Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Evaluation of Standard and Security Extended Protocols in MANET

S. SriramSunther, Dr. R. Balasubramanian, S. Ramalakshmi

Abstract


An ad hoc network is a group of wireless mobile nodes, in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. There are many protocols are there routing compare to standard protocols security enabled protocols are few. There are lot of security types one of the types is secure the route which packets flow through. Secure routing protocols extended from standard protocols. This paper compares four protocols, two standard and two secure protocols that are extended from the standard protocols. The two standard protocols are AODV, DSR and two security extended protocols are Ariadne and FACES by using NS2 simulator. AODV and DSR are basic protocols and they are already implemented and compared in many situation. FACES algorithm works by sending challenges and sharing friend Lists to provide a list of trusted nodes to the source node through which data transmission finally takes place. Ariadne is a secure on-demand ad hoc network routing protocol. Ariadne prevents attackers or compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes. Two scenarios are consider in MANET and at last conclusion will be presented, that the efficiency of the secure protocols over standard protocols.

Keywords


Secure Routing, AODV, DSR, MANET, FACES, Ariadne, NS2.

Full Text:

PDF

References


S.SriramSunther, Dr.R.Balasubramanian, S.Ramalakshmi, “Performance Evaluation of Route Securing Protocols in MANET”, International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.

Abbas El Gamal, James Mammen, BalajiPrabhakar and Devavrat Shah, “Throughput- Delay Trade-off in Wireless Networks”, Department of EE and CS, Stanford University, IEEE 2004.

Adam.N, M.Y. Ismail, J. Abdullah, “Effect of Node Density on Performances of Three MANET Routing Protocols”, International Conference on Electronic Devices, Systems and Applications, 2010.

Adjih, et al., “Optimized Link State Routing Protocol,” IETF Internet Draft, draft-ietf-manet-olsr-08.txt, March 3, 2003.

Ahvar.E, and M. Fathy, “Performance Evaluation of Routing Protocols For High Density Ad-Hoc Networks based on Qos by Glomosim Simulator”, ISSN 1307-6884, 23 AUGUST 2007.

Charles E. Perkins, Elizabeth M. Belding-Royer, S. Das, “Ad-Hoc on Demand Distance Vector (AODV) routing, Mobile Ad Hoc Networking Working Group” July 2003.

Clausen.T, Ed. P. Jacquet, Ed.ProjectHipercom, “Optimized Link State Routing Protocol”, INRIA October 2003.

David Johnson and Albert Lysko, “Comparison of MANET routing protocols using a scaled indoor wireless grid”, 2008.

David B. Johnson, David A. Maltz, Yih-Chun Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, Internet- Draft, draft-ietf- manet-dsr-10.txt, July 2004.

IdrisSkloul Ibrahim, peter J.B king, Robert Pooley “Performance Evaluation of Routing Protocols for Manet”, IEEE Computer Society, 2009.

Jun Liu,Jiejun Kong, Xiaoyan Hong, Mario Gerl “Performance Evaluation of Anonymous Routing Protocols in MANETs”, IEEE Communication Society WCNC publication,2006

Kunze, C., U. Grossmann, W. Storka and K. Muller-Glaser, “Application of ubiquitous computing in personal health monitoring systems”, in: DGBMT: Jahrestagung der DeutschenGesellschaft F r BiomedizinischeTechnik, 2002

LajosHanzo II, Rahim Tafazolli,” QoS-Aware Routing and Admission Control in Shadow- adding Environments for Multirate MANETs”, IEEE Transactions on mobile computing, vol. 10, no. 5, May 2011

Manel Guerrero Zapata,” Secure Ad hoc On-Demand Distance Vector Routing”,Mobile Computing and Communications Review, Volume 6, Number 3.

Noman Mohammed, HadiOtrok, Lingyu Wang, MouradDebbabi and Prabir Bhattacharya,” Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET”, IEEE transactions on depedable and secure computing..

Qi Biao, He Jian-hua, Yang Zong-kai, “Simulation of wireless Ad hoc routing protocols and its evaluation”, Huazhong University of Science and Technology (Nature Science Edition) 32 (8), 66–69, 2004.

Sanjay K. Dhurandher, Mohammad S. Obaidat, Fellow, IEEE, Karan Verma, Pushkar Gupta, and PravinaDhurandher ,” FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems”, IEEE SYSTEMS JOURNAL, VOL. 5, NO. 2, JUNE 2011

SeemaMehlaet. al. / (IJCSE) International Journal on Computer Science and Engineering “Analyzing security of Authenticated Routing Protocol (ARAN)”, Vol. 02, No. 03, 2010, 664-668.

Sunil Taneja*and Ashwani Kush,” A Survey of Routing Protocols in Mobile Ad HocNetworks”, International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010,ISSN: 2010-0248.

YihChun Hu, Adrian Perrig, David B. Johnson, “Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks”, MobiCom‟02, September 23–26, 2002, Atlanta, Georgia, USA.

YasirAbdelgadir Mohamed Azween B. Abdullah, “Security Mechanism for MANETs”,

Zygmunt J. Haas, Cornell University Marc R. Pearlman, Cornell University, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks” IETF Internet Draft, November 1997.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.