Skip to main content
Log in

Abstract

Security for network services is a prevalent requirement against fraudulent access to the conveniences in WMN. A secure communication is indispensable for stopping the unauthorized access to the network services in wireless technology. A number of researchers have proposed various security schemes but most of them are vulnerable against several performance metrics i.e. security threats (black hole and grey hole attack), low packet delivery ratio (PDR), increased packet loss ratio (PLR) and reduced throughput. A secure routing protocol is needed in order to get rid of such precincts. In previous paper, Secured Authentication and Signature Routing (SASR) protocol proposed a secure signature routing protocol which provides the communication using Diffie Hellman and threshold signature. In this manuscript, SASR is enhanced with AV-SASR (Advanced Version of SASR) by modifying AODV (MAODV) protocol which is robust against black hole and grey hole attack. Further network metrics are measured in terms of PDR, PLR and throughput in comparison of SAODV and SEAODV. The analysis is done over both the scenarios i.e. with the involvement of malicious node and without involvement of malicious nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Akyildiz IF, Wang X (2005) A survey on wireless mesh networks. IEEE Commun Mag 43:23–30

    Article  MATH  Google Scholar 

  2. Bicket J, Aguayo D, Biswas S, Morris R (2005) Architecture and evaluation of an unplanned 802.11b mesh network. In: Proceedings of 11th conference o mobile computing and networking, New York, vol 1, pp 31–42

  3. Mir S, Pirzada A, Portmann M (2008) HOVER: hybrid on-demand distance vector routing for wireless mesh networks. In: Proceedings of the thirty-first Australasian conference on computer science, Australian Computer Society, pp 63–71

  4. Khan K, Muhammad A (2006) Authentication in multi-hop wireless mesh networks. In: Transactions on engineering, computing and technology, pp 178–183

  5. Lin X, Ling X, Zhu H, Ho P, Shen X (2008) A novel localized authentication scheme in IEEE 802.11 based wireless mesh networks. Int J Secur Netw 3:122–132

    Article  Google Scholar 

  6. Rathee G, Rakesh N (2013) Resilient packet transmission for buffer base routing protocol. J Inf Process Syst. doi:10.3745/JIPS.03.0014

    Google Scholar 

  7. Zapata MG (2008) Secure routing in wireless mesh networks, security in wireless mesh networks. CRC Press, New York

    Google Scholar 

  8. Lu S, Li L, Lam KY, Jia L (2009) SAODV: a MANET routing protocol that can withstand black hole attack. In: IEEE international conference on computational intelligence, pp 421–425

  9. Asherson S, Hutchison A (2006) Secure routing in wireless mesh networks. In: Proceedings southern African telecommunication networks and applications conference, Spier Wine Estate, Stellenbosch, South Africa (2006)

  10. Li C, Wang Z, Yang C (2010) SEAODV: a security enhanced AODV routing protocol for wireless mesh networks. In: Transactions on computational science XI. Springer, Berlin, Heidelberg, pp 1–16

  11. Cai J, Yi P, Chen J, Wang Z, Liu N (2010) An adaptive approach to detecting black and gray hole attacks in ad hoc network. In: 24th IEEE international conference on advanced information networking and applications (AINA), pp 775–780

  12. Baumann R, Heimlicher S, Lenders V, May M (2007) HEAT: scalable routing in wireless mesh networks using temperature fields. In: IEEE international symposium on world of wireless, mobile and multimedia networks, WoWMoM, pp 1–9

  13. Rathee G, Mundra A, Rakesh N (2013) Buffered based routing and resiliency approach for WMN. In: IEEE international conference on human computer interactions, Chennai, India, pp 1–7

  14. Rathee G, Saini H, Ghrera SP (2016) Secured authentication and signature routing protocol for WMN (SASR). In: Proceedings of the second international conference on computer and communication technologies. Springer India, pp 327–336

  15. Chakeres ID, Belding E (2004) AODV routing protocol implementation design. In: Proceedings of 24th international conference on distributed computing systems workshops, pp 698–703

  16. Subramanian A, Buddhikot M, Miller S (2006) Interference aware routing in multi-radio wireless mesh networks. In: 2nd IEEE workshop on wireless mesh networks, pp 55–63

  17. Tseng YM (2009) USIM-based EAP-TLS authentication protocol for wireless local area networks. J Comput Stand Interfaces 31:128–136

    Article  Google Scholar 

  18. Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H (2004) Extensible authentication protocol (EAP), RFC No. 3748

  19. Kassab M, Belghith A, Bonnin J, Sassi S (2005) Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. In: Proceedings of the 1st ACM workshop on wireless multimedia networking and performance modeling, pp 46–53

  20. Zhu S, Xu S, Setia S, Jajodia S (2003) LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks. In: Proceedings of 23rd international conference on distributed computing systems workshops, pp 749–755

  21. Miller SP, Neuman BC, Schiller JI, Saltzer JH (1987) Kerberos authentication and authorization system. In: Project athena technical plan

  22. Debiao H, Jianhua C, Jin H (2012) An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. J Inf Fusion 13:223–230

    Article  Google Scholar 

  23. Prasad N, Alam M, Ruggieri M (2004) Light-weight AAA infrastructure for mobility support across heterogeneous networks. J Wirel Pers Commun 29:205–219

    Article  Google Scholar 

  24. Shaw WT, Wong SW, Cheng N, Balasubramanian K, Zhu X, Maier M, Kazovsky LG (2007) Hybrid architecture and integrated routing in a scalable optical–wireless access network. J Lightwave Technol 25:3443–3451

    Article  ADS  Google Scholar 

  25. Passos D, Teixeira DV, Muchaluat DC, Magalhaes LCS, Albuquerque C (2006) Mesh network performance measurements. In: International information and telecommunications technologies symposium, pp 48–55

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hemraj Saini.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rathee, G., Saini, H. Modified AODV (MAODV) Against Black Hole in WMN. Proc. Natl. Acad. Sci., India, Sect. A Phys. Sci. 88, 339–350 (2018). https://doi.org/10.1007/s40010-017-0399-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40010-017-0399-9

Keywords

Navigation