You are on page 1of 6

International Journal of Emerging Technologies and Engineering (IJETE)

Volume 1 Issue 9, October 2014, ISSN 2348 8050

A Survey on Properties of MANET and Different Routings for Secure


Packet Transmission
Nandhini.V 1
1
PG Scholar,
Department of Computer Science and Engineering,
Kongunadu College of Engineering and Technology,
Trichy, Tamilnadu, India.

ABSTRACT
The Mobile Ad hoc Network is temporary, self
configured, structure less wireless network. The security
of the mobile node in Ad hoc is very complicated due to
the malicious activity. We survey some of the issues of
MANET and their mitigation technique then the
properties of MANET and Trust based routing protocol
along with anonymous routing protocol with its
malicious activity.

Ms.A.Kanimozhi2 M.E.,
2
Assistant Professor,
Department of Computer Science and Engineering,
Kongunadu College of Engineering and Technology,
Trichy, Tamilnadu, India.

as possible. The routing protocols also maintaining the


topological information, due to the mobility of nodes, all
the nodes needs more control overhead. It causes the
high bandwidth wastage.
Hidden And Exposed Terminal Problems:
The collision will occur due to the concurrent
broadcast of packet to the same node by two different
nodes.

Keywords-MANET; Trust based routing protocol;


anonymous routing protocol; malicious activity.

I.

INTRODUCTION

The infrastructure less Mobile Ad hoc Network


(MANET) is created for communicates with
uncentralized wireless nodes. Movable electronic
devices are called nodes like as a laptop, mobile phone,
Personal Digital Assistants etc. MANET having an
important role in a wide number of areas like as military,
education, entertainment, emergency service etc. Finding
of better routing on MANET is based on some criteria
such as hop length, minimum power required and life
time of the wireless link. There are several routing
algorithm is introduced for secure communication on
MANET. But the attackers will follow different spiteful
activity to attack the nodes by routing . These activities
cause insecure communication over a network.

II.

ISSUES OF DESIGNING PROTOCOL

Mobility
The hop movement causes the link failure in
changing network topology. This implies the packet loss,
energy wastage. The designed protocol must have high
time to live(TTL) to avoid the path breaks.
Bandwidth Constrain
The bandwidth of node and offered data rate is much
lesser than the wired network. The routing protocol uses
the bandwidth in better by keeping the overhead as low

Here node A and node c wants to transmit the packet


to node B. but node A and C not in range, each node
does not know about the concurrent transmission. So the
collision will occur.
Resource Constrain:
The resource constrain implies the battery life and
processing power. If the size of the battery increases it
reducing the movable capability.

III. PROPERTIES OF MANET


Distributed Operation:
The protocol must distribute over network to enter
and leave the nodes easily on the network.
Loop Free:
While searching route on network the routes should
not be repeated. If the network is loop free it reduces the
bandwidth, total power. (e.g: Ad hoc On demand
multipath Distance Vector (AOMDV) )
Demand Based Operation:
235

www.ijete.org

International Journal of Emerging Technologies and Engineering (IJETE)


Volume 1 Issue 9, October 2014, ISSN 2348 8050

Whenever the routing is required that time route will


be allocated. To avoid the unnecessary wastage of
bandwidth, battery, computing power, the routing
protocol must act as reactive protocol. It increases the
route discovery delay. (e.g.: Ad hoc On demand
Distance Vector (AODV)).
Security:
The secured communication is important on
adversarial environment. The attacks may active attack,
passive attack, denial of service attack etc. To avoid the
attacks, the security must improved by applying
encryption, authentication and trustiness.
"Sleep" Period Operation:
To save the power, MANET nodes could discontinue
broadcast and receiving (even receiving needs power)
for Random time period. A routing protocol should be
able to hold such sleep periods without excessive cost.
This property will require with the link-layer protocol
during a reliable interface.

node to calculate the trustiness. The observed node is


performing some packet transmission with its neighbor
node.
Subjectivity:
The observer node having rights to decide trustiness
about observed node. There are different observed node
will be available for the same observed node.
Dynamicity:
The observed node trust value will be changed based
on its performance.
Nontransitivity:
If node A trust node B, node B trust node C then
there is no need to node A trust node C.
Trust
B
Trust

Unidirectional Link Support:


The bidirectional link creation is for between two
mobile ad hoc networks improve their performance.
Reduced Delay:
While finding the route from source node to
destination node the delay will occur. The delay may
reduce based on size of network and the network load.
Reconfiguration:
The reconfiguration of the network is important for
every MANET. That is whenever the link gets broken
and packet loss the network must reconfigured as soon
as possible for Reducing the wastage of power and
energy.
Scalability:
This scalability will measure the sizes based on a
large number of nodes present on the network. (E.g.
Temporally Ordered Routing Algorithm (TORA)).
Multiple Routes:
If one route gets failure then another route will used
without starting the route discovery.(e.g:Ad hoc On
demand multipath Distance Vector(AOMDV) ).

Not necessary to Trust


A
Asymmetry:
If node A trust B, then there is no need to trust node
A by B.
Trust

B
Not necessary to trust

Context-dependency:
If Node A have less energy, then it can not be able to
forward the packet to its neighbors. So, the trust of
energy will be rejected, but the trust of the Node A is not
changed.
Reputation:
Reputation is other node opinion about the observed
node.
Quantitative value:
The trust value be discrete or continuous.

IV.
III.

PROPERTIES OF TRUSTINESS IN
MANET

The trustiness is decided based on observer node and


observed node. The observer node is watching the other

PARAMETERS OF NETWORK
FRAMEWORK

Size Of Network: Total number of nodes present on


network.
236

www.ijete.org

International Journal of Emerging Technologies and Engineering (IJETE)


Volume 1 Issue 9, October 2014, ISSN 2348 8050

Connectivity of Network: Each node connected with its


neighbors
Change in Topology: Depends on the speed of node
movement the topology of network getting change.
Capacity of Link: It will be calculated through transmit
and receiving power of node.
Unidirectional Links: The node can able to transmit and
receive the packets.

V.

THE SURVEY ON DIFFERENT


ROUTING FOR SECURE PACKET
TRANSMISSION

Sybil Attack:
The Sybil attack is, if a spiteful node duplicates the
missing node then it will become visible as various
spiteful nodes combine together .The main aim of Sybil
attack is attacking the whole network services and the
auto arrangement while the support is needed for the
network.
The Sybil attack is overcome through the shared
symmetric key over the network. The trustworthiness
based QOS Routing Protocol for Wireless Ad hoc
Networks says[8], while searching the route on network
every node needs to authenticate with its neighbors by
using RSA encryption algorithm. So, the spiteful node is
prevented by the node authentication.
The Anonymous Location Aided Routing in
Suspicious MANET (ALARM)[15] says, that Sybil
attack is overcome with its group signature and self
distinction.
The Sybil attack also overcome through the
Unobservable secure on demand routing protocol
l(USOR)[7] .
Passive Attack[14]:
The passive attack is monitoring the communication
path, packet size, contents of the packet, source and
destination, and then makes delay on the packet
transformation. It does not affect any content on packet,
path. Its affecting the confidentiality of the packet.
Eavesdropper:
This Attack will take the important
information such as location, details about the node,
private key, and public key during the communication
over the network.
Silentdropping:
The silent dropping is, the enemies
will remove the nodes present on the network without
knowing by other nodes.

The Passive attack is overcome through the


Authenticated Anonymous secure Routing on MANET
(AASR) protocol. In this protocol the packet is secured
through group signature , the Path is secured through the
onion routing. The group admin will select the node to
participate in the network then Assign the pair of private
and public key. The packet is transformed by using the
public key, the node opens the packet by using its own
private key.
The onion routing is, while route request on a
network, a node encrypts the packet with its own private
key, then forward it to the next node. All nodes do the
same process until it reaches the destination node.
Finally the destination node will open the all encrypted
messages with its own private key. Then the RREP will
pass through the same intermediate node. The
intermediate node will decrypt and delete its encrypted
message.
The eavesdropping is avoided by the onion routing.
Each node will encrypt the packet with its own private
key, so outlier of packet having multiple encrypted
messages. So, the eavesdropper cannot able to identify
the location, private key, public key.
The silent dropping is avoided through the watchdog
method, based on anonymous the trust model is used to
avoid the silent dropping.
Node Compromise:
The node compromise is leak -aging the security
information such as node id, private key to the attacker.
Now the attacker can able to establish the keys with its
neighbors.
The Unobservable secure on demand routing
protocol(USOR)[7] says, the attacker can attack the type
of node, data packet sent through compromised node,
RREQ sent from compromised node.
While using the USOR protocol the attacker can not
attain the source and destination node, real identities of
the source and destination, RREQ of the source and
location is also protected by USOR protocol.
Black-hole Attack:
The black hole attack is dropping the all forwarding
packets.
S
D
A
S-Source,D-Destination,A-Attacker
237

www.ijete.org

International Journal of Emerging Technologies and Engineering (IJETE)


