Abstract
Security for network services is a prevalent requirement against fraudulent access to the conveniences in WMN. A secure communication is indispensable for stopping the unauthorized access to the network services in wireless technology. A number of researchers have proposed various security schemes but most of them are vulnerable against several performance metrics i.e. security threats (black hole and grey hole attack), low packet delivery ratio (PDR), increased packet loss ratio (PLR) and reduced throughput. A secure routing protocol is needed in order to get rid of such precincts. In previous paper, Secured Authentication and Signature Routing (SASR) protocol proposed a secure signature routing protocol which provides the communication using Diffie Hellman and threshold signature. In this manuscript, SASR is enhanced with AV-SASR (Advanced Version of SASR) by modifying AODV (MAODV) protocol which is robust against black hole and grey hole attack. Further network metrics are measured in terms of PDR, PLR and throughput in comparison of SAODV and SEAODV. The analysis is done over both the scenarios i.e. with the involvement of malicious node and without involvement of malicious nodes.
Similar content being viewed by others
References
Akyildiz IF, Wang X (2005) A survey on wireless mesh networks. IEEE Commun Mag 43:23–30
Bicket J, Aguayo D, Biswas S, Morris R (2005) Architecture and evaluation of an unplanned 802.11b mesh network. In: Proceedings of 11th conference o mobile computing and networking, New York, vol 1, pp 31–42
Mir S, Pirzada A, Portmann M (2008) HOVER: hybrid on-demand distance vector routing for wireless mesh networks. In: Proceedings of the thirty-first Australasian conference on computer science, Australian Computer Society, pp 63–71
Khan K, Muhammad A (2006) Authentication in multi-hop wireless mesh networks. In: Transactions on engineering, computing and technology, pp 178–183
Lin X, Ling X, Zhu H, Ho P, Shen X (2008) A novel localized authentication scheme in IEEE 802.11 based wireless mesh networks. Int J Secur Netw 3:122–132
Rathee G, Rakesh N (2013) Resilient packet transmission for buffer base routing protocol. J Inf Process Syst. doi:10.3745/JIPS.03.0014
Zapata MG (2008) Secure routing in wireless mesh networks, security in wireless mesh networks. CRC Press, New York
Lu S, Li L, Lam KY, Jia L (2009) SAODV: a MANET routing protocol that can withstand black hole attack. In: IEEE international conference on computational intelligence, pp 421–425
Asherson S, Hutchison A (2006) Secure routing in wireless mesh networks. In: Proceedings southern African telecommunication networks and applications conference, Spier Wine Estate, Stellenbosch, South Africa (2006)
Li C, Wang Z, Yang C (2010) SEAODV: a security enhanced AODV routing protocol for wireless mesh networks. In: Transactions on computational science XI. Springer, Berlin, Heidelberg, pp 1–16
Cai J, Yi P, Chen J, Wang Z, Liu N (2010) An adaptive approach to detecting black and gray hole attacks in ad hoc network. In: 24th IEEE international conference on advanced information networking and applications (AINA), pp 775–780
Baumann R, Heimlicher S, Lenders V, May M (2007) HEAT: scalable routing in wireless mesh networks using temperature fields. In: IEEE international symposium on world of wireless, mobile and multimedia networks, WoWMoM, pp 1–9
Rathee G, Mundra A, Rakesh N (2013) Buffered based routing and resiliency approach for WMN. In: IEEE international conference on human computer interactions, Chennai, India, pp 1–7
Rathee G, Saini H, Ghrera SP (2016) Secured authentication and signature routing protocol for WMN (SASR). In: Proceedings of the second international conference on computer and communication technologies. Springer India, pp 327–336
Chakeres ID, Belding E (2004) AODV routing protocol implementation design. In: Proceedings of 24th international conference on distributed computing systems workshops, pp 698–703
Subramanian A, Buddhikot M, Miller S (2006) Interference aware routing in multi-radio wireless mesh networks. In: 2nd IEEE workshop on wireless mesh networks, pp 55–63
Tseng YM (2009) USIM-based EAP-TLS authentication protocol for wireless local area networks. J Comput Stand Interfaces 31:128–136
Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H (2004) Extensible authentication protocol (EAP), RFC No. 3748
Kassab M, Belghith A, Bonnin J, Sassi S (2005) Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. In: Proceedings of the 1st ACM workshop on wireless multimedia networking and performance modeling, pp 46–53
Zhu S, Xu S, Setia S, Jajodia S (2003) LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks. In: Proceedings of 23rd international conference on distributed computing systems workshops, pp 749–755
Miller SP, Neuman BC, Schiller JI, Saltzer JH (1987) Kerberos authentication and authorization system. In: Project athena technical plan
Debiao H, Jianhua C, Jin H (2012) An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. J Inf Fusion 13:223–230
Prasad N, Alam M, Ruggieri M (2004) Light-weight AAA infrastructure for mobility support across heterogeneous networks. J Wirel Pers Commun 29:205–219
Shaw WT, Wong SW, Cheng N, Balasubramanian K, Zhu X, Maier M, Kazovsky LG (2007) Hybrid architecture and integrated routing in a scalable optical–wireless access network. J Lightwave Technol 25:3443–3451
Passos D, Teixeira DV, Muchaluat DC, Magalhaes LCS, Albuquerque C (2006) Mesh network performance measurements. In: International information and telecommunications technologies symposium, pp 48–55
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rathee, G., Saini, H. Modified AODV (MAODV) Against Black Hole in WMN. Proc. Natl. Acad. Sci., India, Sect. A Phys. Sci. 88, 339–350 (2018). https://doi.org/10.1007/s40010-017-0399-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40010-017-0399-9