© 2014, IJARCSMS All Rights Reserved 85 | P a g e
ISSN: 232 7782 (Online) 1
Computer Science and Management Studies
International Journal of Advance Research in
Volume 2, Issue 8, August 2014
Research Article / Survey Paper / Case Study
Available online at: www.ijarcsms.com
Securing AODV Protocol using Signature Based Techniques
Pratik Buchke
1
Department of IT
O.I.S.T.
Bhopal – India
Prof. Vineet Richharya
2
Department of CSE
LNCT
Bhopal – India
Abstract: In Ad hoc network all nodes are mobile and can be connected dynamically in an arbitrary manner. No default
router is available for routing. Since in an ad hoc network, a significant concern is the ability to route in the presence of
Byzantine failures which include nodes that drop, fabricate, modify, or mis-route packets in an attempt to disrupt the routing
service. As Byzantine fault occur in Ad-hoc On-Demand Distance Vector (AODV) protocol. In this paper, we propose three
methods for securing AODV protocol from Byzantine attacks by using Signature based techniques. These techniques are
CME (Combine Message Encryption), CEM (Combine Encrypted Message) and ASM (Aggregate Signature of Messages).
Finally, we compare our approach with AODV protocol. The results shown that the quality of service has been improved
based on three parameters (delay, network load and throughput).
Keywords: Ad-hoc; Networks; Protocols.
I. INTRODUCTION
Mobile ad-hoc wireless networks hold the promise of the future, with the capability to establish networks at anytime,
anywhere. These networks don’t rely on extraneous hardware which makes them an ideal candidate for rescue and emergency
operations. These networks are built, operated and maintained by its constituent wireless nodes. These nodes generally have a
limited transmission range and so each node seeks the assistance of its neighboring nodes in forwarding packets. In order, to
establish routes between nodes, which are farther than a single hop, specially configured routing protocols are engaged. The
unique feature of these protocols is their ability to trace routes in spite of a dynamic topology. These protocols can by far and
large be categorized into two main types: Reactive and Proactive [1]. The nodes in an ad-hoc network generally have limited
battery power and so active routing protocols endeavor to save upon the same, by discovering routes only when they are
essentially required. In contrast, proactive routing protocols establish and maintain routes at all instants of time, so as to avoid
the latency that occurs during new route discoveries. Both types of routing protocols require persistent cooperative behavior,
with intermediate nodes primarily contributing to the route development. Similarly each node, which practically acts like a
mobile router [1], has absolute control over the data that passes through it. In essence, the membership of any adhoc networks
indisputably calls for sustained depiction of benevolent behavior by all participating nodes. However, this is more than often
difficult to achieve in an open environment and so these networks are frequently attacked by malicious nodes, which may
originate internally or join externally. Two kinds of attacks can be launched against ad-hoc networks [2], Passive and Active. In
passive attacks the attacker does not disturb the routing protocol. It only eavesdrops upon the routing traffic and endeavors to
extract valuable information like node hierarchy and network topology from it. In active attacks, malicious nodes can disturb the
correct functioning of a routing protocol by modifying routing information, by fabricating false routing information, and by
impersonating other nodes[3].
Cryptographic mechanisms are commonly used to protect routing protocols by enforcing mutual trust relationships among
the wireless nodes [4]. Security in mobile ad-hoc wireless networks is a two-fold problem. One is the security of the routing
protocols that enable the nodes to communicate with each other and the second is the protection of the data that traverses the