Volume 1 Issue 9, October 2014, ISSN 2348 8050

The adding security against packet dropping attack in


mobile ad hoc network says, Whenever the intermediate
node receives the packet from the destination it must
send the ACK to the source node. if the source node
does not receive any ACK, then it starts to retransmitting
the packet.
After retransmitting the packet, the source node does
not receive any ACK, then the source node decide that a
node will do the malicious activity. Then the source
node sends some details about the malicious node to all
other nodes to stopping the retransmitting packet.
Wormhole attack[1]:
The wormhole attack is, the attacker is present on
both sides of the network, from one side the attacker
make the nodes believe that the distance to the

I.

ISSUES

destination is just one hop. this leads to the attacker will


attract the all the network traffic on its side and
communicate it through the wormhole. The attacker on
other side replay the same packets. By doing this the
attacker can drop the packet.
The wormhole attack is detected[10] through the
route identification. Each node maintains the detail about
its neighbors, thus identifying the route that is affected
by the wormhole.
The other method of preventing wormhole attack is
using digital signatures[11]. Whenever the node wants to
send a packet it start the RREQ with the digital
signature. The node verifies the digital signature with the
database. if it match means they conform that RREQ is
coming from the trust node.

THE MITIGATION METHOD FOR ISSUES ON MOBILE AD HOC NETWORK

THE DESCRIPTION OF ISSUE

MITIGATION METHOD FOR


ISSUE

In AAC (Adaptive Admission


Control) , at fixed time period each
node calculates its local used
The routing protocols will
bandwidth by adding the size of packet
maintain the topological information,
1.
Bandwidth
and sensed packet
due to the mobility of nodes, all the
Constrain
nodes need more control overhead.It
To calculate the accuracy, the
offers
only
minimum
data
sender and receiver idle time will be
transmission
calculated. to overcome this Pipe lining
and log based log back off algorithm
will be introduced .

2. Mobility

The mobility of node controlled by


The hop movement causes the link
local view synchronization and buffer
failure in changing network topology.
zone. That is by the periodic hello
This implies the packet loss, energy
message
wastage.

The directional antenna is the


The collision will occur due to the solution for hidden and exposed
3.
Hidden
And
concurrent broadcast of packet to the terminal problem. That unfair channel
Exposed
Terminal
same node by two different nodes
allocation and wastage of channels
Problems
between each node can be avoided[18].

238
www.ijete.org

International Journal of Emerging Technologies and Engineering (IJETE)


Volume 1 Issue 9, October 2014, ISSN 2348 8050

II.

PROPERTIE

THE PROPERTIES OF ROUTING PROTOCOL:

ROUTING
PROTOCOL

DESCRIPTION OF ROUTING PROTOCOL

While finding the single route, the multiple loop


free route will be discovered. the intermediate node
Ad hoc On demand
Loop Free, Multiple
will maintains the multiple path in their routing table .
multipath
Distance
Route
if one path gets fail, the other path is chosen for
Vector(AOMDV)
transmitting packet instead of starting new route
discovery
Temporally
Ordered
Routing
Algorithm
(TORA),Layered Cluster
based
routing
Protocol(LCRP).

Scalability

Demand
Operation,
Sleep"
Operation

Whenever the routing is required, the protocol


forms the new route over the network. each node has
Ad hoc On demand the details about its neighbor node. if any link fails on
Period
Distance Vector(AODV) the network it intimated to the source node.
The AODV protocol will avoids the needless
duplication
Based

We cant mention the particular protocol will


secured from all attacks. Depends on protocol different
attack is overcome.

Security

VI.

By using the directed acyclic graph (DAG) on


destination node, the TORA creates the scaled out
route between the source and destination node.Then
create the best routing by following, the Query
message,
updated
message,
clear
message,
optimization message

CONCLUSION

Different routing protocol is used in various places


such as location anonymity, position anonymity, Node
anonymity, Link anonymity etc.As per survey the
protocol which is having a group signature, unlink
ability, unidentifiability, trustiness nature that protocol
having higher security perspective.

[3]

N. Nithya, R. Maruthaveni, A Survey on Routing


Protocols in Mobile Ad Hoc Networks,
International Journal of Science and Research
(IJSR), Vol. 2, pp. 2319-7064, January 2013.

