AODV (Ad hoc On-Demand Distance Vector) routing protocol is popular in wireless Ad hoc network. In this paper we describe the AODV operation, the design and the pitfalls left in the (AODV) routing protocol structure. This paper is meant to aid the knowledge about AODV and how we can improve AODV. The two issues are focused in this paper viz. security and energy efficiency. Security have important roll in delivering the information to the desired destination while energy efficiency creates an impressive step towards the new developments and improvements.
Original Title
AODV Security and energy efficiency’s pitfalls- A Review
AODV (Ad hoc On-Demand Distance Vector) routing protocol is popular in wireless Ad hoc network. In this paper we describe the AODV operation, the design and the pitfalls left in the (AODV) routing protocol structure. This paper is meant to aid the knowledge about AODV and how we can improve AODV. The two issues are focused in this paper viz. security and energy efficiency. Security have important roll in delivering the information to the desired destination while energy efficiency creates an impressive step towards the new developments and improvements.
AODV (Ad hoc On-Demand Distance Vector) routing protocol is popular in wireless Ad hoc network. In this paper we describe the AODV operation, the design and the pitfalls left in the (AODV) routing protocol structure. This paper is meant to aid the knowledge about AODV and how we can improve AODV. The two issues are focused in this paper viz. security and energy efficiency. Security have important roll in delivering the information to the desired destination while energy efficiency creates an impressive step towards the new developments and improvements.
International Journal of Advanced Engineering Research and Technology (IJAERT)
Volume 2 Issue 2, May 2014, ISSN No.: 2348 8190
79
www.ijaert.org
AODV Security and energy efficiencys pitfalls- A Review
Sheetal 1 , Kamaljit Singh Saini 2
1 (M.Tech. Scholar, Department of Computer Science & Engineering, Guru Nanak Institute of Technology, Ambala) 2 (Associate Professor & Head of Department of Computer Science & Engineering, Guru Nanak Institute of Technology, Ambala)
ABSTRACT : AODV (Ad hoc On-Demand Distance Vector) routing protocol is popular in wireless Ad hoc network. In this paper we describe the AODV operation, the design and the pitfalls left in the (AODV) routing protocol structure. This paper is meant to aid the knowledge about AODV and how we can improve AODV. The two issues are focused in this paper viz. security and energy efficiency. Security have important roll in delivering the information to the desired destination while energy efficiency creates an impressive step towards the new developments and improvements.
Keywords AODV, RREQ, RREP, REER.
I. INTRODUCTION Ad hoc network is also known for its features like multi- hop network, infrastructure less network and self- organizing network [1]. There is no fixed infrastructure in this network, and every node is mobile. Every node can connect other nodes by any way [2]. With the advancement of the mobile terminal performance, power demand for Ad hoc network increases constantly. So, it has become an emerging research on reducing the energy consumption of Ad hoc network. AODV is used in wireless ad hoc networks based on distance vector on demand plane. When the node is inactive, AODV does not need to update routing and AODV can obtain smaller network overhead [3]. So AODV is becoming the routing protocol widely used in Ad hoc network [4]. Broadcast mechanism does not need to maintain the network topological structure and correlative routing calculation. Only receiver need transmit data packets by broadcast. In AODV, every node need to transmit RREQ packets when they were received by the network first time. So flooding mechanism is especially suitable for AODV [5]. When network traffic is heavy for router, the conflict probability of RREQ packet will increase and
protocol efficiency will reduce in flooding mechanism. Then network load will increase, the delay of end-to-end packet will increase, and the node energy will be wasted greatly. For this reason, a lot of broadcast restraining algorithms had been proposed to improve efficiency of AODV routing protocol and save power energy of the whole Ad hoc networks. However, there are some problems in these methods according to actual implementation. Restraining algorithm based on area may encounter a black hole and lead to broadcast failure [6]. When the number of neighbor nodes to source node is few, gossip message quickly will disappear fast and restraining algorithm based on gossip will fail [7]. Restraining algorithm based on survival time is simple, but its efficiency is low and it may lead to broadcast storm problem. [8]. an independent distributed algorithm need be run in restraining algorithm based on smallest connected set [9]. Intelligent antenna and other intelligent device need be used in restraining algorithm based on angle and direction [10]. Aimed on the different pitfalls in this paper, we tried to get the issues which can be addressed and improved in a new AODV protocol.
II. AODV ROUTING PROTOCOL The AODV [11, 12] routing protocol is a reactive routing protocol; therefore, routes are determined only when needed.
