Optimized and Secure Ad hoc on Demand Di

Proc. Int. Conf. on Computational Intelligence and Information Technology, CIIT

Optimized & Secure Ad-hoc on Demand Distance
Vector Routing Protocol
Praveen Lalwani1, Piyush Kumar Shukla1
1

CSE Department, University Institute of Technology, RGPV, Bhopal
praveen.lalwani@gmail.com, pphdw@yahoo.com

Abstract A Mobile Ad-Hoc Network (MANET) is a collection of wireless
mobile nodes in which different routing protocols are used to form the
communication network. So, far there are numerous routing protocols are
discovered in which AODV performs superior than all. Ad-hoc network suffer
from the bunch of issues in which congestion and security are the major issues
of concern which leads to severe degradation of network throughput and Packet
Delivery Ratio. It also increases the routing overheads and end to end delay.
This paper presents a novel design Optimized and Secure AODV which is the
modified version Optimized AODV by including new Packet Route Checker.
The Route Checker Packet is the additional mechanism in the Optimized
AODV to create obstacle against Black-hole attack. The result shows that

OSAODV performs better in terms of Packet Delivery Ratio and Throughput
than AODV. The simulation has done through network simulator NS-2.
Keywords: Routing , Malicious , AODV , Black-hole

1 Introduction
1.1 Routing
Routing is the process of transmitting information from a source to destination. For
wired networks the two main routing algorithms used First, Distance Vector Routing.
Second, link State Routing. A distance vector routing algorithm is a distributed
algorithm that is simple to develop and has low comprehend demands. It means that
each router has a way of knowing about its neighbors
Instead of depending on every neighbor to regularly give information about how to
get to all the destinations the link state routing algorithm gets a complete picture of
the whole network and locally calculates the shortest path from source to every
destination.
© Elsevier, 2012

345

1.2 Routing in Ad-hoc Networks

In the case of a mobile ad hoc network, topology is changing dynamically. This leads
to rapidly changing link states. Some links to get broken while other links are created
by other pairs of routers at the same time.
The ad-hoc network is a collection of communication devices or mobile devices
(nodes) which communicate with each other through wireless medium without any
centralized or fixed infrastructure. The nodes in ad hoc networks can be stationary or
mobile. In the absence of the centralized infrastructure implies that the accountability
of the nodes is equal. Therefore, participating nodes in the network need to co-operate
in order to establish routes and to forward packets for other nodes. The nodes use
routing protocols to establish and maintain the routes. The commonly used standard
for ad hoc networks is IEEE802.11b (Wi-Fi), which is the standard for WLAN
1.3 AODV
In AODV [1], the network [2] is silent until a communication is needed. At that point
when any network node [3] wants to send the data to another node it needs to
broadcast a route request packet for [4] a new connection [5]. Other AODV nodes
forward this message, and when the route request message received at Target node
then it replies by Route Reply packet. After the route establishment, communication
takes place between the sender and receiver. If any of the link failure occurs in the
communication path then the Route Error packet is sent back to the transmitting
source. Unused entries in the routing tables are recycled after a time and the process

repeats.
1.4 Black-Hole Attack
The Black - Hole attack has two properties [6]. In First one, the node vanishes the
mobile ad-hoc routing protocol, such as AODV, to present itself as having a legal
route from source to a destination node, even though the route is fake, with the
intention of capturing packets. The second one, the attacker consumes the captured
packets without any forwarding [7]. There is a more intelligent form of these attacks
when an attacker selectively forwards packets. An attacker suppresses or changes
packets originating from some nodes, while leaving the data from the other nodes
unaffected.

2 Proposed Concept
Optimized and Secure AODV is the modified version of Optimized AODV [1] as
shown in fig 1.1 in which one more parameter is added is security. Initially Route
Request packet broadcasts on the network to establish the new path for the
communication and when packet received at the destination it reply by unicasting the
Route Reply Packet RREP. If the path break-up there then optimized AODV is used

346


to recover the new path as shown in figure 1.2 and for security purpose route checker
packet added into it as shown in fig 1.3.
S
O

R
SEND RREQ PACKET FOR ROUTE ESTABLISM ENT

C

U
R
C
E

E

ROUTE REPLY PACKET RREP

Ref er Chart 2

For t he
com m unicat ion
Failure

I

Ref er Chart 1
For t he Det ection
Of M alicious Node

V
E
R

Fig 1.1: Proposed Algorithm of OSAODV

2.1 Recovery of Route

After 5 ms Each Node Send
Route Checker Packet to next to next

Node

Recover the Path By Next Next Node if
not found

Recover the Path by Local Repair
Mechanism if not found go to next step
Then Next to Next Node Check it
gets the Packets from Previous Node
or Not

