maltz, D.A. (1996). The dynamic source routing protocol in ad hoc wireless networks. Mobile Computing, Kluwer Academic Publishers, 353, 153-181. Johnson, D. B. et al. (2003). The dynamic source routing protocol for mobile adhoc networks (DSR). INTERNET DRAFT, MANET working group. Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. SCS Communication Networks and Distributed Systems Modeling and Simulation Conference. Perkins, C.E., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. Proceeding of ACM SIG-COMM. 24, 234-244. Perkins, C.E., & Royer, E.M. (1999). Ad hoc on-demand distance vector (aodv) routing. Proceeding of IEEE Workshop on Mobile Computing System and Applications. 90-100. Perkins, C. E, Belding-Royer, E. M, & Das, S. R. (2003). Ad hoc on-demand distance vector (AODV) routing. Internet Request for Comments, RFC3561. Perrig, A., Canetti, R., Song, D., & Tygar, D. (2001). Efficient and secure source authentication for multicast. Network and Distributed System Security Symposium (NDSS01). Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., & Royer, E.M.B. (2002). A secure routing protocol for ad hoc networks. Proceedings of IEEE ICNP, 78-87. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 11, 38-47. Zapata, M.G., & Asokan, N. (2003). Securing ad hoc routing protocols. Proceeding of ACM Workshop on Wireless Security (WiSe), ACM Press, 1-10. |
![]() |
® 2013 GrowingScience.Com