Loading...

Improving security issues in MANET AODV routing protocol

Gharehkoolchian, M ; Sharif University of Technology | 2015

757 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/978-3-319-25067-0_19
  3. Publisher: Springer Verlag , 2015
  4. Abstract:
  5. Mobile Ad-hoc Networks (MANETs) are forming dynamically by joining or leaving the nodes into/from the network without any fix infrastructure. It is also possible that each mobile node act as a host or router. This kind of wireless network is prone to various security threats or attacks due to its unique characteristics like dynamic topology, open medium, lack of central monitoring, etc. So security is a vital scope in MANET to protect communication between mobile nodes. Ad-hoc On-demand Distance Vector (AODV) is one of the on-demand reactive routing protocols in MANET that initially was improved without considering security protection. Significant attempts have been done to secure AODV routing protocol in MANET but there are still critical challenges to overcome. In the present study, after reviewing secured protocols of some previous researches, an improved protocol is proposed to enhance the security of AODV routing protocol against black hole attack. For this purpose, we used a different level of trust for MANET nodes and imposed the limitations based on the nodes’ trust level, in order to detect the compromised nodes and malicious behaviors inside MANET; which leads to the low delay and high performance in the network. Finally, we simulated the proposed protocol with NS-2 simulator as a means to validate it and evaluate the results. In fact, the results, demonstrate the efficiency of the presented protocol and its resistance to the black hole attack in comparison to AODV routing protocol
  6. Keywords:
  7. Gravitation ; Internet protocols ; Mobile security ; Network security ; Routers ; Routing protocols ; Stars ; Telecommunication networks ; AODV protocols ; Black hole attack ; MANET ; Secure routing ; Trust-based technique ; Mobile ad hoc networks
  8. Source: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 1 September 2015 through 2 September 2015 ; Volume 155 , November , 2015 , Pages 237-250 ; 18678211 (ISSN) ; 9783319250663 (ISBN)
  9. URL: http://link.springer.com/chapter/10.1007%2F978-3-319-25067-0_19