Fiqure 1 : AODV Protocol Massaging [12] International Journal of Advanced Engineering Research and Technology (IJAERT) Volume 2 Issue 2, May 2014, ISSN No.: 2348 8190 80
www.ijaert.org Figure 1 shows the message exchanges of the AODV protocol. Hello messages may be used to detect and monitor links to neighbors. If Hello messages are used, each active node periodically broadcasts a Hello message that all its neighbors receive. Because nodes periodically send Hello messages, if a node fails to receive several Hello messages from a neighbor, a link break is detected. When a source has data to transmit to an unknown destination, it broadcasts a Route Request (RREQ) for that destination. At each intermediate node, when a RREQ is received a route to the source is created. If the receiving node has not received this RREQ before, is not the destination and does not have a current route to the destination, it rebroadcasts the RREQ. If the receiving node is the destination or has a current route to the destination, it generates a Route Reply (RREP). The RREP is unicast in a hop by hop fashion to the source. As the RREP propagates, each intermediate node creates a route to the destination. When the source receives the RREP, it records the route to the destination and can begin sending data. If multiple RREPs are received by the source, the route with the shortest hop count is chosen. As data ows from the source to the destination, each node along the route updates the timers associated with the routes to the source and destination, maintaining the routes in the routing table. If a route is not used for some period of time, a node cannot be sure whether the route is still valid; consequently, the node removes the route from its routing table. If data is owing and a link break is detected, a Route Error (RERR) is sent to the source of the data in a hop- by- hop fashion. As the RERR propagates towards the source, each intermediate node invalidates routes to any unreachable destinations. When the source of the data receives the RERR, it invalidates the route and reinitiates route discovery if necessary.
III. IMPLEMENTATION POSSIBILITIES For the AODV routing daemon to function it must determine when to trigger AODV protocol events. Since the IP stack was designed for static networks where link disconnections are infrequent and packet losses are unreported, most of these triggers are not readily available. Therefore, these events must be extrapolated and communicated to the routing daemon via other means. There are many ways to design the AODV protocol to extrapolate the needed AODV events. Possible opportunities for obtaining the events include: 1. Snooping 2. Kernel modification 3. Net filter We are going to use kernel modification in our approach.
KERNEL MODIFICATION Code can be placed in the kernel to communicate the events. For example, to initiate route discovery, code is added in the kernel at the point where route lookup failures occur. Given this code in the kernel, if a route lookup failure happens, then a method is called in the user-space daemon.
Figure 2: Kernel modification Architecture [12]
Figure 2 shows the architecture of the AODV daemon and the required support logic used for kernel modification. The advantages of this solution are that the events are explicitly determined and there is no wasted overhead. The main disadvantages of this solution are user installation and portability. Installation of the necessary kernel modifications requires a complete kernel recompilation. This is a difficult procedure for many users. Also, kernel patches are often not portable between one kernel version and the next. Finally, International Journal of Advanced Engineering Research and Technology (IJAERT) Volume 2 Issue 2, May 2014, ISSN No.: 2348 8190 81
www.ijaert.org understanding the Linux kernel and network protocol stack requires examining a significant amount of uncommented, complex code.
IV. SECURITY ISSUE We analyze the security issues concerning MANETs. A node is malicious if it is an attacker that cannot authenticate itself as a legitimate node due to the lack of valid cryptographic information. The attack on MANET can be classified as the active and passive attacks: Passive attacks: A passive routing attack does not disrupt the operation of a routing protocol, but only attempts to discover valuable information by listening to the routing traffic. Hence such attacks are difficult to detect. Active attacks: An active attack attempts to improperly modify data, gain authentication, or procure authorization by inserting false packets into the data steam or modifying packets transition through the network. Active attack are of two types: external and internal. An external attack is one caused by nodes that do not belong to the network. An internal attack is one from compromised or hijacked nodes that belong to the network. As malicious nodes already belong to the network as authorized parties, and hence are protected with network security mechanisms and services, therefore, internal attacks are more severe. Black hole: An attacker can project itself as having shortest route to a destination, whose data packets it wants to intercept, thereby causing the source to send data packets via this node. A malicious node receiving the RREQ may claim to have route to the desired destination by sending RREP back to the originator. If the source receives this RREP first then it sends all data packets via this malicious node and thereby leaving the fate of those data packets on the malicious node. The malicious node now discards or consumes all the data packets, leading to the complete loss of all data packets. Gray hole: An attacker forwards all RREQs and RREPs but forwards only a few data packets, dropping all other data packets. Clearly it points out a lapse in the routing protocol. This type of attack is known as gray hole problem. By nature, it belongs to the set of internal active attacks. Worm hole: Worm hole is a collection of two or more malicious nodes belonging to the ad hoc network that are connected by a private network connection. Suppose two nodes A and B make a wormhole. Then A forwards all packets that it receives to B through the worm hole to be forwarded by B normally, similarly, B forwards all packets to A, that it receives, through the wormhole. It clearly disrupts routing by short circuiting the normal flow of routing packets [14] . Denial of service (DoS): The DoS attack results when the network bandwidth is hijacked by a malicious node. It can be done in several ways. One way is to flood any centralized resource so that the network crashes or no longer operates correctly. For example, a malicious node by generating frequent route requests can make the network resources unavailable to other nodes. Routing table overflow: A malicious node, by generating route requests to several non-existent destinations, causes other nodes to create several entries in their routing table, one for each desired (non-existent) destination to keep the address of the sender in the precursor field so that it can transmit RREP or RERR back to the originator, and leads to the overflow of their routing table. When the routing table of a node overflows, then it doesnt entertain any further route requests (including those for existent destinations from non-malicious nodes). As a result the route discovery process gets adversely affected.
