scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Performance Study of a Secure Routing Protocol in Wireless Mobile Ad Hoc Networks

TL;DR: This paper improves the security of routing for the existing D SR protocol by enhancing the concept of trust value, the selection of a secure route will be based on these trust values, and ns-2 simulations are performed to evaluate the impact of applying trust value based route selection to the DSR protocol.
Abstract: Mobile ad hoc network (MANET) is a special type of mobile wireless network where a collection of mobile devices form a temporary network without any aid of an established infrastructure. Security issues put special challenges in MANET routing protocol design. This paper focuses on the performance study for security of a MANET routing protocol, and particularly on the improvement of the security for dynamic source routing protocol (DSR). We improve the security of routing for the existing DSR protocol by enhancing the concept of trust value, the selection of a secure route will be based on these trust values, ns-2 simulations are performed to evaluate the impact of applying trust value based route selection to the DSR protocol
Citations
More filters
Journal ArticleDOI
TL;DR: This paper simulates the environment used for analyzing, evaluating and implementing AODV, DSDV and TORA routing protocols in MANET, to analyze the performance of above said protocols based on Packet Delivery Ratio, Average End-to-End Delay and Throughput.
Abstract: The primary objective of this research work is to study and investigate the performance measures of Reactive protocols (AODV, TORA) and Proactive protocols (DSDV) routing protocols of MANET using TCP & CBR based traffic models. In this paper we will simulate the environment used for analyzing, evaluating and implementing AODV, DSDV and TORA routing protocols in MANET, to analyze the performance of above said protocols based on Packet Delivery Ratio, Average End-to-End Delay and Throughput. We will investigate the effect of change in number of nodes on MANET routing protocols. Here, we will analyze and compare the performance of MANET routing protocols based on both CBR and TCP based traffic patterns. We have used the NS-2 simulator for performing various simulations and used awk scripts for analyzing the results.

48 citations

Journal ArticleDOI
TL;DR: A new mechanism is proposed that improves the performance of routing protocol against the malicious attacks and proposes observing nodes behavior such as nodes’ mobility, and avoiding communication through these nodes which may lead to more secure routing.
Abstract: The increased popularity and usage of wireless technologies has opened the doors for new emerging applications in the domain of networking. One emerging and promising areas is the domain of Mobile Ad Hoc Networks (MANETs). A mobile ad hoc network is a collection of wireless mobile nodes that form a dynamic network without the need for infrastructure or centralized points. The dynamic nature of ad hoc networks presents many security challenges. Secure routing is a promising area for achieving better security for the network by protecting the routing protocols against malicious attacks. Several secure routing protocols have been proposed in the literatures that were successful in avoiding and preventing some types of security attacks in MANETs. However, MANETs are still vulnerable to other types of attacks. Hence, there is a need for introducing an efficient mechanism to detect malicious nodes. In this paper, a new mechanism is proposed that improves the performance of routing protocol against the malicious attacks. Since a malicious node behaves in abnormal ways, this mechanism proposes observing nodes behavior such as nodes’ mobility, and avoiding communication through these nodes which may lead to more secure routing.

17 citations


Cites background from "Performance Study of a Secure Routi..."

  • ...The authors in [18] enhance the security of DSR protocol by enhancing the trust-based route selection mechanism....

    [...]

01 Jan 2011
TL;DR: This work analyzed the performance of AODV, DSR and DSDV protocols for TCP traffic pattern on the basis of Packet Delivery Ratio, Throughput and Jitter.
Abstract: The primary objective of this research work is to study and review the behaviour of AODV, DSR and DSDV routing protocols of MANET. In this paper, we will first discuss the various MANET routing protocols and various studies done on the performance evaluation of mobile Ad-hoc network (MANET). Here, we will study the performance of MANET routing protocols based on TCP traffic patterns. We also analyzed the performance of AODV, DSR and DSDV protocols for TCP traffic pattern on the basis of Packet Delivery Ratio, Throughput and Jitter.

