27-09-2012, 01:22 PM
An Efficient and Improving the Security of AODV Routing Protocol
An Efficient and Improving.pdf (Size: 548.22 KB / Downloads: 33)
Abstract
This Paper Presented in new techniques of security measures is essential for high survivability of Network. An improving the security problem in AODV protocol is a comparatively mature on demand routing protocol in mobile Ad-Hoc networks. In the AODV routing protocol wireless links disconnect occasionally because the nodes on the routing path are unreachable, which makes AODV inefficient and unreliable. The security of enhancement to the AODV protocol by incorporating protection against several routing attacks. Although many Ad-Hoc network routing protocol have (DSR, AODV etc), none of them consider the security problems. However in this paper, we put forward a security mechanism based on the AODV routing protocol. So we also provide a solution to this problem using a routing algorithm.
Introduction
An Ad-Hoc network is consisting of several mobile wireless nodes that can communication with each other without requiring the existing of fixed networking infrastructure. Firstly we described there is no fixed infrastructure in an Ad-Hoc network like a wired network or cellular network. There are no base stations or switching centers or routers to route packets to the destination. Secondly in the Ad-Hoc network, the network topology is not fixed due to the mobility of nodes. There have been many Ad-Hoc routing protocols, which fall in several categories: proactive routing protocols such as dynamic Destination-Sequenced Distance-Vector routing (DSDV) [1]. Optimized Link State Routing (OLSR), on-demand routing protocols such as Dynamic Source Routing (DSR) [2], AODV [3-4], Signal Stability-based Adaptive routing (SSA), and mixed routing protocols such as the Zone Routing Protocol (ZRP) [5].
There are many new threats are emerging on Ad-Hoc networks and they are difficult to defend with the conventional security schemes. Thus the new security schemes can be provided at various layers in the OSI stack, protecting the network layer in Ad-Hoc network is an important topic.
Motivation
The features of Ad-Hoc networks make them vulnerable to various security forms of attacks. Such as passive eavesdropping, active interfering, leakage of secret information, data tampering, impersonation and denial of service. Detecting the compromised node in a large scale Ad-Hoc network is severely challenged due to [9]:
The nodes are constantly mobile.•
We provided the AODV security to challenges to more secure • communication.
The protocols implemented are co-related in nature.•
There is lack of fixed infrastructure and a mobile network • point. Where intrusion detection system can collect audit data.
There is no clear distinction between normally and anomaly • in wireless networks.
Such failure is severe especially because they may come from seemingly trusted nodes, whose malicious intentions have not yet been noted [10-13]. Hence the attack to protocol can be further classified into two types.
Enhancement of Security Routing Mechanism
The enhancing this problem to secure several methods to the AODV routing protocol to provide the security information. But AODV due to Yang et al. [14] is the only protocol designed based in own approach. Each node AODV node maintains the neighbor path. All the routing updates received from a neighbor without any token will be dropped. The request mechanism is the same as that of AODV, except that the request will be accepted only from verified neighbors. So the reply algorithm is slightly differ from AODV. In the packet in routing monitoring behavior then allow the route may contain <neighbor-addr, source-addr, dest-addr, dest-seq, maintain-time>. However the security of searching a more time then this easily security attack and maintaining a path.
Mainly Attacks
This method of routing attacks challenging the security of Ad-Hoc networks can be sorted into two types: external attacks and internal attacks [15-16]. External attacks come from the nodes that do not have the authentication of the network. These attacks can be prevented by encryption and authentication mechanism. Internal attacks mean that the malicious nodes are authorized for legal private key. These nodes can fabricate routing packet to make unusable routing lead to transfer. So, the internal attacks are prevent for efficient is very important and difficult issue.
Conclusion and Future Direction
In this paper, we have presented an enhancement to the AODV protocol using our security routing mechanism and we have proposed a security scheme to pro-active prevent internal attacks. In Our mechanism is able to detect and eliminate DoS attack using modified hop count. The secure versions of each of the proposed have different type’s attacks in improvement of routing protocol. The identified attacks and solution proposed are for on-demand routing protocols specifically AODV. Presently we are working on defining more internal attacks and plan to identify solutions for them.