Open Access Open Access  Restricted Access Subscription or Fee Access

Performance of the Authentication Based AODV Routing Protocol in MANET

S. Varadhaganapathy, Dr.A.M. Natarajan

Abstract


An Ad hoc network is a collection of wireless computers (nodes) communicating among themselves over multi-hop paths. Also it is an infrastructure-less network which has dynamic topology, organized by itself and can be easily deployed with minimum configuration. These are the constraints which draw the attention and importance of ad hoc networks in defense applications. In recent years, security in ad hoc networks becomes an exiting and interesting research topic that has started to receive attention from a number of researchers. Several routing protocols for ad hoc networks have been proposed, but most of them failed to consider the security problem. In this paper, Triple Hash Technique (THT) has been implemented to protect the routing information. The security associations between source node and destination node and also between the nodes are established, when they are in the coverage area of each other, by exchanging appropriate information. This security mechanism is based on Ad hoc On-demand Distance Vector (AODV) routing protocol for ad hoc networks. The results show that in a mobile adhoc network, the Triple Hash Technique provides secure routing even in the presence of malicious nodes.

Keywords


Ad Hoc Network, AODV, Authentication, Triple Hash technique.

Full Text:

PDF

References


Yang Hao, Luo Haiyun, Y Fan, Zhang Lixia, Songwu Lu, ‘Security in Mobile Ad hoc Networks: Challenges and Solutions’, Proc. IEEE wireless communications, Feb. 2004

Marwaha Shivanajay, Tham Chen Kong, and Srinivasan Dipti ‘Mobile Agents based Routing Protocol for Mobile Ad hoc Networks’, in IEEE Global Telecommunications Conference(GLOBECOM,02), Taipei, Taiwan, 2002

Johnson D.B. and Maltz D.A., ‘Dynamic Source Routing in Ad hoc Wireless Networks’, Mobile Computing vol 353,1996

Zygmunt J.Hass and Panagiotis Papadimitratos, ‘Secure Routing for Mobile Ad hoc Networks’, Proc. Of SCS Communication Networks and Distributed Systems Modeling and simulation Conference (CNDS), San Antonio, 2002

Xinjun Du Ying Wang Jianhua Ge Yumin Wang ‘A Method for Security Enhancement in AODV Protocol’, Proc. Of 17th International Conference on Advanced Information Networking and Applications (AINA’3), 2003

Lee S.J., Gerla M. and Chiang C.C. (1999) ‘On Demand Multicast Routing Protocol’, Proceedings of IEEE WCNC’99, pp. 1298-1302, 1999

Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel and Thomas F. La Porta ‘Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks’, Pennsylvania State University, University Park, PA 16802

Manel Guerrero Zapata (2003) ‘Secure Ad hoc on demand Distance vector Routing’ In the proceeding of Mobile Computing and Communications Review, Vol 6, No 3, pp 106-107.

Russ Housley and William Arbaugh (2003), ‘Security problems in 802.11 based networks’, In the proceedings of Communication of the ACM, Vol. 46 pp 31-34.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.