Design Secure AODV Routing Protocol for MANETs using Group Signature and Onion Routing Cryptographic Algorithms

Loading...
Thumbnail Image

Journal Title

Journal ISSN

Volume Title

Publisher

ASTU

Abstract

A mobile Ad hoc network is infrastructure-less network where the nodes are mobile and can move at high speeds. This mobility allows nodes to easily join or leave the network. MANETs have a dynamic topology, making them susceptible to various types of security threats. The inherent randomness of these networks poses a significant challenge for en suring their security. Attacks on MANETs can be categorized into two main types: active attacks, which involve modifying and disrupting network operations, and passive attacks, which do not disrupt network operations but focus on unauthorized data access or monitor ing. Traffic analysis stands as a particularly covert and unresolved form of passive security threat in the context of MANETs. This type of attack involves eavesdropping on network traffic to deduce valuable information about the applications in use and the entities involved in the communication. Such gleaned information may encompass details like node identities, geographical locations, and the relationships between the communicating nodes. To pro tect an AODV route discovery, from traffic analysis different security mechanisms existed for secured communication for MANET, however, most of the study intensive on prevents Vul nerability of routing packet but not routing traffic. In this study to satisfy the requirements and to defend against the attacks a new routing protocol SAODV has been proposed to give confidentiality protecting traffic analysis and RREQ modification. This protocol uses a key encrypted onion to record a discovered route and design an encrypted secret message and a Group signature is used to authenticate the RREQ packet one hop, to prevent the inter mediate node from altering the directing packet. Extensive simulations are done to provide maximum throughput and minimized packet loss ratio. We use NS2 for our simulation ex periments we use NS2 for our simulation experiments traffic network area is 1501m × 600m using 30 nodes. Finally, the route request packets are authenticated by group signatures, which can defend the potential active anonymous attacks without unveiling the node identi ties. The key-encrypted onion routing with a route secret verification message is designed to not only record the anonymous routes but also prevent the intermediate nodes from inferring the real destination.

Description

Citation

Collections

Endorsement

Review

Supplemented By

Referenced By