Please use this identifier to cite or link to this item: http://hdl.handle.net/10266/5034
Title: Design and Development of An Efficient Secure AODV Routing Protocol
Authors: Singla, Bhawna
Supervisor: Verma, Anil
Raheja, L.R.
Keywords: Manets;AODV;Secure Routing Protocols;PTH-AODV;DTH-AODV
Issue Date: 22-Jun-2018
Abstract: Mobile Adhoc network (MANETs) applications are increasing every day due to inherent characteristics like infrastructure less nature, dynamic topology and multi-hop network. The path from source node to destination node is determined with the help of set of rules known as routing protocol. In MANETs, the routing protocols are divided into two major categories like proactive and reactive. This work discusses the Adhoc On-demand Distance Vector Routing Protocol (AODV), a kind of reactive routing protocol, for its study and modification. But MANETs is also vulnerable to number of attacks due to its nature. A lot of work has been done to make it more secure. In this work, the impacts of some of the popular attacks on a short term military rescue mission like MANETs scenario is studied. In particular, three attacks being studied on AODV routing protocol are a) Jellyfish attack b) Black hole attack c) Selfish node attack. To have the better analysis, the network size is varied firstly and then the number of malicious node is varied. Detection of malicious nodes is a challenging task. Further, isolating such malicious nodes from communication is also a great challenge. The trust based on the packet forwarding behaviour of neighbor can be used for detecting misbehaviour as discussed in previous works in literature. This model has been already presented in several works. But, by the same trust based logic, some of the neighbors those who were silent and not actively participated in communications will get wrongly identified as malicious. So, simple trust based models will mark a lot of non-malicious nodes as malicious nodes. This will initiate a lot of link failures. That is, the link between sources to destination will get broken at different locations on their path because of this false identification of malicious nodes. In this work, periodic trust handshake based detection (PTH-AODV) of black hole attack is proposed. PTH-AODV using NS2 is implemented and its performance is compared with the results of AODV and AODV under attack. In this work, further dynamic trust handshake based detection (DTH-AODV) of black hole attack is proposed. DTH-AODV using NS2 is implemented and its performance is compared with the results of previous PTH-AODV, AODV and AODV under jellyfish attack, black hole attack and selfish node attack. The main advantage of the proposed PTH-AODV and DTH-AODV is: they will detect and prevent the malicious nodes in the very early stage of route discovery process. So, they will not need any manipulation in routing tables in the route resolving process, because, by the design, it will avoid including malicious hops in routing table of normal nodes at the route discovery process itself. According to the arrived results, proposed trust handshake based malicious node detection and prevention mechanism worked good and successfully detected black hole nodes in the network and avoided establishing routes though them. The proposed DTH-AODV improved the throughput whereas the PDF is almost equal to that of AODV and the overall performance of DTH-AODV was observed to be better than previously proposed PTH-AODV. Keywords: MANETs, AODV, Secure Routing Protocols, PTH-AODV, DTH-AODV
Description: Doctor of Philosophy- CSE -Thesis
URI: http://hdl.handle.net/10266/5034
Appears in Collections:Doctoral Theses@CSED

Files in This Item:
File Description SizeFormat 
final_phd_thesis_submitted_950903037_(1) (2).PDF2.51 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.