Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks
Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks
ABSTRACT: Mobile ad hoc network (MANET) is a special type of mobile wireless network where a collection of mobile devices
form a temporary network without any aid of an established infrastructure. During data transmission between these devices there
may be malicious threats, attacks, and penetrations which alters the performance of the system and insecure transmission.
Multiple routing protocols especially for these conditions have been developed during the last years, to find optimized routes that
free from attacks from a source to some destination. This paper presents comparison based on simulation of three secure routing
protocol of MANET.
I. INTRODUCTION
A mobile ad hoc network (MANET) is a distributed paper we investigate the performance and efficiency of
dynamic system of moving wireless devices (nodes). three representative protocols for Mobile Ad hoc
Mobile ad hoc networks are autonomous systems Networks, we have chosen the secure protocols that fall
comprised of a number of mobile nodes that communicate under the most significant categories. Our simulation
using wireless transmission. They are self-organized, self- scenarios have been designed as to capture how different
configured and self controlled infrastructure-less networks. categories of MANET protocols cope with typical
This kind of network has the advantage of being able to be dynamic conditions and according to different scalability
set up and deployed quickly because it has a simple factors. We take into account variation of pause time
infrastructure set-up and no central administration . the (mobility), different packets rates and the malicious
major examples of these networks are in the military or environment , considering their effects on routing
the emergency services. efficiency (packet delivery ratio and normalized routing
In Mobile ad hoc networks the nodes are free to move, load), and network latency (end-to-end delay).
independent of each other, topology of such networks
keep on changing dynamically which makes routing much II. ROUTING IN MOBIE AD HOC NETWORKS
difficult. Therefore routing is one of the most concerns
areas in these networks. Normal routing protocol which One of the most exciting and challenging aspects of ad
works well in fixed networks does not show same hoc network is the routing issue. Most of the routing
performance in Mobile Ad Hoc Networks. In these protocols are designed for wired and structured network. It
networks routing protocols should be more dynamic so is often very hard to adopt these protocols for ad hoc
that they quickly respond to topological changes [1]. A network. Broadly routing protocols can be classified into
robust and flexible routing approach is required to three groups: reactive, proactive and hybrid. This is
efficiently use the limited resources available, while at the summarized in the following figure:
same time being adaptable to the changing network
conditions, such as network size (scalability), traffic
density and mobility.
Many security schemes from different aspects of
MANET have been proposed in order to protect the
routing information or data packets during
communications, such as secure routing protocols , In this
with the network intruders can easily join the network and 3) Message modification : The attacker alters a legitimate
carry out attacks. message by deleting, adding to, changing, or reordering it.
Limited availability of resources: Resources such as
4) Denial-of-service: The attacker prevents or prohibits
bandwidth, battery power and computational power are
the normal use or management of communications
scare in ad hoc networks. Hence, it is difficult to
facilities.
implement complex cryptography-based security
mechanisms in such networks.
VI. SECURE ROUTING PROTOCOLS FOR AD
V. ATTACKS IN AD HOC NETWORKS HOC NETWORKS
6
Fig. 1 Packet Delivery Fraction (%) vs Pause Time
5
4
Delay(s)
95 1
0
PDF(%)
90
0 100 200 300 400 500 600
85 Pause Time(sec)
80
SAODV SEAD SZRP
75
Packet rate = 2 Packet rate = 4 Packet rate = 6
Packet Rate
Fig. 4 End to End Delay vs Pause time
4
Packets Delivery Fraction With Attacks
Delay(s)
80 2
70 1
60
50 0
pdf(%)
5 350
4 300
3
2 250
1 200
NRL
0
150
2 4 6 8 10 12
100
No. of m alicious node s
50
40
20
security goals like message integrity, data
0
confidentiality and authentication, by taking an
Packet rate =2 Packet rate =4 Packet rate =6 integrated approach of digital signature and both the
Packet Rate
symmetric and asymmetric key encryption technique.
SAODV SEAD SZRP
REFERENCES