CFP last date
20 January 2025
Reseach Article

SecAODV: Lightweight Authentication for AODV Protocol

by J.A.D.C. Anuradha Jayakody, Rohan Samarasinghe, Saluka R. Kodituwakku
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Number 13
Year of Publication: 2016
Authors: J.A.D.C. Anuradha Jayakody, Rohan Samarasinghe, Saluka R. Kodituwakku
10.5120/ijca2016909034

J.A.D.C. Anuradha Jayakody, Rohan Samarasinghe, Saluka R. Kodituwakku . SecAODV: Lightweight Authentication for AODV Protocol. International Journal of Computer Applications. 137, 13 ( March 2016), 33-38. DOI=10.5120/ijca2016909034

@article{ 10.5120/ijca2016909034,
author = { J.A.D.C. Anuradha Jayakody, Rohan Samarasinghe, Saluka R. Kodituwakku },
title = { SecAODV: Lightweight Authentication for AODV Protocol },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 137 },
number = { 13 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume137/number13/24338-2016909034/ },
doi = { 10.5120/ijca2016909034 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:38:18.291369+05:30
%A J.A.D.C. Anuradha Jayakody
%A Rohan Samarasinghe
%A Saluka R. Kodituwakku
%T SecAODV: Lightweight Authentication for AODV Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 137
%N 13
%P 33-38
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In nature of the transmission medium the broadcast, Wireless sensor networks are vulnerable to security attacks. The nodes are placed in a hostile or dangerous environment where they are not tangibly safe in the MANETs. In many application, the data obtained from the sensing nodes need a false, or malicious node could intercept private information or could send false messages to nodes in the network. Among the major attacks Eavesdropping, Spoof Attack, Denial of Service, Wormhole attack, Sinkhole attack, Sybil attack, Selective Forwarding attack, Passive information gathering, Node capturing, and False or malicious node, Hello flood attack are common. In this paper, authors have proposed and implemented an efficient light weighted authentication secure routing protocol on top of an AODV. The focused area of the proposed routing protocol is increasing the network security of the MANET. Additionally, the paper evaluates the implemented protocol using NS2 simulator in different networks with SecAODV.

References
  1. Elizabeth Royer and C-K Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications Magazine, April 1999, pp. 46-55.
  2. Priyanka Goyal, Vinti Parmar and Rahul Rishi,“ MANET: Vulnerabilities, Challenges, Attacks, Application”, IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011: online
  3. M. Bouhorma, H. Bentaouit and A. Boudhir, "Performance comparison of ad-hoc routing protocols AODV and DSR," International Conference on Multimedia Computing and Systems, ICMCS '09, Pages511 - 514, 2009.
  4. Marwan Krunz and AlaaMuqattash,”A Power Control Scheme for MANETs with Improved Throughput and Energy Consumption.”
  5. Liang W., "Minimizing energy and maximizing network lifetime multicasting in wireless ad hoc networks," in IEEE International Conference on Communication (ICC2005), pp. 3375-3380, 2005
  6. Marwan Krunz, AlaaMuqattash, and Sung-JuLee, “Transmission Power Control in Wireless Ad Hoc Networks: Challenges, Solutions, and Open Issues.”
  7. Charles E. Perkins, ElizabethM. Belding-Royer, and Samir R. Das. Ad hoc On-Demand DistanceVector (AODV) Routing. RFC 3561, July 2003.
  8. Mehdi Barati , Kayvan Atefi, Farshad Khosravi and Yashar Azab Dafial ,”Performance Evaluation of Energy Consumption for AODV and DSR Routing Protocols in MANET”, 2012 International Conference on Computer & Information Science (ICCIS)
  9. C. Margi and K. Obraczka, “Instrumenting networking simulators for evaluating energy consumption in power-aware ad-hoc network protocols,” in International Symposium - MASCOTS’ 04, October 2004.
  10. S. Doshi, S. Bhandare, and T. X. Brown, "An on-demand minimum energy routing protocol for a wireless ad hoc network," ACMSIGMOBILE Mobile Computing and Communications Review, ACMUSA, Volume 6 Issue 3, July 2002.
  11. ZdravkoDanailov. Attacks on mobile ad hoc network. Sem- inaRarbeit. URL http://www.slideshare.net/xeon40/ attacks-on-mobile-ad-hoc-networks-12619703.
  12. Jie Wu MihaelaCardei Bing Wu, Jianmin Chen. A survey of attacks and coun- treasures in mobile ad hoc networks. Wireless/Mobile Network Security, 2006 Springer.
  13. Daya Gupta Jaspal Kumar, M. Kulkarni. Secure routing protocols in the ad-hoc network: A review. 2010 for International Conference [ICCT-2010], 2:8, December .
  14. C. Meadows P.Syverson L. W. Chang L. Lazos, R. Poovendran. Prevent- ing wormhole attack ad hoc networks: A graph theoretic approach. Wireless Communication and Networking Conference, 2005 IEEE.
  15. J. Tygar D.Song A.Perrig, R.Canetti. The Tesla broadcast authentication protocol. Internet Draft, 2000.
  16. Zhu Qing-Sheng Li Shi-Chang, Yang Hao-Lan. Research on manet security architecture design. 2010 International Conference on Signal Acquisition and Processing, 2010 IEEE.
  17. Zafar NA and Ahmed IC. Secure key management and verification of mobile ad hoc network. J A Sci 2013;9(1):117-123. ISSN: 1545-1003. URL http://www.jofamericanscience.org.
  18. B. Anushka S. Visagan-B. Hettiarachchi L. Rupasinghe, R. Tennekoon and P. Basnayake. Authentication algorithm to manets through challenge –re- response based architecture. PNCTM, 2, JAN 2013.
  19. MD ASRI NGADI TAMEEM EISSA, SHUKOR ABD RAZAK.Authentication scheme for mobile ad hoc networks. Faculty of Computer Science and Information Systems, UNIVERSITI TEKNOLOGI MALAYSIA SKU- DAI, JOHOR, MALAYSIA.
  20. RFC for AODV, Electronically Available on URL http://www.ietf.org/rfc/rfc3561.txt.Accessed on 02/02/2014
  21. The OpenSSL, Electronically Available on URL http://www.openssl.org/, Accessed on 02/02/2014
  22. P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman Key Agreement with Short Exponents. EUROCRYPT’96, LNCS 1070, Springer-Verlag,1996, pp. 332–343.
  23. Li Shi-Chang. "Research on MANET Security Architecture Design", 2010 International Conference on Signal Acquisition and Processing, 02/2010
  24. International Journal of Soft Computing and Engineering .., [Available on URL] http://www.ijsce.org/attachments/File/Vol-1_Issue-4/D0103081411.pdf (accessed January 15, 2016).
Index Terms

Computer Science
Information Sciences

Keywords

MANET SecAODV Light Weight Authentication QoS