Academic Journals Database
Disseminating quality controlled scientific knowledge

Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism

ADD TO MY LIST
 
Author(s): Preeti Sachan | Pabitra Mohan Khilar

Journal: International Journal of Network Security & Its Applications
ISSN 0975-2307

Volume: 3;
Issue: 5;
Start page: 229;
Date: 2011;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Mobile ad hoc network (MANET) | Routing attacks | AODV | Black hole | Impersonation | HMAC | Authentication

ABSTRACT
In mobile ad hoc wireless network (MANET), secure communication is morechallenging task due to its fundamental characteristics like infrastructure less, wirelesslink, distributed cooperation, dynamic topology, lack of association, resource constrainedand physical vulnerability of node. In MANET, attacks can be broadly classified in twocategories: routing attacks and data forwarding attacks. Any action not following rules ofrouting protocols belongs to routing attacks. The main objective of routing attacks tomislead or disrupt normal functioning of network by advertising false routing updates. Onthe other hand data forwarding attacks include actions such as modification or droppingof data packet that does not disrupt routing protocol. In this thesis work, we proposed amethod to secure ad hoc on-demand distance vector (AODV) routing protocol. Theproposed method provides security for routing packets and can efficiently prevent theattacks such as black hole, modifying routing information and impersonation. Theproposed method uses hashed message authentication code (HMAC) function whichprovides fast message verification and sender as well as intermediate nodesauthentication. We simulate and compare the proposed method with original AODV andsecure AODV (SAODV) protocol using network simulator tool (NS2). Simulation resultshows that proposed method minimizes the time delay and network routing load involvedin computation and verification of security fields during route discovery process andperforms better than the original AODV protocol in the presence of malicious nodesperforming black hole attack.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions