CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks

Mobile Adhoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of established infrastructure. Mobile Adhoc network are vulnerable to attacks compared to wired networks due to limited physical security, volatile network topologies, power-constrained operations, intrinsic requirement of mutual trust among all nodes. During deployment, security emerges as a central requirement due to many attacks that affects the performance of the ad hoc networks. Particularly Black hole attack is one such severe attack against ad hoc routing protocols which is a challenging one to defend against. The proposed model combines the On demand routing protocol DSR with CCMP-AES mode to defend against black hole attack and it also provides confidentiality and authentication of packets in both routing and link layers of MANET. The primary focus of this work is to provide security mechanisms while transmitting data frames in a node to node manner. The security protocol CCMP-AES working in data link layer keeps data frame from eavesdropping, interception, alteration, or dropping from unauthorized party along the route from the source to the destination. The simulation is done for different number of mobile nodes using network simulator qualnet 5.0. The proposed model has shown better results in terms of Total bytes received, packet delivery ratio, throughput, End to End delay and Average jitter.

[1]  N. Bhalaji,et al.  Association between nodes to combat blackhole attack in DSR based MANET , 2009, 2009 IFIP International Conference on Wireless and Optical Communications Networks.

[2]  Gopinath Ganapathy,et al.  Performance Comparison of Mobile Ad-hoc Network Routing Protocol , 2007 .

[3]  D. Whiting IEEE P802.11 Wireless LANs, AES Encryption & Authentication Using CTR Mode & CBC-MAC , 2000 .

[4]  P. Chenna Reddy,et al.  Performance Analysis of Adhoc Network Routing Protocols , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.

[5]  Mehdi Dehghan,et al.  Upgrading Performance of DSR Routing Protocol in Mobile Ad Hoc Networks , 2005, WEC.

[6]  Muhammad Junaid,et al.  Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol , 2007 .

[7]  Stefan Schlott,et al.  Secure Dynamic Source Routing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[8]  Qinghua Li,et al.  Secure dynamic source routing protocol , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[9]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[10]  M. Neelakantappa,et al.  Performance Improvement Techniques for Dynamic Source Routing Protocol in Mobile Ad Hoc Networks , 2009 .

[11]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[12]  M. Masum,et al.  Modification of DSR and its implementation in Ad Hoc City , 2007, 2007 10th international conference on computer and information technology.

[13]  Bharat K. Bhargava,et al.  Study of distance vector routing protocols for mobile ad hoc networks , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[14]  Rajendra V. Boppana,et al.  Analysis of the Dynamic Source Routing Protocol for Ad Hoc Networks , 2005 .