12 research outputs found

    Predictive preemptive certificate transfer in Cluster-Based Certificate Chain

    Get PDF
    Mobile ad hoc networks are a set of nodes that cooperate and communicate wirelessly. This kind of networks in easy to deploy because there is no need of any pre-existing infrastructure. Security in Manets is a very important issue and it is hard to use conventional security techniques. Many approaches have been proposed to secure communication in Manets; most of them are based of public-key certifications which create a multitude of trust communication model.In this paper, we propose an amelioration of a distributed certificate chain that relies on the cluster based routing protocol. In our scheme, after forming clusters, the cluster-head node issue certificates for other nodes within its cluster. When a member node want migrates to an adjacent cluster, the cluster-head sends the node’s certificate to surrounding cluster-heads via gateway nodes. The protocol was doted by a preemptive predictive module to predict migration intention of member nodes. This approach has been evaluated by detailed simulation study. Simulation results show that this approach is scalable and generate lower certification overhead

    Detection and Prevention of Blackhole Attack in the AOMDV Routing Protocol

    Get PDF
    Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as a host and router. Mobile ad-hoc networks are characterized by the lack of preexisting infrastructures or centralized administration. So, they are vulnerable to several types of attacks, especially the Blackhole attack. This attack is one of the most serious attacks in this kind of mobile networks. In this type of attack, the malicious node sends a false answer indicating that it has the shortest path to the destination node by increasing the sequence number and decreasing the number of hops. This will have a significant negative impact on source nodes which send their data packets through the malicious node to the destination. This malicious node drop received data packets and absorbs all network traffic. In order overcome this problem, securing routing protocols become a very important requirement in mobile ad-hoc networks. Multipath routing protocols are among the protocols affected by the Blackhole attack. In this paper, we propose an effective and efficient technique that avoids misbehavior of Blackhole nodes and facilitates the discovery for the most reliable paths for the secure transmission of data packets between communicating nodes in the well-known Ad hoc On-demand multi-path routing protocol (AOMDV). We implement and simulate our proposed technique using the ns 2.35 simulator. We also compared on how the three routing protocols AOMDV, AOMDV under Blackhole attack (BHAOMDV), and the proposed solution to counter the Blackhole attack (IDSAOMDV) performs. The results show the degradation on how AOMDV under attack performs, it also presents similarities between normal AOMDV and the proposed solution by isolating misbehaving node which has resulted in increase the performance metrics to the standard values of the AOMDV protocol

    Link Quality and MAC-Overhead aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad hoc Networks

    Get PDF
    In Ad Hoc networks, route failure may occur due to less received power, mobility, congestion and node failures. Many approaches have been proposed in literature to solve this problem, where a node predicts pre-emptively the route failure that occurs with the less received power. However, these approaches encounter some difficulties, especially in scenario without mobility where route failures may arise. In this paper, we propose an improvement of AOMDV protocol called LO-PPAOMDV (Link Quality and MAC-Overhead aware Predictive Preemptive AOMDV).  This protocol is based on new metric combine two routing metrics (Link Quality, MAC Overhead) between each node and one hop neighbor. Also we propose a cross-layer networking mechanism to distinguish between both situations, failures due to congestion or mobility, and consequently avoiding unnecessary route repair process. The LO-PPAOMDV was implemented using NS-2. The simulation results demonstrate the merits of our proposed LO-PPAOMDV with approximately 10-15% increase in the packet delivery ratio while average end-to-end delay is reduced by 20%, and normalized routing load is reduced about 45%, also with 7% increase in the throughput, when compared with PPAOMDV

    Network Life Time maximization of the AOMDV Protocol Using Nodes Energy Variation