16 citations

Proceedings ArticleDOI
18 Mar 2016
TL;DR: The complete study observes that, security threats not only capture the packets but also degrade network performance, so work considers wormhole attack as study target and will derive mechanism to identify and prevent mobile networks from security threat.
Abstract: Wireless networks are playing important role for development and ease of use of human society. It also gets a lot of attention from research community towards the betterment of applications. A wide range of applications make it very popular and backbone of technology system i.e. GSM, Bluetooth, Wi-Fi etc. In order to categorization of applications, this network gives a unique range for monitoring and surveillance. MANETs may be ad-hoc is fixed natured use to deploy into remote areas for sensing and processing desire information. Due to distributed and open natured of wireless networks, it is vulnerable and prone for attacked to intercept and hijack network communication. Its deployment in remote areas requires more concern of security issues. Open natured communication be a magnet for attacker to intercept and catch the sensed information. Numerous security threats can adversely affect its functioning & degrade network performance. The problem becomes more critical when it deploy for defense mission. Arbitrary network failure or node failure is the natural phenomena and may vary as per real life deployment, but intentional failure or compromising network may lead to leak the information. A various security threats like Worm-hole attack, Black-hole Attack, Gray-hole attack, Sybil Attack etc. are used for packet dropping, capturing and degrading network performance. Security in mobile networks is a challenging task. Furthermore, low profile resources and security overhead create cumbersome situation for detection and prevention mechanism. The complete study observes that, security threats not only capture the packets but also degrade network performance. To overcome vulnerability problems, work considers wormhole attack as study target and will derive mechanism to identify and prevent mobile networks from security threat. A wormhole attack is very popular and applies on network layer by targeting vulnerabilities of routing protocols. The complete works consider Ad-hoc On Demand Routing protocol and identify several vulnerabilities.

14 citations

Proceedings ArticleDOI
14 Dec 2009
TL;DR: Simulation results show that the improved routing protocol using CLB-DSR can effectively balance network load, improve the network throughput and reduce the end-to-end delay, the rate of data dropped.
Abstract: In ad hoc networks, when the load is heavy, the performance of on-demand routing protocols, such as DSR protocol, will suffer large degradation. For instance, the absence of balanced distribution of network flow among nodes in the whole network is highly prone to producing heavy-load key nodes. This results in fast energy consumption of these key nodes, and finally decreasing the survival time of the network caused by their premature failures. To address this problem, a novel algorithm called Cross-layer based Load Balancing algorithm for DSR (CLB-DSR) is proposed. In CLB-DSR, the cross-layer strategy is adopted to exchange the information between data link layer and network layer. Simulation results show that the improved routing protocol using CLB-DSR can effectively balance network load, improve the network throughput and reduce the end-to-end delay, the rate of data dropped.

11 citations


Cites background from "Performance Study of a Secure Routi..."

  • ...It exchanges the information between the data-link layer and the network layer, balances the loads of network and energy consumption of nodes by the crosslayer adaptive mechanism, finally optimizes the target system with limited system resources....

    [...]

References
More filters
01 Jan 1994
TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Abstract: An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing. The protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. Based on results from a packet-level simulation of mobile hosts operating in an ad hoc network, the protocol performs well over a variety of environmental conditions such as host density and movement rates. For all but the highest rates of host movement simulated, the overhead of the protocol is quite low, falling to just 1% of total data packets transmitted for moderate movement rates in a network of 24 mobile hosts. In all cases, the difference in length between the routes used and the optimal route lengths is negligible, and in most cases, route lengths are on average within a factor of 1.01 of optimal.

