Open Access Open Access  Restricted Access Subscription Access

A Security Assessment Framework for Routing and Authentication Protocols of Mobile Ad-Hoc Networks


Affiliations
1 Military College of Telecommunication Engineering, Mhow, India
2 Swami Vivekanand College of Engineering, Indore, India
 

Security assessment of routing and authentication protocols is based on the comparison of basic and secured versions of protocols such as AODV, SAODV, DSDV, SEAD, ZRP, SRP, LHAP, HEAP etc. In this paper, a framework for security assessment is presented. It is a complete system that attempts to provide the promised services to each user or application. To assess the security of different protocols, a security index is assigned. The value of security index shows how much a protocol is secured. To assign the security index, security parameters have been found out and the performance of different protocols have been analyzed under normal condition, Black Hole attack, Wormhole attack, and DoS attack.

Keywords

Routing, Authentication, Framework, Security Index, Performance Index.
User
Notifications
Font Size

  • A. Y. Zomaya, Algorithms and protocols for Wireless and Mobile Ad-hoc Networks: A Taxonomy of Routing Protocols for Mobile Ad Hoc Networks,(John Wiley Canada2009).
  • M. Soni, and B. K. Joshi, Security Assessment of Routing Protocols in Mobile Ad-hoc Networks, Proceeding of the International Conference on ICT in Business, Industry and Government, Indore, India, 2016, 24
  • M. Soni, and B. K. Joshi, Security Assessment of SAODV Protocols in Mobile Ad-hoc Networks. Proceeding of the International Symposium Data Science and Big Data Analytics, Indore, India, 2018, 347-355.
  • R. Akbani, T. Korkmaz, and G.V.S. Raju, HEAP: Hop-by-hop Efficient Authentication Protocol for Mobile Ad-hoc Networks, Proceedings of the Spring Simulation Multi conference, Virginia, USA, 2007, 157-165.
  • M. Soni, and B. K. Joshi, Security Assessment of Authentication Protocols in Mobile Ad hoc Networks, International Journal of Computer Science and. Information Security,19(5), 2021, 36-40.
  • S. Kaur, and A. Gupta, A Review On Different Secure Routing Protocols And Security Attacks In Mobile Ad Hoc Networks, International Journal of Advance Engineering Technology5(4), 2014,01-05.
  • Argyroudis P. G. and O’Mahony D., Secure Routing For Mobile Ad Hoc Networks, IEEE Journal on Communications Surveys & Tutorials,7(3), 2005, 2-21.
  • Shawkat, K. and Saaid G. O. S., Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks, International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 2012, 710-716.
  • A. Mohamed, Abdelshafy and P. J.B. King, AODV and SAODV under Attack Performance Comparison, Proceeding of 13th International Conference on Ad-Hoc Networks and Wireless ADHOC-NOW, Benidorm, Spain, 2014, 318-331
  • P. Singh, N. Mann and T.G. Kaur, Study the impact of different attacks on Zone routing protocol in MANET. International Journal of Modern Computer Science and Applications, 4(3), 2016, 14-17.
  • M. C. Trivedi, S. Yadav, and V. K. Singh, Securing ZRP Routing Protocol Against D DoS Attack in Mobile Ad Hoc Network, Proceeding of International Conference on Data and Information Systems, Singapore, 2019, 387-394.
  • A. Saini and Anu, Analysis of Security Attacks and Solution on Routing Protocols in MANETs, International Journal of Computer Science and Mobile Compting, 5(6), 2016, 182-189.
  • M. F. Juwad and H. S. Al- Raweshidy, Experimental Performance Comparisons between SAODV & AODV, Proceeding of the 2nd Asia International Conference on Modeling & Simulation, Kuala Lumpur, Malaysia, 2008, 247-252.
  • S. M. Basha, S. R. Kumar, and R.V. Matam, Inclusive performance scrutiny of DSDV AODV and ZRP MANETs Routing Protocols, International Journal of Advanced Computer Technology, 2(5), 2014, 31-42.
  • Ashwin Perti, Evaluate Dynamic Source Routing Protocol Performance in Wireless MANET, Int. J. Advanced Networking and Applications, 5(5) , 2016, 2056-2059.
  • Nitish Balachandran, Surveying Solutions to Securing On-Demand Routing Protocols in MANETs, Int. J. Advanced Networking and Applications, 4(1), 2012, 1486-1491

Abstract Views: 208

PDF Views: 0




  • A Security Assessment Framework for Routing and Authentication Protocols of Mobile Ad-Hoc Networks

Abstract Views: 208  |  PDF Views: 0

Authors

Brijendra Kumar Joshi
Military College of Telecommunication Engineering, Mhow, India
Megha Soni
Swami Vivekanand College of Engineering, Indore, India

Abstract


Security assessment of routing and authentication protocols is based on the comparison of basic and secured versions of protocols such as AODV, SAODV, DSDV, SEAD, ZRP, SRP, LHAP, HEAP etc. In this paper, a framework for security assessment is presented. It is a complete system that attempts to provide the promised services to each user or application. To assess the security of different protocols, a security index is assigned. The value of security index shows how much a protocol is secured. To assign the security index, security parameters have been found out and the performance of different protocols have been analyzed under normal condition, Black Hole attack, Wormhole attack, and DoS attack.

Keywords


Routing, Authentication, Framework, Security Index, Performance Index.

References