[4]

Sumit Mahajan, Vinay Chopra, Performance


Evaluation of MANET Routing Protocols with
Scalability using QoS Metrics of VOIP
Applications, Vol. 3, pp. 2277 128X, February
2013.

[5]

N. Sumathi1, C. P. Sumathi, Energy and


Bandwidth Constrained QoS Enabled Routing for
MANETs, International Journal of Computer
Networks & Communications (IJCNC), Vol. 5,
March 2013.

REFERENCES
[1]

Hariom Soni, Preeti Verma, A Survey of


Performance based Secure Routing Protocols in
MANET,
International Journal of Advanced
Research in Computer Engineering & Technology
(IJARCET), Vol. 2, pp. 2278-1323, January 2013.

[2] M. G. Reed, P. F. Syverson, and D. M. Goldschlag,


Anonymous Connections and Onion Routing,
IEEE Journal on selected Area in Comm., Vol. 10,
pp. 482-494, May 1998.

239
www.ijete.org

International Journal of Emerging Technologies and Engineering (IJETE)


Volume 1 Issue 9, October 2014, ISSN 2348 8050

[6] Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu


Wang, and Peter Mason, Security Enhancements
for Mobile Ad Hoc
Networks with Trust Management Using Uncertain
Reasoning,
[7] Zhiguo Wan, Kui Ren, and Ming Gu, An
Unobservable Secure On-Demand Routing Protocol
for Mobile Ad Hoc Networks, IEEE Transaction on
Wireless communications, Vol. 11, pp. 1536-1276,
May 2012.
[8] Ming Yu, Kin K. Leung, A Trustworthiness-Based
QoS Routing Protocol for wireless Ad Hoc
Networks, IEEE Transaction on Wireless
communications, Vol. 8, pp. 1536-1276, April 2009.
[9]

Pradip M. Jawadhiya, Mangesh M. Ghonge, and


M.S. Ali, A Survey of Mobile Ad Hoc Network
Attacks, International Journal of Engineering
Science and Technology, Vol. 2(9), pp. 0975-5462,
2010.

[10] Gunhee Lee, Dong-kyoo Kim, Jungtaek Seo, An


Approach to Mitigate Wormhole Attack in Wireless
Ad Hoc Networks, International Conference on
Information Security and Assurance (ISA 2008), pp.
220-225, April 2008.

[15] Karim El Defrawy, Gene Tsudik, Anonymous


Location-Aided Routing in Suspicious MANETs, IEEE
Transactions On Mobile
Computing,, Vol. 10, pp.
1536-1233, September 2011.
[16] H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato,
A survey on trust and reputation management systems
in wireless communications, Proceedings of the IEEE,
vol. 98, pp. 17551772, 2010.
[17] J. H. Cho, A. Swami, and I. R. Chen, A survey on
trust management for mobile ad hoc networks, IEEE
Communications Surveys and Tutorials, vol. 13, pp.
562583, 2011.
[18] Ritu Patidar, Dinesh Chandra Jain, Solving the
Hidden Terminal problems Using Directional-Antenna
Based MAC Protocol for Wireless Adhoc Networks,
International Journal of Advanced Research in
Computer Science and Software Engineering, Vol. 2, pp.
2277 128X, may 2012.
[19] Loay Abusalah, Ashfaq Khokhar, and Mohsen
Guizani, A Survey of Secure Mobile Ad Hoc Routing
Protocols, IEEE Communications Surveys & Tutorials,
Vol. 10, pp. 1553-877X, 2008.

[11] Pallavi Sharma, Aditya Trivedi, An Approach to


Defend Against Wormhole Attack in Ad Hoc
Network Using Digital Signature, 2011 IEEE 3rd
International Conference on Communication
Software and Networks (ICCSN), pp. 307-311, May
2011.
[12] Muhammad Zeshan, Shoab A. Khan, Ahmad Raza
Cheema, Attique Ahmed, Adding Security Against
Packet Dropping Attack in Mobile Ad hoc
Networks, International Seminar on Future
Information
Technology
and
Management
Engineering(FITME '08), pp. 568-572, Nov 2008.
[13] D. Boneh, X.Boyen. and H. Shacham, Short group
signatures, in proc. Int. Cryptology Conf.
(CRYPTO04), Aug. 2004.
[14] Wei Lui and Ming Yu, Authenticated Anonymous
Secure Routing for MANET in Adversarial
Environment, IEEE Transaction on vehicular
Technology, March 2014.
240
www.ijete.org

You might also like