A Case Study on Mobile Adhoc Network Security for Hostile Environment

A mobile adhoc network (MANET) is a peer to peer wireless network where nodes can communicate with each other without infrastructure. Due to this nature of MANET; it is possible that there could be some malicious and selfish nodes that try to compromise the routing protocol functionality and makes MANET vulnerable to Denial of Service attack in military communication environments. Hence security is an important challenge while deploying MANET. This research effort examines the case study for a Layerwise Security (LaySec) framework that provides security for an ad-hoc network operating in a military environment. LaySec incorporates three security features (Secure neighbor authentication and Layerwise Security techniques and multipath routing) into its framework while maintaining network performance sufficient to operate in hostile environment. layerwise security protocol has been implemented and simulated on Qualnet 5.0. Based on the simulation result, it is observed that the proposed approach has shown better results in terms of Quality of Service parameters like Average packet delivery ratio, Average throughput, Average end to end delay and Routing Overhead.

[1]  Om Prakash Vyas,et al.  Performance of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks: A Comparative Study , 2009 .

[2]  Kamanashis Biswas,et al.  Security Threats in Mobile Ad Hoc Network , 2007 .

[3]  Hyuk Lim,et al.  Secure Framework for Multipath Multimedia Streaming over Wireless Ad Hoc Network , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[4]  Muhammad Junaid,et al.  Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol , 2007 .

[5]  P. Chenna Reddy,et al.  Performance Analysis of Adhoc Network Routing Protocols , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.

[6]  J. Kaiser,et al.  Survey of mobile ad hoc network routing protocols , 2005 .

[7]  R. B. Patel,et al.  Mobile Ad hoc Networks: Challenges and Future , 2007 .

[8]  K. H. Wandra,et al.  Survey on Mobile Ad Hoc Network Routing Protocols , 2014 .

[9]  V. R. Sarma Dhulipala,et al.  Throughput and Delay Comparison of MANET Routing Protocols , 2009 .

[10]  Nishu Garg,et al.  MANET Security Issues , 2009 .

[11]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[12]  Stephen D. Wolthusen Exploiting UAVs' Capabilities in Tactical MANETS , 2008 .

[13]  Hung-Chin Jang,et al.  Rescue information system for earthquake disasters based on MANET emergency communication platform , 2009, IWCMC.

[14]  D Devi Aruna,et al.  Layerwise security framework with snauthspmaodv to defend denial of service attack for mobile adhoc networks in hostile environment , 2012 .

[15]  Luca Veltri,et al.  SIP security issues: the SIP authentication procedure and its processing load , 2002, IEEE Netw..

[16]  Girish Katkar,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.