Abstract
Mobile Ad-hoc Networks (MANETs) are forming dynamically by joining or leaving the nodes into/from the network without any fix infrastructure. It is also possible that each mobile node act as a host or router. This kind of wireless network is prone to various security threats or attacks due to its unique characteristics like dynamic topology, open medium, lack of central monitoring, etc. So security is a vital scope in MANET to protect communication between mobile nodes. Ad-hoc On-demand Distance Vector (AODV) is one of the on-demand reactive routing protocols in MANET that initially was improved without considering security protection. Significant attempts have been done to secure AODV routing protocol in MANET but there are still critical challenges to overcome. In the present study, after reviewing secured protocols of some previous researches, an improved protocol is proposed to enhance the security of AODV routing protocol against black hole attack. For this purpose, we used a different level of trust for MANET nodes and imposed the limitations based on the nodes’ trust level, in order to detect the compromised nodes and malicious behaviors inside MANET; which leads to the low delay and high performance in the network. Finally, we simulated the proposed protocol with NS-2 simulator as a means to validate it and evaluate the results. In fact, the results, demonstrate the efficiency of the presented protocol and its resistance to the black hole attack in comparison to AODV routing protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agrawal, S., Jain, S., Sharma, S.: A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks. Journal of Computer 3(1), 41–48 (2011)
Wadbude, D., Richariya, V.: An Efficient Secure AODV Routing Protocol in MANET. International Journal of Engineering and Innovative Technology (IJEIT) 1(4), 274–279 (2012)
Venkatraman, L., Agrawal, D.P.: Strategies for enhancing routing security in protocols for mobile ad hoc networks. Journal of Parallel and Distributed Computing 63(2), 214–227 (2003)
Raj, P.N., Swadas, P.B.: Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet. arXiv preprint arXiv:0909.2371 (2009)
Vasava, M., Patel, H.: Comparison of Different Methods for Gray Hole Attacks on AODV based MANET. International Journal of Engineering Development and Research 2(1), 60–66 (2014)
Sanyal, S., Abraham, A., Gada, D.: Security Scheme for Distributed DoS in Mobile Ad Hoc Networks, School of Technology and Computer Science, Tata Institute of Fundamental Research, India, Mumbai University, India (2010)
Sarkar, P., Chaki, R.: A cryptographic approach towards black hole attack detection. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing & Inform. Technology. AISC, vol. 176, pp. 273–278. Springer, Heidelberg (2012)
Goswami, J., Dafda, A.: Security aspects with AODV in WMANETs. In: National Conference on Power Systems, Embedded Systems, Power Electronics, Communication, Control and Instrumentation. Department of Electronics & Comm. Engg., L.D. Collage of Engg. Ahmedabad, Gujarat, January 2012
Perkins, C.: (RFC) Request for Comments – 3561. Category: Experimental, Network, Working Group, July 2003
Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings of the ACM workshop on Wireless Security. ACM (2002)
Meka, K., Virendra, M., Upadhyaya, S.: Trust based routing decisions in mobile ad-hoc networks. In: Proceedings of the Workshop on Secure Knowledge Management (SKM (2006)
Cordasco, J., Wetzel, S.: Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science 197(2), 131–140 (2008)
Simaremare, H., et al.: Secure AODV routing protocol based on trust mechanism. In: Wireless Networks and Security, pp. 81–105. Springer, Heidelberg (2013)
Sharma, P.: Trust based secure aodv in manet. Journal of Global Research in Computer Science 3(6), 107–114 (2012)
Uddin, M., Rahman, A.A., Alarifi, A., Talha, M., Shah, A., Iftikhar, M., Zomaya, A.: Improving Performance of Mobile Ad Hoc Networks Using Efficient Tactical On Demand Distance Vector (TAODV) Routing Algorithm. International Journal of Innovative Computing, Information and Control 8(6), 4375–4389 (2012)
ShafieeNejad Ghahroud, H.: Detection of Malicious Node in Black in Black-Hole Attack on AODV Protocol, Shiraz University of Technology: Hamid Shafiee Nejad Ghahroud (2012)
Liu, S., Yang, Y., Wang, W.: Research of AODV Routing Protocol for Ad Hoc Networks1. AASRI Procedia 5, 21–31 (2013)
Jali, K.A., Ahmad, Z., Ab Manan, J.-L.: Mitigation of Black Hole Attacks for AODV Routing Protocol. International Journal of New Computer Architectures and their Applications (IJNCAA) 1(2), 336–343 (2011)
Masdari, M., Pashaei Barbin, J.: Distributed Certificate Management in Mobile Ad Hoc Networks. International Journal of Applied Information Systems (IJAIS) 4, 33–40 (2012)
Sanzgiri, K., et al.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols. IEEE (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Gharehkoolchian, M., Hemmatyar, A.M.A., Izadi, M. (2015). Improving Security Issues in MANET AODV Routing Protocol. In: Mitton, N., Kantarci, M., Gallais, A., Papavassiliou, S. (eds) Ad Hoc Networks. ADHOCNETS 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 155. Springer, Cham. https://doi.org/10.1007/978-3-319-25067-0_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-25067-0_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25066-3
Online ISBN: 978-3-319-25067-0
eBook Packages: Computer ScienceComputer Science (R0)