Enhanced Security in MANETs Using AODV Protocol

被引:0
作者
Gupta S. [1 ]
Singla S. [2 ]
Sharma P. [3 ]
机构
[1] Chitkara University, Punjab, Rajpura
[2] Department of Computer Science and Engineering, UIE, Chandigarh University, Punjab, Mohali
[3] ASET, Amity University Uttar Pradesh, Noida
关键词
AODV; EPDA attack; IPDA attack; MANET;
D O I
10.1007/s40031-024-01103-1
中图分类号
学科分类号
摘要
This research study introduces an innovative security approach for MANETs to use with the AODV (Adhoc On-Demand Distance Vector) routing protocol, which can protect against attacks like the explicit packet-dropping assault and the implicit packet-dropping attack. The first iteration of the AODV routing protocol had no safeguards in place. As a result, it can’t defend itself against any kind of cyberattack. There are several safeguards available, therefore AODV is completely safe. Attackers in a network can be reduced using the same detection technologies that can find them. The topic was investigated further, and a catastrophic fault in all current safe routing techniques was discovered. Thus, present security measures are labor-intensive and call for an intricate key-management architecture. Using digital signatures and a hash chain, we introduce a new approach to protecting the AODV routing system in this study. This method protects itself from untrusted or malicious nodes with minimum performance hits. © The Institution of Engineers (India) 2024.
引用
收藏
页码:327 / 338
页数:11
相关论文
共 31 条
[1]  
Perkin C.E., Royer E.M., Ad-hoc on-demand distance vector routing, In Proceedings of 2Nd IEEE Workshop on Mobile Computer Systems and Applications, (1999)
[2]  
Chhari V., Singh R., Dhakad S.S., Enhanced and more secure AODV routing protocol to avoid black hole attack in MANET, Int. J. Urb. Des. Ubiquitous Comput, 2, 2, pp. 13-24, (2014)
[3]  
Shakshuki E.M., Kang N., Sheltami T.R., EAACK—a aecure intrusion-detection system for MANETs, IEEE Transactions on Industrial Electronics, 60, 3, pp. 1089-1098, (2013)
[4]  
Bhatia T., Verma A.K., Security issues in MANET: a survey on attacks and defense mechanisms, Int. J. Adv. Res. Comput. Sci. Softw. Eng, 3, 6, pp. 1382-1394, (2013)
[5]  
Gupta S., Shahid M., Goyal A., Saxena R.K., Saluja K., Black hole detection and prevention using digital signature and SEP in MANET, 2022 10Th International Conference on Emerging Trends in Engineering and Technology-Signal and Information Processing (ICETET-SIP-22), pp. 1-5, (2022)
[6]  
Agrawal J., Kapoor M., A comparative study on geographic-based routing algorithms for flying ad-hoc networks, Concurr. Comput. Pract. Exp, 33, 16, (2021)
[7]  
Rani S., Ahmed S.H., Multi-hop routing in wireless sensor networks: an overview, taxonomy, and research challenges, (2015)
[8]  
Aashkaar M., Sharma P., Enhanced energy-efficient AODV routing protocol for MANET, Paper Presented at the International Conference on Research Advances in Integrated Navigation Systems, RAINS, (2016)
[9]  
Yadav A.K., Sharma P., Yadav R.K., A novel algorithm for wireless sensor network routing protocols based on reinforcement learning, Int. J. Syst. Assur. Eng. Manag, 13, pp. 1198-1204, (2022)
[10]  
Abdullah A., Ramly N., Muhammed A., Derahman M.N., Performance comparison study of routing protocols for mobile grid environment, Int. J. Comput. Sci. Netw. Secur, 8, 2, pp. 82-88, (2008)