Development and validation of a NS2 protocol for data security at network layer

NS2 is an event-driven, object-oriented simulation tool to simulate and analyze dynamic nature of communication networks; it is also a powerful tool to develop new protocols and functions. NS-2 is an open source and very popular network simulation tool. It provides support for OSI or TCP/IP protocols stack and many standard routing and application protocols for wire and wireless networks. In NS2, many protocols have been implemented so far at various layer of TCP/IP protocol suite to provide different functions, but none provides security functions. Although, some applications require security (Encryption/Decryption and key exchange) implementation in NS-2. However, NS-2 does not provide these features till now. In this paper, we solve this issue by adding new security module or protocol in NS2. Security module helps us in key sharing as well as in implementation of encryption/decryption functions. We analyze the features of a security module in details; discuss the algorithms used, simulation process and implementation of a security module on the basis of NS2. Also, the simulation details of key sharing protocol and self-defined encryption/decryption protocol in wired network are introduced. NAM is used to display the process of simulation. The purpose of the module is to introduce encryption/decryption features with key sharing into network simulation program.

[1]  Christian Callegari,et al.  Design, development and validation of an NS2 module for dynamic LSP rerouting , 2006, 2006 11th International Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks.

[2]  Shijun Zhao,et al.  Simulation analysis of congestion control in WSN based on AQM , 2011, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC).

[3]  Vikas Sharma,et al.  Differentiated services with multiple random early detection algorithm using ns2 simulator , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[4]  Lei Xu,et al.  DYMO routing protocol research and simulation based on NS2 , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[5]  Guanghui Li,et al.  The research of routing algorithms based on NS2 in mobile ad hoc networks , 2011, 2011 IEEE 2nd International Conference on Software Engineering and Service Science.

[6]  Ruoshan Kong The Simulation for Network Mobility Based on NS2 , 2008, 2008 International Conference on Computer Science and Software Engineering.

[7]  William Stallings,et al.  Cryptography and network security , 1998 .

[8]  Suresh Kumar,et al.  Traffic pattern based performance comparison of two reactive routing protocols for Ad hoc networks using NS2 , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[9]  Jean-Luc Meunier,et al.  Pollen: using people as a communication medium , 2001, Comput. Networks.

[10]  P. Chenna Reddy,et al.  Performance Analysis of Adhoc Network Routing Protocols , 2006 .

[11]  Chris Xu,et al.  Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .

[12]  Yatao Yang,et al.  Protocols simulation and performance analysis in wireless network based on NS2 , 2011, 2011 International Conference on Multimedia Technology.

[13]  Hong Jiang,et al.  Simulation and Analysis of MAC Security Based on NS2 , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[14]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[15]  Asma Tuteja,et al.  Comparative Performance Analysis of DSDV, AODV and DSR Routing Protocols in MANET Using NS2 , 2010, 2010 International Conference on Advances in Computer Engineering.

[16]  N.M. Din,et al.  IPQit: An internet simulation kit based on NS2 , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[17]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[18]  Runcai Huang,et al.  Simulation and Analysis of MFlood Protocol in Wireless Network , 2008, 2008 International Symposium on Computer Science and Computational Technology.

[19]  Wang Jun,et al.  Application of NS2 in Education of Computer Networks , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.