CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

SNAuth-SPMAODV: Secure Neighbor Authentication Strict Priority Multipath AODV against Denial of Service attack for MANET in Military Scenario

by D.devi Aruna, P.subashini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 4
Year of Publication: 2012
Authors: D.devi Aruna, P.subashini
10.5120/7333-9047

D.devi Aruna, P.subashini . SNAuth-SPMAODV: Secure Neighbor Authentication Strict Priority Multipath AODV against Denial of Service attack for MANET in Military Scenario. International Journal of Computer Applications. 48, 4 ( June 2012), 1-6. DOI=10.5120/7333-9047

@article{ 10.5120/7333-9047,
author = { D.devi Aruna, P.subashini },
title = { SNAuth-SPMAODV: Secure Neighbor Authentication Strict Priority Multipath AODV against Denial of Service attack for MANET in Military Scenario },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 4 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number4/7333-9047/ },
doi = { 10.5120/7333-9047 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:43:11.135003+05:30
%A D.devi Aruna
%A P.subashini
%T SNAuth-SPMAODV: Secure Neighbor Authentication Strict Priority Multipath AODV against Denial of Service attack for MANET in Military Scenario
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 4
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without infrastructure. Due to this nature of MANET; it is possible that there could be some malicious and selfish nodes that try to compromise the routing protocol functionality and makes MANET vulnerable to Denial of Service attack in military communication environments. This paper consider military scenarios and evaluate the performance of Security-enhanced-Multipath AODV (Ad hoc On-demand Distance Vector Routing) routing protocol called SNAuth-SPMAODV (Secure Neighbor Authentication Strict Priority Multipath Ad hoc On-demand Distance Vector Routing). The protocol discovers multiple paths between sender and receiver nodes without introducing extra packets into the network and authenticates the neighbor offering robustness in a secured MANET. The SNAuth-SPMAODV protocol has been implemented and simulated on Qualnet 5. 0. Based on the simulation result, it can be shown that SNAuth-SPMAODV does provide a more reliable data transfer compared to the normal AODV if there are malicious nodes in the MANET.

References
  1. B. Aerobic, R. Curtmola, H. Rubens, D. Holmer, and C. Nita-Rotaru, "On the survivability of routing protocols in ad hoc wireless networks," IEEE, 2005.
  2. Aad, J. P, Hubaux, and E. W. Knightly, "Denial of Service Resilience in Ad Hoc Networks", ACM MOBICOM 2004, Philadelphia, PA, USA.
  3. V. Gupta, S. Krishnamurthy, and M. Faloutsos," Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks". In Proc. of MILCOM, 2002.
  4. C. E. Perkins, E. M. Royer & S. Das, Ad Hoc On Demand Distance Vector (AODV) Routing, IETFInternet draft, draft-ietf-manet-aodv-08. txt, March 2001
  5. A. Boukerche," Performance Evaluation of Routing Protocols for Ad Hoc Wireless Networks", Mobile Networks and Applications 9, Netherlands, 2004, pp. 333-342
  6. A. E. Mahmoud, R. Khalaf & A, Kayssi," Performance Comparison of the AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks", Lebanon, 2007
  7. Qualnet Documentation, "Qualnet 5. 0 Model Library, Network Security", Available: Http:// Www. Scalablenetworks. Com/Products/Qualnet/Downlaod. . . .
  8. S. Xu, Y. Mu, and W. Susilo. "Secure AODV Routing Protocol Using One-Time Signature". In Proc. 1st International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2005). Springer, LNCS 3794. Dec. 2005.
  9. Ming Yu; Mengchu Zhou; Wei Su, "A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments", IEEE Transactions on Vehicular Technology Vol-58, Issue 1, Jan. 2009 , pp. 449 – 460.
  10. Nasser, N. ; Yunfeng Chen, "Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks", IEEE International Conference on Communications, ICC apos; Vol-07 , Issue 24-28 June 2007 , pp. 1154 – 1159.
  11. M. G. Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. IETF INTERNET DRAFT, MANET working group, Nov. 2004. draft-guerrero-manet-saodv-02. txt.
  12. C. Perkins, E. B. Royer, S. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing - Internet Draft", RFC 3561, IETF Network Working Group, July 2003.
  13. C. E. Perkins and E. M. Royer, "Ad-Hoc On Demand Distance Vector Routing", Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), New Orleans, LA, 1999, pp. 90-100.
  14. F. Bertocchi, P. Bergamo, G. Mazzin, "Performance Comparison of Routing Protocols for Ad hoc Networks", IEEE GLOBECOM 2003.
  15. Jong mu Choi and Young bae Ko. A Performance Evaluation For Ad Hoc Routing Protocols In Realistic Military Scenarios. In Proceedings of The 9th CDMA International Conference, October 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Manet aodv Denial Of Service Attack strict Priority Algorithn secure Neighbor Authentication