10-09-2013, 04:02 PM
Performance Comparison of the AODV, SAODV and FLSL Routing Protocols in Mobile Ad Hoc Networks
Performance Comparison.pdf (Size: 226.94 KB / Downloads: 28)
Abstract
Mobile ad-hoc networks operate in the absence of
any supporting infrastructure. The absence of any fixed
infrastructure in mobile ad-hoc networks makes it dif-
ficult to utilize the existing techniques for network ser-
vices, and poses number of various challenges in the
area. The discovery and maintenance of secure route is
the most flinty challenge.
In this paper, we first deliberate and implement one
secure routing protocol FLSL (Adaptive Fuzzy Logic
Based Security Level Routing Protocol) and study its
performance under different scenarios. Then we carry
out a number of experiments using NS-2 to compare the
performance of AODV, SAODV and FLSL in terms of
security level and routing discovery time under different
setups. From these experiments, we can see that FLSL
outperforms than AODV and SAODV.
Introduction
An ad hoc network is a group of wireless mobile
computers (or nodes), in which nodes cooperate by for-
warding packets for each other to allow them to commu-
nicate beyond direct wireless transmission range. Ad
hoc networks require no centralized administration or
fixed network infrastructure, and can be quickly and in-
expensively set up as needed, such as military exercises
and disaster relief. However, secure and reliable com-
munication is a necessary prerequisite for such applica-
tions.
SAODV Protocol
The Secure Ad hoc On-Demand Distance Vector
Routing Protocol (SAODV) [8] is an extension of the
AODV [9] routing protocol that can be used to protect
the route discovery mechanism providing security fea-
tures like integrity, authentication and non-repudiation.
SAODV assumes that each ad hoc node has a signa-
ture key pair from a suitable asymmetric cryptosystem.
Further, each ad hoc node is capable of securely veri-
fying the association between the address of a given ad
hoc node and the public key of that node. Achieving
this is the job of the key management scheme.
Two mechanisms are used to secure the AODV
messages: digital signatures to authenticate the non-
mutable fields of the messages, and hash chains to se-
cure the hop count information (the only mutable infor-
mation in the messages). This is because for the non-
mutable information, authentication can be performed
in a point-to-point manner, but the same kind of tech-
niques cannot be applied to the mutable information.
Route error messages are protected in a different
manner because they have a big amount of mutable in-
formation. In addition, it is not relevant which node
started the route error and which nodes are just forward-
ing it. The only relevant information is that a neighbor
node is informing to another node that it is not going
to be able to route messages to certain destinations any-
more.
Simulation and Experiment
In this section, we carry out some experiments us-
ing network simulation technology. Our objective is to
firstly demonstrate the feasibility of FLSL which can
effectively discover a routing and then update the corre-
sponding routing tables on the nodes on route. Another
objective is to evaluate performance in the security-
level and timing of route discovery.
Up to date, we are not aware of any implementation
of SAODV. To this end, we modified some modules in
AODV-UU for SAODV by utilizing Libgcrypt library
[11].
Conclusion
In this paper, we closely studied the current prob-
lems of routing protocols in MANET, including the re-
liability, feasibility, security and performance etc, and
developed solutions to those problems. We deliberated
and implemented a secure end-to-end protocol, Adap-
tive Fuzzy Logic Based Security Level Routing(FLSL),
which enables the nodes to discover and determine most
secure route in MANET. In comparing with AODV and
SAODV, the FLSL protocol is capable of determining a
more secure route among possible routes.