Skip to main content

Secure AODV Routing Protocol Based on Trust Mechanism

  • Chapter
Book cover Wireless Networks and Security

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

A mobile ad hoc network (MANET) is a wireless network with high of mobility, no fixed infrastructure and no central administration. These characteristics make MANET more vulnerable to attack. In ad hoc network, active attack i.e. DOS, and blackhole attack can easily occur. These attacks could decrease the performance of the routing protocol. In this chapter, we proposed new trust mechanism that has the ability to detect and prevent the potentials attacks into a wireless ad hoc network especially for Denial of Service (DOS) and blackhole attacks. We have proposed some modifications of AODV routing protocol with implemented a trust level calculation. Our proposed mechanism will detect the attack by calculate local and global trust parameters. When a node is suspected as an attacker, the security mechanism will isolate it from the network before communication established. To perform the trust calculation, each node should get all the activity information from his neighbor. In order to ensure the nodes can hear all the activities of his neighbors, each node will run in promiscuous mode. Simulation has been conducted using NS-2 to evaluate our proposed protocol under dos and blackhole attack. We compare the performance of our proposed protocol with existing secure routing protocol such as TCLS [14], LLSP [16], and RSRP [17]. The simulation result shows that our proposed protocols outperform other secure protocols under DOS and blackhole attack in term of packet delivery ratio, end to end delay and routing overhead. We demonstrate that the proposed protocol improves significantly the performance of secure routing protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balakrishna, R., Rajeswar Rao, U., Ramachandra, G.A., Bhagyashekar, M.S.: Trust-based Routing Security in MANETS. International Journal of Computer Science and Information Technolgy 4(3), 547–553 (2010)

    Google Scholar 

  2. Abusalah, L., Khokhar, A., Guizani, M.: A Survey of Secure Mobile Ad Hoc Routing Protocols. IEEE Communications Surveys & Tutorials 10(4), 78–93 (2008)

    Google Scholar 

  3. Cerri, D., Ghioni, A.: Securing AODV: The A-SAODV Secure Routing Prototype. IEEE Communications Magazine 46(2), 120–125 (2008)

    Article  Google Scholar 

  4. Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad hoc Wireless Networks. In: Mobile Computing, pp. 153–181. Kluwer Academic Publishers (1996)

    Google Scholar 

  5. Zapata, M.G.: Secure adhoc on-demand distance vector (S-AODV) Routing. In: Proceeding of ACM Workshop on Wireless Security (WISE), Atlanta (2002)

    Google Scholar 

  6. Yi, S., Naldurg, P., Kravets, R.: A Security-Aware Routing Protocol for Wireless AdHoc Networks. In: ACM Symposium on Mobile Ad Hoc Networking & Computing (ACM Mobihoc 2001), Short paper, Long Beach, CA, USA (October 2001)

    Google Scholar 

  7. Akhlaq, M., Noman Jafri, M., Khan, M.A., Aslam, B.: Addressing Security Concerns of Data Exchange in AODV. Transactions on Engineering, Computing and Technology 16, 29–33 (2006) ISSN 1305-5313

    Google Scholar 

  8. Zhe, L., Jun, L., Dan, L., Ye, L.: A Security Enhanced AODV Routing Protocol. In: Jia, X., Wu, J., He, Y. (eds.) MSN 2005. LNCS, vol. 3794, pp. 298–307. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Eichler, S., Roman, C.: Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC. In: 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 481–484 (October 2006)

    Google Scholar 

  10. Pirzada, A.A., Datta, A., McDonald, C.S.: Trustworthy Routing with the AODV Protocol. In: The International Networking and Communications Conference (INCC 2004), pp. 19–24. IEEE Communications Society, Lahore (2004)

    Chapter  Google Scholar 

  11. Menaka, A., Pushpa, M.E.: Trust Based Secure Routing in AODV Routing Protocol. In: IMSAA 2009 Proceedings of the 3rd IEEE International Conference on Internet Multimedia Services Architecture and Applications. IEEE Press, Piscataway (2009)

    Google Scholar 

  12. Griffiths, N., Jhumka, A., Dawson, A., Myers, R.: A Simple Trust Model for On-Demand Routing in Mobile Ad-Hoc Networks. In: Badica, C., Mangioni, G., Carchiolo, V., Burdescu, D.D. (eds.) IDC 2008. SCI, vol. 162, pp. 105–114. Springer, Heidelberg (2008)

    Google Scholar 

  13. Kurosawa, S., Nakayama, H., Kato, N., Nemoto, Y., Jamalipour, A.: Detecting blackhole attack on aodv-based mobile ad hoc networks by dynamic learning method. International. Journal of Network, Security 5(3), 338–346 (2007)

    Google Scholar 

  14. Rajaram, A., Palaniswami, S.: A trust based cross layer security protocol for ad hoc networks. International Journal of Computer Science And Information Security 6(1) (2009)

    Google Scholar 

  15. Mistry, N., Jinwala, D.C., Zaveri, M.: Improving AODV Protocol against Blackhole Attacks. In: Proceedings of the International Multi Conference of Engineer and Computer Science, vol. 2 (2010)

    Google Scholar 

  16. Islam, A.-M.M., Pose, R., Kopp, C.: A Link Layer Security Protocol for Suburban Ad-Hoc Networks. In: Proceedings of Australian Telecommunication Networks and Applications Conference (December 2004)

    Google Scholar 

  17. Afzal, B., Koh, J.-B., Raza, G.L., Kim, D.-K.: RSRP: A Robust Secure Routing Protocol for Mobile Ad Hoc Networks. In: Proceedings of IEEE Conference on Wireless Communications and Networking, pp. 2313–2318 (April 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harris Simaremare .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Simaremare, H., Abouaissa, A., Sari, R.F., Lorenz, P. (2013). Secure AODV Routing Protocol Based on Trust Mechanism. In: Khan, S., Khan Pathan, AS. (eds) Wireless Networks and Security. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36169-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36169-2_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36168-5

  • Online ISBN: 978-3-642-36169-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics