forwarding packets on non-optimal paths andselectively dropping packets.
An attacker may disclose private or importantinformation to unauthorized nodes in thenetwork. Such information may includeinformation regarding the location of nodes orthe structure of the network. It gathers thenode location information, such as a routetable, then plans to attack in further scenarios.
Resource consumption attack
A malicious node can attempt to consume orwaste resources of other nodes in the network.The resources targeted are bandwidth,computational power and battery life, whichare limited in ad hoc wireless networks. Suchattacks may be in the form of requestingexcessive route discovery, very frequentgeneration of beacon packets, or forwardingunnecessary packets to an unsuspecting node.
An attacker may try to partition the network by injecting forged routing packets to preventone set of nodes from reaching another.
An attacker may attempt to cause a node todetours through suboptimal routes. Alsocompromised nodes may try to work togetherto create a routing loop.
One weak point is that most authenticationsprocesses are only carried out once when asession starts. An adversary could try toappear as an authentic node and hijack thesession.
An adversary tries to disturb thecommunication in a network, for example byflooding the network with a huge amount of packages. Service offered by the network arenot working as usual, slow down or even stop.Ad hoc wireless networks are more affectedthan wired networks, because there are morepossibilities to perform such an attack.
Table 1Security Solution for MANETs
Layer Security Issues
Application Layer Detecting and preventingViruses, Worms, Maliciouscodes, and applicationsabuses.Transport Layer Authentication and Securingend-to-end communicationthrough date encryptionNetwork Layer Protecting the ad hoc routingand forwarding protocolsLink Layer Protecting the wireless MACprotocol and providing link layer security supportPhysical Layer Preventing Signal jamming,denial-of-service attacks
II. OBJECTIVE & OVERVIEW OF THEPROPOSED PROTOCOL
In this paper, we propose to design acongestion reduced and security basedprotocol – Right angled or Ant Search(RAOA) which is the enhancement overAOMDV protocol, which works on energybased approach which attain highconfidentiality and authentication of packets inrouting layer and layer of MANETs, havingthe following objectives:
in order to increase the network lifetime to provide, the application of ciphersthat are computationally efficient like thesymmetric-key algorithms and cryptographichash functions
to establish high-level securitywith the aid of mutualcollaboration/cooperation amidst nodes alongwith other protocols
to facilitate the network toresist attacks to heal itself by detecting,recognizing, and eliminating the sources andtypes of attacks
flexible & energy
enough to trade security forenergy consumption
with the security methodologiesand services in existence
to the rapidly growing network side
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 6, June 2011277http://sites.google.com/site/ijcsis/ISSN 1947-5500