Académique Documents
Professionnel Documents
Culture Documents
ISSN: 2455-3689
www.ijrtem.com Volume 1 Issue 3 ǁ May. 2016 ǁ PP 26-31
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is
no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make
it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very
less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are
only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the
hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been
treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason
fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be
looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the
routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus
ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2.
Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
I. INTRODUCTION
Today there are various devices that form together a flexiblenetwork that has no fixed structure and no centralizedmonitoring
node, such a network is called MANET.MANETis a self-configuring network of mobile routers and associatedhosts connected by
wireless links. The routers (mobile devices,nodes) are free to move randomly and organize themselvesarbitrarily; thus, the networks
wireless topology may changerapidly and unpredictably. The network appears on-demand,automatically and instantly, and data hops
from ad-hoc deviceto device till it reaches its destination, the network updatesand reconfigures itself to keep nodes connected. The
networktopology changes when a node joins in or moves out. Packetforwarding, routing, and other network operations are carriedout
the by the individual nodes themselves [1]. In MANETswith each node acting as a router and dynamically changingtopology the
availability is not always guaranteed. It is also notguaranteed that the path between two nodes would be free ofmalicious nodes. The
wireless links between nodes are highlysusceptible to link attacks (passive eavesdropping, active interfering,etc). Stringent resource
constrains in MANETs may also affect the quality of security when excessive computationsis required to perform some encryption.
These vulnerabilitiesand characteristic make a case to build a security solution,which provides security services like authentication,
confidentiality,integrity, non-repudiation and availability. In order toachieve this goal we need a mechanism that provides securityin
each layer of the protocol. [1].
Proactive protocols are also called table-driven routingprotocols. They attempt to maintain consistent, up-to-daterouting information
from each node to every other node in thenetwork. Some of the table driven ad-hoc routing protocolsare Destination-Sequenced
Distance-Vector (DSDV),WirelessRouting Protocol (WRP), and Clusterhead Gateway SwitchRouting (CGSR). In small networks,
proactive routing can beefficient, as normal communication does not involve any delayin the route setup.
Reactive protocols also called on-demand-driven routingprotocol. In contrary with table-driven routing protocols, theydo not update
the routing information periodically. It createsroutes only when desired by the source node. Some of theon-demand-driven routing
protocols are Ad-hoc On-Demand
Distance Vector Routing (AODV) [SAODV] Dynamic SourceRouting (DSR). A problem with on-demand routing is keepingup with
the nodes in the network. Because of the reactivenature, nodes do not have to announce their arrival or departurefrom the network.
This means that the intended recipientmight already have left the network when the sender wants toinitiate transmission. A route
request still has to be transmittedthroughout the whole network, consuming resources of all the
nodes.
C. Hybrid Routing Protocol
Hybrid protocols make use of both reactive and proactiveapproaches. They typically dynamically switch between proactiveand
reactive parts of the protocol. For instance, tabledrivenprotocols can be used between networks and on-demandprotocols inside the
network or vice versa. Example is the
Zone Routing Protocol (ZRP).
V. PROPOSED WORK
The security level of a mobile node in MANETs is determinedby the length of the secret key (l), the frequency of thekey change (f),
and the number of its neighbour nodes (n) at aparticular time. Its value can be determined by using a fuzzysystem described in
Algorithm 1, as shown in Fig 3. A NovelSecure Routing Protocol for MANETs
The security level of each mobile node is determined bya fuzzy reasoning system. The fuzzy system is implementedusing the
analysis and knowledge we obtained in Section4.1. The membership functions of each factor are selectedas follows. Fuzzy
membership function for three factors aredefined as: 1. key length: short and long.Membership functions for Key Length 2. frequency:
slowand fast; The membership functions looks quite the same asthe one above. We would not present them here.
VI. METHODOLOGY
A. Mobile node’s security levelThe security level of a mobile node in MANETs isdetermined by the length of the secret key
(l), the frequencyof the key change (f), and the number of its neighbour nodes(n) at a particular time. Its value can be determined by
usinga fuzzy system described in
Algorithm 1
B. Route discovery
The route discovery consists of two processes:
(1) routerequest from the source node to the destination node, and
(2)route reply from the destination to the source node.
Theoperation of route discovery is described in
Algorithm 2.
end for
until Destination node is reached {The Destination node
sends RREP back}
for all RREQ received do
if Broadcast ID && Security Level in RREQ then
create a RREP
unicast RREP back to S
else
drop the RREQ
end if
the destination determines which route is the best
SLk = max(Si)
end for
C. Route maintenance
A node uses HELLO message to maintain the localconnectivity. The route maintenance is described inAlgorithm 3.
VIII. CONCLUSION
Security in MANET is a major issue. In our work we haveproposed a technique to protect the network from black holeattack
by iumplementing fuzzy logic in Secured AODVrouting protocol. This has enhanced the security of thenetwork but efficiency had
been compromised in view ofsecurity. Hence making this more efficient can be taken asfuture work.
REFERENCES
[1] L. Ertaul and D. Ibrahim, “Evaluation of secure routing protocols in mobilead hoc networks (manets).,” in Security and
Management, pp. 363–369, 2009.
[2] W. Saetang and S. Charoenpanyasak, “Caodv free blackhole attack in adhoc networks,” in International Conference on
Computer Networks andCommunication Systems (CNCS 2012) IPCSIT, vol. 35, pp. 63–67, 2012.
[3] H. Changela and A. Lathigara, “Algorithm to detect and overcomethe black hole attack in manets,” International Journal of
ComputerApplications, vol. 124, no. 8, 2015.
[4] M. Roopak and D. B. Reddy, “Performance analysis of aodv protocol underblack hole attack,” International Journal of
Scientific & EngineeringResearch, vol. 2, no. 8, p. 1, 2011.
[5] M. Ghonge and S. Nimbhorkar, “Simulation of aodv under blackhole attackin manet,” International Journal of Advanced
Research in ComputerScience and Software Engineering, vol. 2, no. 2, 2012.
[6] R. Kaur and J. Kalra, “A review paper on detection and prevention ofblack hole in manet,” International Journal of Advanced
Research inComputer Science and Software Engineering, vol. 4, no. 6, pp. 37–40,2014.
[7] S. Sonia and P. Padmavati, “Performance analysis of black hole attackon vanet’s reactive routing protocols,” International
Journal of ComputerApplications, vol. 73, no. 9, pp. 22–26, 2013.