V .ENERGY CONSUMPTION Energy is a critical parameter in MANETs. Battery- powered nodes try to conserve energy by transmitting only when absolutely necessary. An attacker, by sending route requests (frequent and unnecessary) or forwarding unnecessary packets, makes other nodes consume energy leading to useless consumption of energy.
VI. CONCLUSION In this paper, we have viewed the AODV protocol along with the suggested modification methods. On a platform like NS2, the method of Kernel modification can be implemented easily by having access to the definition files of the AODV protocol. Security issues motivate many ideas for the improvement of existing AODV protocol. New protocol can be more secure and energy efficient than that of existing AODV protocol.
REFERENCES
[1] Qiu Xiufeng, Liu Jianhua, Liu Jianwei, "Design and implementation of Ad hoc network secure protocol simulation system". International Journal of Advancements in Computing Technology, pp. 84-91. Volume 4, Number 8, May 2012, ISBN: 978-1-4244- 3692-7.ss International Journal of Advanced Engineering Research and Technology (IJAERT) Volume 2 Issue 2, May 2014, ISSN No.: 2348 8190 82
www.ijaert.org [2] Dr Karim Konate, Gaye Abdourahime, Attacks Analysis in mobile ad hoc Networks: Modeling and Simulation, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation, pp: - 367 372, ISBN: 978-1-4244-9809-3. [3] Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala. A Novel Approach for Gray Hole and Black Hole Attacks in Mobile Ad-hoc Networks, 2012 Second International Conference on Advanced Computing & Communication Technologies, pp :- 556- 560 , ISBN: 978-0-7695-4640-7. [4] A. Kumaravel, Dr. M.Chandrasekaran, A complete study on power aware routing protocol for mobile ad hoc networks, IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) PP 71 - 75, e- ISSN: 2278-1676 , P-ISSN: 2320-3331. [5] Baisakh, A Review of Energy Efficient Dynamic Source Routing Protocol for Mobile Ad Hoc Networks, International Journal of Computer Applications Volume 68 No .20, April 2013, 10 pages, ISSN: 0975 8887. [6] Gurpinder Singh, Asst. Prof. Jaswinder Singh, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012 , pp 217 - 227 ISSN: 2277 128X. [7] Shipra Gautam, Rakesh Kumar, Modified Energy Saving DSR Protocol for MANETs, International Journal of Electronics and Computer Science Engineering, Volume1, Number 4, pp 1892 -1992, ISSN- 2277-1956. [8] M.L. Sharma , Nipun Sharma, Analytical Impact of Reputation based scheme On DSR protocol for Evaluation of MANETs, Economics of Knowledge, Volume 3, Issue 2, 2Q, Spring 2011 ,pp 19 28 , ISSN 2066 -8325. [9] Anuj K. Gupta, Harsh Sadawarti, and Anil K. Verma, Review of Various Routing Protocols for MANETs, International Journal of Information and Electronics Engineering, Vol. 1, No. 3, November 2011, pp 251 259 , ISSN :1109 -2742. o11p [10] Nand Kishore, Sukhvir Singh and Renu Dhir, Energy Related Issues for MANETs: A Study, International Journal of -Science and Engineering, Volume 2 Issue 3, pp 98-100, ISSN: 2347-2693. [11] Ram Prakash S, Jayaraj S, Vigneswaran, Energy Savings in Mobile Adhoc Networks (MANET) Using Routing Protocols, Journal of Engineering A Technology Research, 2014, 2 (1): pp 154-160, ISSN 2348-0424. [12] www.cs.ucsb.edu. [13] Chakeres I.D , AODV Routing Protocol Implementation Design, Date of Conference: 23- 24March 2004, pp 698-703, ISBN: 0-7695-2087-1. [14] Suman Deswal and Sukhbir Singh, Implementation of Routing Security Aspects in AODV, International Journal of Computer Theory and Engineering, Vol. 2, No. 1 Feburary, 2010 pages 1793- 8201 ,ISSN : 1793-8201.