IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 3 (Nov. - Dec. 2012), PP 09-14 www.iosrjournals.org www.iosrjournals.org 9 | Page Active Source routing protocol in Mobile Network Anamika Bhushan 1, Divya Gupta 2, Anil Kumar 3 1,2,3 B-Tech Final Year, Department of Computer Science and Engi neering, Institute of Technology And Management, GIDA, Gorakhpur, India. Abstract: The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multi-hop wireless network with frequently changing topology. To effectively cope with arbitrary malicious disruption of data transmissions, we propose and evaluate the secure message transmission (SMT) protocol and its alternative, the secure single-path (SSP) protocol. Among the salient features of SMT and SSP is their ability to operate solely in an end-to-end manner and without restrictive assumptions on the network trust and security associations. As a result, the protocols are applicable to a wide range of network architectures. We demonstrate that highly reliable communication can be sustained with small delay and small delay variability, even when a substantial portion of the network nodes systematically or intermittently disrupt communication. SMT and SSP robustly detect transmission failures and continuously configure their operation to avoid and tolerate data loss, and to ensure the availability of communication. This is achieved at the expense of moderate transmission and routing overhead, which can be traded off for delay. Overall, the ability of the protocols to mitigate both malicious and benign faults allows fast and reliable data transport even in highly adverse network environments. Keywords-Secure Message Transmission, Multi-path Routing, Secure Routing, Secure Routing Protocol , Fault tolerance, mobile ad hoc network (MANET) security, network security, secure data transmission. I. Introduction The Emerging technology of mobile ad hoc networking(MANET) is based on wireless multi-hop architecture without fixed infrastructure and prior configuration of the network nodes. The communication in mobile ad hoc networks comprises two phases, the route discovery and the data transmission. In an adverse environment, both phases are vulnerable to a variety of attacks. First, adversaries can disrupt the route discovery by impersonating the destination, by responding with stale or corrupted routing information, or by disseminating forged control traffic. This way, attackers can obstruct the propagation of legitimate route control traffic and adversely influence the topological knowledge of benign nodes. However, adversaries can also disrupt the data transmission phase and, thus, incur significant data loss by tampering with, fraudulently redirecting, or even dropping data traffic or injecting forged data packets. The salient features of this new networking paradigm include: 1) collaborative support of basic networking functions, such as routing and data transmission; 2) lack of administrative boundaries of the network nodes; 3) absence of a central entity in the network; and 4) transient, in general, associations of the network nodes. As a result, a node cannot make any assumption about the trustworthiness of its peers, which assist the node with its communication and, in general, does not possess their credentials. Securing the basic network operation becomes one of the primary concerns in ad hoc networks and, in fact, a prerequisite for reliable and quality-of-service (QoS) communication in adversarial environments. The challenge lies in securing communication and maintaining connectivity in the presence of adversaries, across an unknown, frequently changing multi-hop wireless network topology. To address this complex problem and provide comprehensive security, both phases of the communication, the route discovery and the data transmission, must be safeguarded. Recently, a number of works proposed secure routing mechanisms to defend against a range of attacks under different assumptions and system requirements [1][8]. However, secure routing protocols alone, which ensure the correctness of the route discovery, cannot guarantee secure and undisrupted delivery of data. In other words, a correct, up-to-date route cannot be considered automatically free of adversaries. An intelligent adversary can, for example, follow the rules of the route discovery, place itself on a route, and later start redirecting traffic, dropping, or forging and injecting data packets. Clearly, an adversary can hide its malicious behavior for a long period of time and strike at the least expected time. Thus, it is impossible to discover such an adversary prior to its attack. MANET routing, as well as secure routing protocols assume mechanisms, such as reliable data link layer and route maintenance, which were not designed for and cannot cope with malicious disruptions of the data transmission. Reliable transport protocols cannot address the problem either: an attacker can forge, for example, transmission control protocol (TCP) acknowledgment, while dropping data packets, misleading two communicating nodes that the data flow