Review on variants of Security aware AODV

Page 1

IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 3, 2013 | ISSN (online): 2321-0613

Review on variants of Security aware AODV 1

Jatin Baldania1 Prof. Jitendra Bhatia2 Alpha College of Engg and Technology , Khatraj, Ahmadabad 382 481, India 2 Nirma University of Science & Technology, Ahmadabad 382 481, India

Abstract— Mobile ad-hoc network (MANET) is very sensitive network to security due to challenging characteristic such as decentralization, dynamic changing topology, and neighbor based routing. All existing MANET protocol are simply trust their neighbor and make route through them due to neighbor based routing network is disturbed by malicious node or intruder. Trust calculation is challenging task due to computation complexity constraints in MANET. In this paper we have presented variants of trust based security protocol in an on demand distance vector routing protocol and also proposed new mechanism for Network coding with RSA based Encryption and Decryption in an AODV which will improve the security level of MANET with acceptable overhead limit.. I. INTRODUCTION Ad hoc networks are becoming central research area due to decentralization, mobility of node, temporary network life and neighbor based routing. However all features of ad hoc network make security and trust problem more serious. Traditional security mechanism for providing confidentiality, authentication and availability are not efficient in ad hoc networks where network nodes have limited communication bandwidth, CPU cycles, and memory and battery capacity. Ad hoc nodes are describing by minimum trust each other. This requires an efficient protocol for finding secure end-to-end routes, free of nontrusted nodes. Most of the work on routing security focus on the efficient use of digital signature or shared secret key or public key infrastructure to authenticate and confide data and routing headers. They always tend to find shortest path between source and destination irrespective of presence of malicious nodes in between. Earlier design extension of TAODV (trust embedded) secure routing protocol capable of withstanding with independent malicious node or multiple malicious node acting in collusion. This protocol use existence public key infrastructure for key generation (public key, private key) pair for every node to handling colluding attack using existing algorithm. Due to continuously trust calculation as well as this public key infrastructure of generating encryption and decryption can degrade the performance of protocol. To overcome this Problem, we have proposed new protocol that is Networking coding with RSA based encryption and decryption can take care of this problem. Network coding is a method of optimizing the flow of digital data in a network by transmitting digital evidence about messages. The “digital evidence” is itself, a composite of two or more messages. When the bits of digital evidence arrive at the destination, the transmitted message is deduced rather than directly reassembled. In a traditional packetswitched network, data flows is defined as discrete “pieces”

from the source to destination like corpuscles in the bloodstream. At the transmitting station, the outgoing message is broken into packets ,each of which contains some of the message data intact. The packets do not necessarily all travel along the same route but they all eventually arrive at the same destination, where the receiving computer reassembles them into the original message. The main problem with this method is that when the overall network traffic volume is high, resulting in long delay. But in case of network coding, instead of directing the packets towards their final destination, coders transmit metadata in the form digital evidence about the message along multiple paths simultaneously. Metadata arriving from two or more source may be combined into single packets. In network coding, the data does not depend only on one transmitted message but also on the contents of the other messages that happen to be sharing the route at the time of transmission. For this reason, network coding is more resistant to hacking, eavesdropping and other forms of attack than traditional transmission. RSA is a public key algorithm. A message can be encrypted by either public key or private key of RSA. If a message is encrypted with the private key, then that act is called signing the message. Therefore, RSA is one of the Digital Signature algorithms. RSA was named after its three inventors: Ron Rivest, Adi Shamir, and Leonard Adleman. It has become very popular, people have a level of confidence in using it, and it is a de facto standard in much of the world. The security of it is drawn from factoring large numbers. To generate public key and private key, choose two large prime numbers p and q with equal size (equal size for maximum security), then compute: n=p*q

(1.4)

Then choose a random number e (as a part of public key) such that e and (p-1) (q-1) are relatively prime, this will ensure the equation below has a solution. Then, private key d can be computed by using extended Euclidean algorithm: e d ≡ 1 mod (p-1)(q-1)

(1.1)

So the public key is e and n, and the private key is d. Two prime numbers p and q are gone after finding d, and they should be discarded for security reason. To encrypt a message m, m should be broken up into numerical blocks mi smaller than n. With binary data, choose the largest power of 2 less than n. That is, if both p and q are 100-digit primes, then n will have just under 200 digits and each

All rights reserved by www.ijsrd.com

443


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Review on variants of Security aware AODV by International Journal for Scientific Research and Development - IJSRD - Issuu