The main aim of this work is to guarantee a security solution which provides defence against attacks. To achieve that, a secure routing protocol (SMAODV) is presented which makes use of the multiple paths between source-destination pairs for removing the malicious routes from the network thereby reducing the effect of the attack to a great extent.
MANET is a class of ad hoc networks which spans a huge spectrum of other networking paradigms such as WMN, WSN, and VANET etc. There is a dire need for strengthening the base of all these networks from the security point of view. The vulnerability of MANET’s towards the attacks is huge as compared to their wired counterparts. MANET’s are vulnerable to attacks because of the unique characteristics which they exhibit like the absence of central authority, usage of wireless links, dynamism in topology, shared medium, constrained resources etc. The ramification being that the security needs of MANET’s become absolutely different than the ones which exist in the customary networks. One of the basal vulnerabilities of MANET’s come from their peer to peer architecture which is completely open wherein the mobile nodes act as routers, the medium of communication is open me reachable to both the legitimate users of the network as well as the malicious nodes.
Consequently, there is a bankruptcy of clear line of defence from the perspective of security design. This in turn implies that any node which may even be authentic can enter the network and affect its performance by dropping the packets instead of forwarding them. When these types of attacks occur in ad hoc networks then even the standard routing protocols like AODV, DSDV, DSR, LAR, and LAMR etc. do not provide the required security. The proposed solutions in literature such as SAODV, ARAN, and SEAODV all provide authentication and encryption based solutions to these attack. But, the attack on availability which is the most common and easiest of them all cannot be avoided by authentication and encryption because even the authentic user can be the attacker. Also, encryption cannot be helpful to prevent such attacks. Therefore in such a situation if a proper solution is not provided the entire MANET operation will get crippled.
Table of Contents
Chapter – I: Introduction
1.1 Introduction
1.2 Characteristics of MANETs
1.3 Architecture of MANETs
1.4 MANET Standards
1.5 MANET Challenges:
1.6 Security Challenges:
1.7 Criteria for Security in MANET:
Chapter – II: State of Art and Literature
2.1 Introduction
2.2 Proactive Routing Protocols:
2.3 Reactive protocols:
2.4 Position Based Routing Protocols:
2.5 Routing Protocol Comparison
Chapter – III: Proposed Secure Multipath Routing Protocol
3.1 Introduction to Proposed Routing Protocol
3.2 Secure Multipath Ad Hoc On-Demand Distance Vector Routing Protocol (SMAODV):
Chapter – IV: Experimental Evaluation:
4.1 Introduction
4.2 Simulation Results
Chapter – V: Conclusion and Future
5.1 Summary
5.2 Future Work
Research Objectives & Topics
This work aims to address critical security vulnerabilities in Mobile Ad Hoc Networks (MANETs), specifically focusing on malicious nodes that drop packets despite appearing legitimate. The research objective is to develop and evaluate a secure routing protocol (SMAODV) that utilizes multiple paths and rebroadcasting mechanisms to mitigate the impact of such attacks on network availability and performance.
- Security challenges in MANET architectures
- Limitations of existing routing protocols like AODV, DSDV, and DSR
- Implementation of Secure Multipath Ad Hoc On-Demand Distance Vector (SMAODV)
- Experimental analysis using Network Simulator (NS-2)
- Comparative performance evaluation against standard protocols
Auszug aus dem Buch
3.2 Secure Multipath Ad Hoc On-Demand Distance Vector Routing Protocol (SMAODV):
SMAODV is the modification of Ad Hoc On-demand Multipath Distance Vector (AOMDV) routing protocol which makes use of alternate paths to eliminate the effect of malicious nodes in network. When a node wishes to send data to another node in a network, it first initiates RREQ packet flooding process to discover the shortest path to destination. A route is discovered when the source node receives RREP packet sent by the destination node in response to RREQ packet. The SMAODV allows each node to accept multiple RREP packets which are sent by destination in response to multiple RREQ packets, due to which multiple paths are constructed between each pair of nodes in a network. These multiple paths are then being used to reduce the effect of malicious nodes in the network. Also, the data packets transmitted from a particular source to destination are labelled with counter, which gets incremented each time a data packet gets generated by source node. So each packet has a unique counter value for a particular source-destination pair. This unique number (counter value) is then used to check whether the packets arrive in order or out-of-order at destination.
Summary of Chapters
Chapter – I: Introduction: Provides an overview of MANETs, their unique characteristics, architectural models, standardization, and the fundamental security and operational challenges they face.
Chapter – II: State of Art and Literature: Reviews existing routing protocols, classifying them into proactive, reactive, and position-based categories, while highlighting their limitations regarding security in hostile environments.
Chapter – III: Proposed Secure Multipath Routing Protocol: Introduces the SMAODV protocol, which modifies existing multipath techniques to incorporate path randomization and packet loss detection to isolate malicious behavior.
Chapter – IV: Experimental Evaluation: Details the simulation setup using NS-2 and presents comparative results regarding packet delivery ratio, throughput, and end-to-end delay against established protocols.
Chapter – V: Conclusion and Future: Summarizes the effectiveness of the SMAODV protocol in improving network security and suggests potential avenues for future research including application to VANETs.
Keywords
MANET, Secure Routing, AODV, SMAODV, Multipath Routing, Network Security, Packet Delivery Ratio, Throughput, Malicious Nodes, Wireless Networks, Simulation, NS-2, Rebroadcasting, Routing Protocols, Data Integrity.
Frequently Asked Questions
What is the primary focus of this dissertation?
The work focuses on enhancing the security of MANETs by introducing a secure routing protocol that mitigates the impact of malicious nodes that drop data packets.
What are the core thematic areas covered?
The core themes include MANET architecture, routing protocol classification, security vulnerabilities in ad hoc environments, and performance optimization through multipath routing.
What is the main objective of the proposed SMAODV protocol?
The primary objective of SMAODV is to guarantee a security solution that defends against attacks on availability by utilizing multiple paths between source-destination pairs to bypass malicious routes.
Which scientific methodology is employed for evaluation?
The researcher uses a simulation-based methodology, specifically employing the NS-2 (Network Simulator) platform to construct MANET scenarios and compare performance metrics.
What does the main body of the work cover?
The main body covers the theoretical background of MANETs, a review of existing state-of-the-art routing protocols, the technical design of the proposed SMAODV algorithm, and an experimental performance evaluation.
Which keywords best characterize this research?
Key terms include MANET, Secure Routing, SMAODV, Multipath, Packet Delivery Ratio, and Network Security.
How does SMAODV distinguish between legitimate and malicious nodes?
SMAODV does not explicitly detect the malicious node itself, but rather monitors packet loss. If a route causes significant packet loss, the protocol identifies it as unreliable and eliminates it, thereby removing the influence of the malicious node.
What is the role of the "rebroadcasting timer" in the proposed protocol?
The rebroadcasting timer is used to trigger periodic re-flooding of RREQ packets, allowing the network to continuously update and discover fresh alternate paths to adapt to the high dynamism and mobility of MANET nodes.
How is the "counter value" utilized at the destination node?
The destination node uses the counter value of received packets to detect inconsistencies. If a gap exceeds a certain threshold, it indicates packet loss, prompting the destination to request retransmission via a different route.
- Citar trabajo
- Mir Shahnawaz Ahmad (Autor), 2016, Defence System for MANETs. Mobile Adhoc Networks, Múnich, GRIN Verlag, https://www.grin.com/document/460817