Send the Priority Route Error towards
the source to stop the data packets and go to
next step

If Packets gets then Previous
Node is Trustworthy otherwise
Malicious

Source Again establish new path for

communication

Fig 1.2: Recovery of Route Chart 2

Fig 1.3 Detection of Malicious Node chart 1

Optimized AODV is modified version of ELRAODV [2] which uses next to the next
node to recover the path .If the route is not repaired by ELRAODV (Enhance Local
Repair AODV) then instead of sending RRER packet it sends PRRER (priority route
error packet) which is the extension of RRER packet to set the priority of the packet
[1]. If some packet is waiting in the queue to be forwarded then instead of forwarding
these packets, forwards the priority packet is first. If this PRRER packet reaches with
shorter delay to the source it stop sending extra packets in the network which

347

decreases routing overhead and end to end delay. It also increases throughput and
packet delivery ratio.

2.2 Detection of Malicious Node

The route Checker packet is added to the Optimized Aodv as shown in fig 1.3. We
have stored next to the next node address in the routing table, this address used in the
Route checker packet and two bits is used for acknowledgment bit ‘1’ shows true and
a bit ‘0’ show fails. In the communication after 5 ms second each and every node send
route checker packet to the next to the next node and a route checker packet receiving
node checks that the data packets received from the previous node or not, then it
sends the acknowledgment to the route checket packet sender by bits ‘0’ or ‘1’ . Bit
value ‘1’ acknowledged to the sender, if data packets received from the previous node
and it represent previous node is trustworthy or next node from the sender is
trustworthy. If it does not receive the data packets from the previous node then bit ‘
0’ is acknowledged by the help of which receiver node know the next node is black
hole or malicious because the property of the black hole node it drops the packet [6]
instead of forwarding it.

3
2
1

4
5


Fig 1.4 Black -Hole Detection

As shown in the figure 1.4 each and every node send route checker packet to next to
next node node 1 send the route checker packet to node 3 it is replied by bit 1 means
node 2 is trustworthy other and node 3 send the route checker packet to node 5 it
replied by bit 0 means node 4 is malicious or Black- hole node .

3 Simulation and Analysis
Simulation has been done using 10, 20, 30, 40 and 50 Nodes [8]. There are four
parameters, end-to-end delay, routing overhead, packet delivery ratio and throughput
have been analyzed, which are directly related to congestion. The end-to-end Delay
and routing overhead get increased (i.e. As shown in the Table 1) due to the extra
packet needed to check whether any node is malicious or not? If the node is found to
be malicious then it can be removed from the network and new path establish for the
communication with the help of RREQ routing [2] packet. Packet Delivery Ratio and

348

throughput gets increased as shown in the Table 1, when the malicious node is

detected and removed from the network, as we know that the property of the black
hole node is to drop the packets. Graph of experimental result shown in the fig 1.5, fig
1.6., 1.7 and 1.8 has been generated using a simulation through standard network
simulator i.e. NS-2.34.
Table 1: Comparison of OSAODV with AODV on the basis of different Key Performance
Parameters where RO: Routing Overhead, EtE:End to End Delay,PDR:Packet Delivery Ratio
AODV (Nodes)
10
20
30
40
50
OSAODV(Nodes)
10
20
30
40
50

RO


EtE

PDR

Throughput

0.004
0.029
0.027
0.025
0.121
RO

15.1676
503.846404
767.359753
796.408284
669.228105
EtE

0.126473
0.128959
0.003833
0.010109
0.010400
PDR

47.11
188.54
8.05
162.59
169.11
Throughput

0.004
0.029
0.030
0.099
0.089

686.413282
665.441734
869.335491
804.425840
629.789828

0.110073
0.144211
0.003033
0.008910
0.010404

65.56
282.56
19.11
181.53
169.11

Fig 1.5 End to End Delay

FIG 1.6 Packet Delivery Ratio

Fig 1.7 Routing Overhead

Fig 1.8 Throughput

349

4 Conclusion and Future Research Direction
In this paper Optimized and Secure AODV has been simulated, results as shown in
Fig.1.6 and Fig.1.4 clearly shows that as the number of nodes increase routing
overhead around 24 % and end to end delay Increases around 32% in OSAODV as
compared to the AODV. Due to lower routing overhead of OSAODV network
performance improved. The results shown in Fig 1.7 and Fig. 1.5 indicate as the
number of nodes increase throughput and Packet delivery ratio increases by 25 % in
OSAODV as compared to the AODV.
The proposed solution is, in most cases, not tested in a real environment Therefore,
future studies should rather be devoted to real implementation than just a simulation
and to develop prevention against different kinds of attack like gray hole which is an
advance version of the Black Hole attack. Only such an approach can ultimately
verify a protocol’s usefulness in future ad-hoc and other mobile networks.

