Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm

  • Authors

    • M Deepa
    • P Krishna Priya
    2018-07-20
    https://doi.org/10.14419/ijet.v7i3.12.16441
  • Mobile Adhoc Network (MANET), AODV protocol, Network Simulator (NS 2), Bayesian Probability, Two Fish Algorithm.
  • In Mobile Adhoc Network (MANET) implementing a secure communication is a critical task due to its nature of wireless, infrastructureless, arbitrary network. Its not organized by any centralized control. Each node in this network   acts as a router. Routing plays a major role in the network data transmission. Various protocols exist for the purpose of routing process. On Demand routing is a category of routing protocol were routes are obtained only on demand. AODV is one of the efficient on demand routing protocol. In this work an enhanced protocol with security features, the Secure AODV- ESB (Secure Adhoc On Demand Distance Vector based on Energy level and Signal Strength Implementing Bayesian Probability) has been proposed for Mobile   Adhoc Network. Its is an extension of the previous work AODV – ESB protocol, which is a modification of the existing AODV protocol. The AODV protocol works on two phases.  The route discovery process and route maintenance phase. Major problem faced by AODV was the frequent route break caused by the dynamic mobile nature of the Mobile Adhoc network, which leads to frequent route discovery process. To avoid frequent route break AODV-ESB routing protocol was proposed, it adopts the energy level and Signal strength as parameters for the route selection for transmission of data. Bayesian probability implementation in the protocol increases the chance of adopting more reliable and optimized path. Another major issue in data transmission in the Adhoc network is the security. Securing data from access of the unauthorized person is a major responsibility of the protocol. This new secure AODV- ESB protocol protects against attackers by identifying the malicious node and eliminating them and also secures data by implementing cryptography using Two Fish Algorithm.  This ensures secure data transmission in MANET more efficiently than the original AODV protocol. Analysis using the NS 2 Simulator proves that Secure AODV- ESB performs better than the previous work AODV- ESB.

     

     

  • References

    1. [1] Lu Han, “Wireless Ad-hoc Networksâ€, Oct 8, 2004

      [2] C. E. Perkins and E. M. Royer, â€Ad-hoc On-Demand Distance Vector Routingâ€, Proceedings of the 2nd IEEE, 2003

      [3] K.Sivakumar, “Mobile Adhoc network routing principles and protocol evaluation metrics†, International journal of computer science and technology [IJCST], vol.2, no.4, pp-261-266,Oct-Dec.2011

      [4] Bruce Schneier, John Kelsey, Dough Whiting, David Wagner, Chris Hall and Neil Ferguson, “Two fish: A 128 Bit Block Cipherâ€, Jun-1998.

      [5] Morli Pandya, Ashish Kr. Shrivastava, “Review on security issues of AODV routing protocol for MANET“, IOSR journal of computer engineering, [IOSR-JCE], ISSN- 2278-8727, vol.14, no.5, pp-127-134, Sep-Oct.2013.

      [6] Pabitra Mohan Khilar, â€Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanismâ€, International journal of Network Security and Its Applications, vol.3, no.5, pp-230-240, Sep-2011.

      [7] Phung Huu Phu, Myeongjae Yi and Myung – Kyun Kim, “Securing AODV Routing Protocol in Mobile Ad – Hoc Networks “, International Federation for Information Processing,LNCS 4388, pp. 182-187, 2009.

      [8] Rizwan Akhtar, Noor Ul Amin, Imran Memon and Mohsin Shah. “Implementation of Secure AODV in MANETâ€, The International Society for Optical Engineering, vol.8768, Mar -2013.

      [9] Vijaya Singh,Megha Jain, “Secure AODV Routing Protocols Based on Concept of Trust in MANETSâ€, International Journal of Advanced Research in Computer Engineering and Technologyâ€, ISSN-2278-1323, vol. 3, no.12, pp. 4425-4428, Dec-2014.

      [10] Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M.Belding- Royer, “ A Secure Routing Protocol for AdHoc Networks“

      [11] Bruce Schneier, Doug Whiting, “A Performance Comparison of the five AES Finalists â€, Apr– 2000.

      [12] Nikita S.Karekar, Dr.R.S.Kawitkar, “ Security in Patient Data Communication using Encryption Algorithmâ€, International Journal of Innovative Research in Computer and Communication Engineering, ISSN-2320-9798,vol.5, no.5, pp. 9738-9745, May-2017.

      [13] Aparna.K, Jyothi Solomon, Harini.M, Indhumathi.V,†A Study of Two Fish Algorithmâ€, International Journal of Engineering Development and Research, ISSN-2321- 9939, vol.4, no. 2,pp. 148- 150, 2016.

      [14] Mahsa Gharehkoolchian, A.M.Afshin Hemmatyar, Mohammad Izadi, “ Improving Security Issues in MANET AODV Routing Protocol “, Proceedings of International Conference on Ad Hoc Networks, pp. 237- 250, Nov- 2015 .

  • Downloads

  • How to Cite

    Deepa, M., & Krishna Priya, P. (2018). Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm. International Journal of Engineering & Technology, 7(3.12), 621-626. https://doi.org/10.14419/ijet.v7i3.12.16441