Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm
Keywords:Mobile Adhoc Network (MANET), AODV protocol, Network Simulator (NS 2), Bayesian Probability, Two Fish Algorithm.
In Mobile Adhoc Network (MANET) implementing a secure communication is a critical task due to its nature of wireless, infrastructureless, arbitrary network. Its not organized by any centralized control. Each node in this network acts as a router. Routing plays a major role in the network data transmission. Various protocols exist for the purpose of routing process. On Demand routing is a category of routing protocol were routes are obtained only on demand. AODV is one of the efficient on demand routing protocol. In this work an enhanced protocol with security features, the Secure AODV- ESB (Secure Adhoc On Demand Distance Vector based on Energy level and Signal Strength Implementing Bayesian Probability) has been proposed for Mobile Adhoc Network. Its is an extension of the previous work AODV â€“ ESB protocol, which is a modification of the existing AODV protocol. The AODV protocol works on two phases. The route discovery process and route maintenance phase. Major problem faced by AODV was the frequent route break caused by the dynamic mobile nature of the Mobile Adhoc network, which leads to frequent route discovery process. To avoid frequent route break AODV-ESB routing protocol was proposed, it adopts the energy level and Signal strength as parameters for the route selection for transmission of data. Bayesian probability implementation in the protocol increases the chance of adopting more reliable and optimized path. Another major issue in data transmission in the Adhoc network is the security. Securing data from access of the unauthorized person is a major responsibility of the protocol. This new secure AODV- ESB protocol protects against attackers by identifying the malicious node and eliminating them and also secures data by implementing cryptography using Two Fish Algorithm. This ensures secure data transmission in MANET more efficiently than the original AODV protocol. Analysis using the NS 2 Simulator proves that Secure AODV- ESB performs better than the previous work AODV- ESB.
 Lu Han, â€œWireless Ad-hoc Networksâ€, Oct 8, 2004
 C. E. Perkins and E. M. Royer, â€Ad-hoc On-Demand Distance Vector Routingâ€, Proceedings of the 2nd IEEE, 2003
 K.Sivakumar, â€œMobile Adhoc network routing principles and protocol evaluation metricsâ€ , International journal of computer science and technology [IJCST], vol.2, no.4, pp-261-266,Oct-Dec.2011
 Bruce Schneier, John Kelsey, Dough Whiting, David Wagner, Chris Hall and Neil Ferguson, â€œTwo fish: A 128 Bit Block Cipherâ€, Jun-1998.
 Morli Pandya, Ashish Kr. Shrivastava, â€œReview on security issues of AODV routing protocol for MANETâ€œ, IOSR journal of computer engineering, [IOSR-JCE], ISSN- 2278-8727, vol.14, no.5, pp-127-134, Sep-Oct.2013.
 Pabitra Mohan Khilar, â€Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanismâ€, International journal of Network Security and Its Applications, vol.3, no.5, pp-230-240, Sep-2011.
 Phung Huu Phu, Myeongjae Yi and Myung â€“ Kyun Kim, â€œSecuring AODV Routing Protocol in Mobile Ad â€“ Hoc Networks â€œ, International Federation for Information Processing,LNCS 4388, pp. 182-187, 2009.
 Rizwan Akhtar, Noor Ul Amin, Imran Memon and Mohsin Shah. â€œImplementation of Secure AODV in MANETâ€, The International Society for Optical Engineering, vol.8768, Mar -2013.
 Vijaya Singh,Megha Jain, â€œSecure AODV Routing Protocols Based on Concept of Trust in MANETSâ€, International Journal of Advanced Research in Computer Engineering and Technologyâ€, ISSN-2278-1323, vol. 3, no.12, pp. 4425-4428, Dec-2014.
 Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M.Belding- Royer, â€œ A Secure Routing Protocol for AdHoc Networksâ€œ
 Bruce Schneier, Doug Whiting, â€œA Performance Comparison of the five AES Finalists â€, Aprâ€“ 2000.
 Nikita S.Karekar, Dr.R.S.Kawitkar, â€œ Security in Patient Data Communication using Encryption Algorithmâ€, International Journal of Innovative Research in Computer and Communication Engineering, ISSN-2320-9798,vol.5, no.5, pp. 9738-9745, May-2017.
 Aparna.K, Jyothi Solomon, Harini.M, Indhumathi.V,â€ A Study of Two Fish Algorithmâ€, International Journal of Engineering Development and Research, ISSN-2321- 9939, vol.4, no. 2,pp. 148- 150, 2016.
 Mahsa Gharehkoolchian, A.M.Afshin Hemmatyar, Mohammad Izadi, â€œ Improving Security Issues in MANET AODV Routing Protocol â€œ, Proceedings of International Conference on Ad Hoc Networks, pp. 237- 250, Nov- 2015 .
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).