    Get PDF
    Mobile ad hoc network presents generally several challenges such as high dynamic topology, packet loss and frequent routes discovering that result in low throughput and reduced packet delivery ratio. To reduce the number of route discovering process, multipath routing protocols makes use of alternate paths to continue packets transmission. Ad Hoc On-demand, multipath distance vector routing protocol or AOMDV, is one of the well-known multipath protocols that relays on the hop count metric to route packets. However maintaining disjoint active routes can reduce nodes life time and lead to more control messages like error and discovering packets. In this paper, a pre-emptive approach is proposed based on the historical values of nodes energy. Nodes that excessively consume energy in time are considered overloaded and are excluded from route discovering, hence nodes with reduced energy variation are selected to route packets. Simulation results show reduced number of dead nodes by 30 %, overhead by 16%

    Coherent Route Cache In Dynamic Source Routing For Ad Hoc Networks

    No full text
    Ad hoc network is a set of nodes that are able to move and can be connected in an arbitrary manner. Each node acts as a router and communicates using a multi-hop wireless links. Nodes within ad hoc networks need efficient dynamic routing protocols to facilitate communication. An Efficient routing protocol can provide significant benefits to mobile ad hoc networks, in terms of both performance and reliability. Several routing protocols exist allowing and facilitating communication between mobile nodes. One of the promising routing protocols is DSR (Dynamic Source Routing). This protocol presents some problems. The major problem in DSR is that the route cache contains some inconsistence routing information; this is due to node mobility. This problem generates longer delays for data packets. In order to reduce the delays we propose a technique based on cleaning route caches for nodes within an active route. Our approach has been implemented and tested in the well known network simulator GLOMOSIM and the simulation results show that protocol performance have been enhanced

    DISTRIBUTED CERTIFICATE AUTHORITY IN CLUSTER-BASED MANET USING MULTI SECRET SHARING SCHEME

    No full text
    Providing secure communications in mobile ad hoc networks (MANET) is an important and difficult problem, due to a lack of a key management infrastructure. The authentication is an important security service in (MANETs). To provide a node authentication service we use a fully distributed certificate authorities (FDCA) based on the threshold cryptography. In this paper we propose an efficient and verifiable multi secret sharing scheme in cluster-based MANET with a low computation system. Our scheme is based on the overdetermined linear system equation in Galois fields GF(2r). We have analyzed our scheme based on security and performance criteria, and compared with existing approaches. The efficiency of our proposed schemes was verified and evaluated by simulation. Simulation results show that this approach is scalable

    A energy-conserving predictive preemptive multipath routing protocol for adhoc networks: a lifetime improvement

    No full text
    Mobile device are widely used today in MANETs, due to their rich functionality. However, route failure may occur due to lower receive signal strength, mobility, congestion and device failures. Also, the battery life of these devices is very limited and deploying high resource consuming applications such as streaming on these mobile devices, is a challenging task. It is extremely important to efficiently use of the contained resources on these devices when they participate in a mobile ad hoc network. In this paper, we propose an optimization of the cross-layer networking mechanism. Our work focuses on MAC and routing layers of the OSI stack. We propose a cooperation of the routing layer with the MAC layer power-control technique to decrease the energy consumption in transmission within adhoc networks. We propose an energy-conserving multipath routing protocol for adhoc networks lifetime improvement protocol called E-PPAOMDV (Energy aware Predictive Preemptive AOMDV). This protocol is based on new metric to preserves the residual energy of nodes and balances the consumed energy to increase the network lifetime. Also, we propose a mechanism based on Newton interpolation, to distinguish between both situations, failures due to congestion or mobility, and consequently avoiding unnecessary route repair process. The E-PPAOMDV was implemented using NS-2. The simulation results demonstrate the merits of our proposed E-PPAOMDV. Our proposal improves the performance of mobile ad hoc networks by extending the lifetime of the network and decreasing the average consumed energy with approximately 1 to 3%, while the average end-to-end delay is reduced by 33%, normalized routing load by 20 to 27%; also, increasing the packet delivery ratio with approximately 2-10%  and the throughput with 5%  when compared with AOMR-LM

    Channel Busyness Based Multipath Load Balancing Routing Protocol for Ad hoc Networks

    No full text
    corecore