References
1. Lalwani, P. Shukla P.K.: Optimized Ad-hoc On Demand Routing Protocol.: International
Journal of Computer Application. Vol. 55, No.4, pp. 13-17 (2012)
2. Singh, J., Singh, P., Rani, S.: Enhanced Local Repair AODV: International Conference on
Advances in Computing, Control, and Telecommunication Technologies. pp. 787-791
(2009)
3. Patch, A., Mishra, A.: Collaborative Security Architecture for Black Hole Attack Prevention
in Mobile Ad Hoc Networks, IEEE, pp. 75-78 (2003)
4. Pirzada, A.A. , Datta A., : Trustworthy Routing with the AODV Protocol, IEEE , pp. 19-24
(2004)
5. Prathapani, A., Santhanam, L., Agarwal, D.P.: Intelligent Honey Pot Agent for Black Hole
Attack Detection in Wireless Mesh Networks. IEEE, pp. 753-758 (2009)
6. Sangi, A.R., Lui J., Sue L.: A Performance Analysis of AODV Routing Protocol under
Combined Byzantine Attacks in MANETs. IEEE , pp. 7-12 (2009)
7. Bala, A., Bansal, M., Singh, J.: Performance Analysis of MANET under Black Hole Attack:
IEEE First International Conference on Networks & Communications. pp. 141—145(2009)
8. Shukla, P.K., Bhadauria, S.S, Silakari, S.: ARA-MAC: A Qualifying Approach to
improving Attack Resiliency and Adaptability in Medium Access Control Protocol for
WLAN 802.11.: International Journal of Computer Applications (0975 – 8887) Volume 49–
No. 19 , pp. 01—10 (2012).

350

Dokumen yang terkait

ANALISIS KELAYAKAN FINANSIAL AGRIBISNIS PERBENIHAN KENTANG (Solanum tuberosum, L) Di KABUPATEN LUMAJANG PROVINSI JAWA TIMUR

27 309 21

Analisis Komparasi Internet Financial Local Government Reporting Pada Website Resmi Kabupaten dan Kota di Jawa Timur The Comparison Analysis of Internet Financial Local Government Reporting on Official Website of Regency and City in East Java

19 819 7

ANALISIS PENGARUH MANAJEMEN LABA TERHADAP NILAI PERUSAHAAN (Studi Empiris Pada Perusahaan Property dan Real Estate Yang Terdaftar Di Bursa Efek Indonesia)

47 440 21

EFEKTIVITAS PENDIDIKAN KESEHATAN TENTANG PERTOLONGAN PERTAMA PADA KECELAKAAN (P3K) TERHADAP SIKAP MASYARAKAT DALAM PENANGANAN KORBAN KECELAKAAN LALU LINTAS (Studi Di Wilayah RT 05 RW 04 Kelurahan Sukun Kota Malang)

45 393 31

PENGALAMAN KELUARGA DALAM MERAWAT ANGGOTA KELUARGA DENGAN GANGGUAN JIWA (SKIZOFRENIA) Di Wilayah Puskesmas Kedung Kandang Malang Tahun 2015

28 256 11

STUDI PENGGUNAAN SPIRONOLAKTON PADA PASIEN SIROSIS DENGAN ASITES (Penelitian Di Rumah Sakit Umum Dr. Saiful Anwar Malang)

13 140 24

PENILAIAN MASYARAKAT TENTANG FILM LASKAR PELANGI Studi Pada Penonton Film Laskar Pelangi Di Studio 21 Malang Town Squere

17 165 2

Analisis Penyerapan Tenaga Kerja Pada Industri Kerajinan Tangan Di Desa Tutul Kecamatan Balung Kabupaten Jember.

7 76 65

Docking Studies on Flavonoid Anticancer Agents with DNA Methyl Transferase Receptor

0 55 1

Improving the Eighth Year Students' Tense Achievement and Active Participation by Giving Positive Reinforcement at SMPN 1 Silo in the 2013/2014 Academic Year

7 202 3