a security scheme for mobile ad-hoc network using various routing protocols

G.AMBIKA,

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:2         Year: 25 August,2014         Pages:375-380

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

A mobile ad-hoc network is gathering of mobile nodes which are design to converse each other without fix transportation and central coordination. Wireless networks are becoming more and more ubiquitous in recent years, ranging from Digital cellular telephony up to satellite broadcasting. Since in the MANET, routing protocols have no security mechanism. They are designed only to provide correct routing and have ability to adjust their dynamic changing condition. With the increasing demand and Penetration of wireless services, users of wireless networks now expect Quality of Service and performance comparable to what is available from fixed networks. So MANET is more venerable due to their routing behavior. Routing protocols are more affected by two way, first one is attacks from private node that do not belongs to network and also disrupted by presence of compromise nodes. In this paper three routing protocols aodv, dsr, and tora are compared. Opnet is used to simulate the performance of the routing protocols. Opnet modeler is one of the most popular products for modeling and simulating of computer network. We can solve the issue of attacks from private nodes by authentication techniques that provide mutual trust between nodes. In this paper, we proposed digital signature scheme to provide mutual trust between nodes.

Kewords

Ad-hoc network, DSR, Routing security.

Reference

[1] L.Pengwei and X.Zhenqiang, Security Enhancement of AODV against Internal Attacks, International Conference on Information Science and Engineering (ICISE), Vol. 2, pp 584-586, 2010. [2] A.Das, S.S.Basu and A.Chaudhuri, A Novel security scheme for wireless Ad-hoc network, International Conference on Wireless Communication Vehicular Technology, Information theory and Aerospace and Electronic System technology, Vol. 2, pp 1-4, 2011. [3] DENG Hongmei, L I Wei and D P Agrawala, Routing Security in Wireless Ad Hoc Networks, International Journal of IEEE, Communication Magazine, Vol. 40(10), pp 70-75, 2002. [4] Parulpreet Singh, Ekta Barkhodia, Gurleen Kaur Walia, Performance Study of Different Routing Protocols(OLSR, DSR, AODV) Under Different Traffic Loads and with Same Number of Nodes, of Electronics & Communication, LPU, Phagwara, Vol. 3, Issue 1, Jan.- March 2012 [5] Park, V., Corson, S., Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification, IETF MANET Working Group Internet Draft. Draft-item-manet-TORA-spec-03.txt. November 2000. [6] Deep Kaur and Kirandeep Kaur “QoS in WLAN using IEEE 802.11e (Survey of QoS in MAC layer Protocols)” of SBS College of Engineering and Technology, Ferozepur, India, 2012 IEEE DOI 10.1109/ACCT.2012.93