CFP last date
20 January 2025
Reseach Article

The Enhancement of Routing Security in Mobile Ad-hoc Networks

by Turkan Ahmed Khaleel, Manar Younis Ahmed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 16
Year of Publication: 2012
Authors: Turkan Ahmed Khaleel, Manar Younis Ahmed
10.5120/7435-0480

Turkan Ahmed Khaleel, Manar Younis Ahmed . The Enhancement of Routing Security in Mobile Ad-hoc Networks. International Journal of Computer Applications. 48, 16 ( June 2012), 41-48. DOI=10.5120/7435-0480

@article{ 10.5120/7435-0480,
author = { Turkan Ahmed Khaleel, Manar Younis Ahmed },
title = { The Enhancement of Routing Security in Mobile Ad-hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 16 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 41-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number16/7435-0480/ },
doi = { 10.5120/7435-0480 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:44:15.663010+05:30
%A Turkan Ahmed Khaleel
%A Manar Younis Ahmed
%T The Enhancement of Routing Security in Mobile Ad-hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 16
%P 41-48
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we study the routing security issues of MANETs, we propose an algorithm to detect malicious nodes based on intelligent water drops algorithm and examine "routing modification attack" problem that can easily be exploited against the MANETs. We also propose a solution for this problem and examine security issues related to proactive routing protocols for MANETs. This could be achieved by adding some extensions to secure routing. These extensions include integrity which means that the message will not change along the route and authentication which means that the sender is the one who introduces himself. This protection is provided by a hash chain and authentication by digital signature which both added to all control massages. We obtained acceptable results depending on the performance of metrics(end-to-end delay and network load). The difference in average of end-to-end delay when using secure protocol is very small and the average of network load is also very small.

References
  1. Shandilya S. K. and Sahu S. ,2010. A Trust Based Security Scheme for RREQ Flooding Attack in MANET, International Journal of Computer Applications (0975 – 8887),Vol. 5, No. 12, pp. 4-8.
  2. Adjih C. , Clausen T. , Laouiti A. , Muhlethaler P. , and Raffo D. , 2005. Securing The OLSR Routing Protocol With Or Without Compromised Nodes In The Network, National Institute For Research In Computer Science And Control, No. 5494, pp. 1-55.
  3. Raffo D. , 2005. Security Schemes for the OLSR Protocol for Ad Hoc Networks, PhD. thesis, Université Paris 6, INRIA Thesis Director,version 1– 18. pp40-51.
  4. Imani M. , Taheri M. and Naderi M. , 2010. Security enhanced routing protocol for Ad-hoc networks, Journal of Convergence, Future Technology Research Association International, Vol. 1, No. 1, pp. 43-48.
  5. Zapata M. G. , 2001. Secure Ad hoc On-Demand Distance Vector Routing, Mobile Computing and Communications Review, Vol. 6, No. 3,pp. 106-107.
  6. Hu Y. C. , Johnson D. B. , and Perrig A. , 2002. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad-hoc Networks, Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), pp 3-13.
  7. Hafslund A. , Tønnesen A. , Rotvik R. B. , Andersson J. , and Kure Ø. , 2004. Secure Extension to the OLSR protocol", OLSR Interop and Workshop, pp. 1-4.
  8. Hu Y. C. , Perrig A. , and Johnson D. B. , 2005. Ariadne: a secure on-demand routing protocol for Ad-hoc networks, Wireless Networks, Vol. 11, No. 1–2, pp. 21-38.
  9. Agrawal S. , Jain S. , and Sharma S. , 2011. A Survey Of Routing Attacks And Security
  10. Erritali M. and Reda O. M. and Ouahidi B. E. , 2011. A Contribution To Secure The Routing Protocol "Greedy Perimeter Stateless Routing'' Using A Symmetric Signature based, International Journal of Distributed and Parallel Systems (IJDPS) Vol. 2, No. 5, pp. 95-103.
  11. Sadasivam K. , 2005. Performance And Security In Mobile Ad Hoc Networks, M. Sc. thesis,University of Houston-Clear Lake, pp. 45-64.
  12. Hosseini H. S. ,2009. "The Intelligent Water Drops Algorithm: A Nature-Inspired Swarm-Based Optimization Algorithm", INT. J. Bio-Inspired Computation, Vol. 1, Nos. 1/2, pp. 71-79.
  13. Qureshi S. , Asar A. , Rehman A. , and Baseer A. ,2011. Swarm Intelligence based Detection of Malicious Beacon Node for Secure Localization in Wireless Sensor Networks, Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) ,vol. 2, No. 4,pp. 664-672.
  14. Noferesti S. and Shah-Hosseini H. ,2012. A Hybrid Algorithm for Solving Steiner Tree Problem, International Journal of Computer Applications, Vol. 41, No. 5,pp. 14-20.
  15. Nguyen T. A. , 2006. Evaluations Of Secure MANET Routing Protocols In Malicious Environments, M. Sc. thesis, University of Houston Clear Lake, pp. 12-17.
Index Terms

Computer Science
Information Sciences

Keywords

Ad-hoc Network Routing Security Routing Attacks Intelligent Water Drops