8,614 citations

Book ChapterDOI
01 Jan 1996
TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Abstract: An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing. The protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. Based on results from a packet-level simulation of mobile hosts operating in an ad hoc network, the protocol performs well over a variety of environmental conditions such as host density and movement rates. For all but the highest rates of host movement simulated, the overhead of the protocol is quite low, falling to just 1% of total data packets transmitted for moderate movement rates in a network of 24 mobile hosts. In all cases, the difference in length between the routes used and the optimal route lengths is negligible, and in most cases, route lengths are on average within a factor of 1.01 of optimal.

8,256 citations

Proceedings ArticleDOI
25 Oct 1998
TL;DR: The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.
Abstract: An ad hoc networkis a collwtion of wirelessmobilenodes dynamically forminga temporarynetworkwithouttheuseof anyexistingnetworkirrfrastructureor centralizedadministration.Dueto the limitedtransmissionrange of ~vlrelessnenvorkinterfaces,multiplenetwork“hops”maybe neededfor onenodeto exchangedata ivithanotheracrox thenetwork.Inrecentyears, a ttiery of nelvroutingprotocols~geted specificallyat this environment havebeen developed.but little pcrfomrartwinformationon mch protocol and no ralistic performancecomparisonbehvwrrthem ISavailable. ~Is paper presentsthe results of a derailedpacket-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocolsthatcovera range of designchoices: DSDV,TORA, DSR and AODV. \Vehave extended the /~r-2networksimulatorto accuratelymodelthe MACandphysical-layer behaviorof the IEEE 802.1I wirelessLANstandard,includinga realistic wtrelesstransmissionchannelmodel, and present the resultsof simulations of net(vorksof 50 mobilenodes.

5,147 citations


"Performance Study of a Secure Routi..." refers background in this paper

  • ...Studies of performance evaluations of routing protocols for mobile ad hoc networks [ 8 , 9] indicate that the following metrics are defined:...

    [...]

Book
01 Mar 2001
TL;DR: The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes, and a summary of some of the simulation and testbed implementation results for the protocol is provided.
Abstract: The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two mechanisms of Route Discovery and Route Maintenance, which work together to allow nodes to discover and maintain source routes to arbitrary destinations in the ad hoc network. The use of source routing allows packet routing to be trivially loop-free, avoids the need for up-to-date routing information in the intermediate nodes through which packets are forwarded, and allows nodes forwarding or overhearing packets to cache the routing information in them for their own future use. All aspects of the protocol operate entirely on-demand, allowing the routing packet overhead of DSR to scale automatically to only that needed to react to changes in the routes currently in use. We have evaluated the operation of DSR through detailed simulation on a variety of movement and communication patterns, and through implementation and significant experimentation in a physical outdoor ad hoc networking testbed we have constructed in Pittsburgh, and have demonstrated the excellent performance of the protocol. In this chapter, we describe the design of DSR and provide a summary of some of our simulation and testbed implementation results for the protocol.

2,579 citations


"Performance Study of a Secure Routi..." refers methods in this paper

  • ...We improve the security of routing for the existing DSR protocol by enhancing the concept of trust value, the selection of a secure route will be based on these trust values. ns-2 simulations are performed to evaluate the impact of applying trust value based route selection to the DSR protocol....

    [...]

  • ...The DSR protocol [1] was specifically designed for use in multi-hop wireless mobile ad hoc networks....

    [...]

Proceedings ArticleDOI
01 Oct 2001
TL;DR: A new routing technique called Security-Aware ad hoc Routing (SAR) is proposed that incorporates security attributes as parameters into ad hoc route discovery and develops a two-tier classification of routing protocol security metrics.
Abstract: We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We develop a two-tier classification of routing protocol security metrics, and propose a framework to measure and enforce security attributes on ad hoc routing paths. Our framework enables applications to adapt their behavior according to the level of protection available on communicating nodes in an ad hoc network.

557 citations


"Performance Study of a Secure Routi..." refers background in this paper

  • ...The authors in [4] proposed a new routing protocol called Security-Aware ad hoc routing (SAR) which incorporates security attributes as parameters into ad hoc route discovery....

    [...]