SCMR : Secure Cognizant Multipath Routing for MANET

Authors

  • Madgula Vijaya Bhaskar  Research Scholar, Computer Science & Engineering, Rayalaseema University, Kurnool, Andhra Pradesh, India
  • Prof. G. A. Ramachandra  Computer Science, Sri Krishnadevaraya University, Anantapur, Andhra Pradesh, India
  • Y. Deepika  Computer Engineering, Government Polytechnic, Dharmavaram, Andhar Pradesh, India

Keywords:

MANET, multipath routing, AOMDV, MAC layer, DOS attack.

Abstract

A MANETs is a multihop system that comprises of multiple mobiles over wireless nodes. We propose cognizant multipath routing for security by establishing multiple paths under routing metrics over source destination in MANET (Mobile Ad hoc Network). Two paths are considered in this paper for transmission between source and destination. Use of AOMDV protocol helps to determine the optimal route for transmission of data for the reducing energy consumption. So, to overcome these issues security analysis algorithm is provided which provides key authentication for threats. Also, security algorithm is used to provide a safe path between source and destination during transmission of data packets. The aim of this paper is to develop a security over multipath routing protocol for MANET. Also, to improve the performance parameter such as throughput and packet delivery ratio by detecting anonymous activity in a network and hence avoid the attackers in routing. A black hole attack type of DoS (Denial of Service) is considered in this paper, constitutes a severe threat against multipath routing. Also, it makes the destination node as unreachable or downgrades its communication over an entire network. Finally, the performance parameters of throughput, packet delivery ratio, an end to end delay, and energy consumption are calculated for SCMR and compared with the existing protocol. On the other hand, the node failure is analyzed by the collection of information about the node respectively.

References

  1. A. Bhattacharya and K. Sinha, "An Efficient Protocol for Load-Balanced Multipath Routing in Mobile Ad Hoc Networks," Ad Hoc Networks, 2017.
  2. I. Aggarwal and E. P. Garg, "AOMDV Protocols in MANETS: A Review," International Journal of Advanced Research in Computer Science & Technology (IJARCST 2016), vol. 32, 2013.
  3. E. S. A. Ganie and M. N. Sharma, "Interference-Aware and Fault Tolerant Multipath Routing Protocols for Mobile Ad Hoc Networks," International Journal of Engineering Science, vol. 2524, 2016.
  4. P. Purniemaa, K. Manikandan, and M. S. Durai, "A Review on Security Issues in Multipath Routing Protocol in MANET," International Journal of Advanced Research in Computer Science, vol. 2, 2011.
  5. A. Taha, R. Alsaqour, M. Uddin, M. Abdelhaq, and T. Saba, "Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function," IEEE Access, vol. 5, pp. 10369-10381, 2017.
  6. P. Sanaei, M. Ghanaat, I. Ghani, A. Hakemi, and S. R. Jeong, "ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW," Science International, vol. 25, 2013.
  7. M. G. Sanaei, B. E. Abarghouei, H. Zamani, and M. Dabiranzohouri, "AN OVERVIEW ON WORMHOLE ATTACK DETECTION IN AD-HOC NETWORKS," Journal of Theoretical & Applied Information Technology, vol. 52, 2013.
  8. P. Mishra, "SECURITY ISSUES AND ATTACKS IN MOBILE AD HOC NETWORKS," 2017.
  9. U. K. Singh, D. N. Goswami, K. C. Phuleria, and S. Sharma, "An analysis of Security Attacks found in Mobile Ad-hoc Network," International Journal of Advanced Research in Computer Science, vol. 5, 2014.
  10. T. Bhatia and A. Verma, "Security issues in MANET: a survey on attacks and defense mechanisms," International Journal, vol. 3, 2013.
  11. T. Pandikumar, B. Zewdie, and C. Z. Haile, "Mitigating Black Hole Attack on MANET with AOMDV Protocol," International Journal of Engineering Science, vol. 12666, 2017.
  12. G. Sharma, A. Mittal, and R. Aggarwal, "Attacks on Ad hoc On-Demand Distance Vector Routingin MANET," 2016.
  13. S. Bhalodiya and K. Vaghela, "Study of Detection and Prevention Techniques for Flooding attack on AODV in MANET," International Journal of Science and Research (IJSR), vol. 4, pp. 433-436, 2015.
  14. K. Patel and A. Thoke, "A Details Survey on Black-hole and Denial of Service Attack over MANET Environment," 2016.
  15. A.-R. Salem and R. Hamamreh, "Efficient Mechanism For Mitigating Multiple Black Hole Attacks In Manets," Journal of Theoretical and Applied Information Technology, vol. 83, p. 156, 2016.
  16. S. B. S. Jamali, "A survey over black hole attack detection in mobile ad hoc network," International Journal of Computer Science and Network Security (IJCSNS), vol. 15, p. 44, 2015.
  17. A. Jain and B. Buksh, "Solutions for Secure Routing in Mobile Ad Hoc Network (MANET): A Survey," Imperial Journal of Interdisciplinary Research, vol. 2, 2016.
  18. R. Shah, S. Subramaniam, L. Dasarathan, and D. Babu, "Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks," CIT. Journal of Computing and Information Technology, vol. 24, pp. 237-252, 2016.
  19. S. Brar and M. Angurala, "Review on Grey-Hole Attack Detection and Prevention," 2016.
  20. S. Sarkar and R. Datta, "A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks," Ad Hoc Networks, vol. 37, pp. 209-227, 2016.
  21. Sunitha, P. V. Srinivas, and T. Venugopal, "An Energy Efficient Routing Based on Route Segmentation in Mobile Ad Hoc Network," Global Journal of Computer Science and Technology, 2017.
  22. N. Chaubey, A. Aggarwal, S. Gandhi, and K. A. Jani, "Performance analysis of TSDRP and AODV routing protocol under black hole attacks in manets by varying network size," in Advanced Computing & Communication Technologies (ACCT), 2015 Fifth International Conference on, 2015, pp. 320-324.
  23. C. Joseph, P. Kishoreraja, R. Baskar, and M. Reji, "Performance Evaluation of MANETS under Black Hole Attack for Different Network Scenarios," Indian Journal of Science and Technology, vol. 8, 2015.
  24. J. G. Ponsam and D. R. Srinivasan, "A survey on MANET security challenges, attacks and its countermeasures," International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), vol. 3, 2014.
  25. A. Dorri, S. R. Kamel, and E. Kheirkhah, "Security challenges in mobile ad hoc networks: A survey," arXiv preprint arXiv:1503.03233, 2015.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Madgula Vijaya Bhaskar, Prof. G. A. Ramachandra, Y. Deepika, " SCMR : Secure Cognizant Multipath Routing for MANET, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 7, pp.727-738, September-October-2017.