You are on page 1of 13

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/251348964

Erratum to: Trust-Based Routing Mechanism in MANET: Design and


Implementation

Article  in  Mobile Networks and Applications · October 2011


DOI: 10.1007/s11036-011-0328-0

CITATIONS READS

61 308

4 authors:

Tameem Eissa Shukor Abd Razak


Greenbone Network Universiti Teknologi Malaysia
5 PUBLICATIONS   99 CITATIONS    164 PUBLICATIONS   1,384 CITATIONS   

SEE PROFILE SEE PROFILE

Rashid Hafeez Khokhar Normalia Samian


Universiti Teknologi Malaysia Universiti Putra Malaysia
30 PUBLICATIONS   967 CITATIONS    11 PUBLICATIONS   129 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Online User Attribution View project

Development of Flash Flood Detection Using Distributed Radio Sensor Network for Urban Areas View project

All content following this page was uploaded by Normalia Samian on 19 June 2014.

The user has requested enhancement of the downloaded file.


Mobile Netw Appl (2013) 18:666–677
DOI 10.1007/s11036-011-0328-0

Trust-Based Routing Mechanism in MANET: Design


and Implementation
Tameem Eissa & Shukor Abdul Razak &
Rashid Hafeez Khokhar & Normalia Samian

Published online: 18 June 2011


# Springer Science+Business Media, LLC 2011

Abstract Mobile Ad hoc Network (MANET) is a self- battlefield or fire operation area. The lack of infrastructure
organizing wireless network for mobile devices. It does not and the mobility features of MANET make the routing
require any fixed infrastructure to be configured which security process a difficult task. MANET is vulnerable to
makes it more suitable to be used in environments that many routing attacks such as redirection attack where a
require on-the-fly setup. This paper discusses the challeng- malicious node sends forged Rrep (Route Replay) messages
ing issues in MANET routing security. It presents FrAODV, with high destination sequence numbers [1]. The source
a trust-based scheme for securing AODV routing protocol node chooses the routes with the highest destination
in MANET using the friendship mechanism. The nodes can sequence numbers and discards the other routes. All data
evaluate the routing paths according to some selected sent by the source node will be directed through these
features (such as node reputation and identity information) routes towards the malicious node which in turn drops this
before forwarding the data through these routes. We have data instead of forwarding it [1]. Another famous routing
used two types of implementation in our scheme, simula- attack are rushing attacks which usually happen in the
tion (using NS2) and real test-bed (using JADHOC). This reactive routing protocols where each node considers just
scheme is believed to provide a robust environment where the first route discovery packet that it receives and discards
MANET nodes can trust each other in a secure community. the others [2]. In this attack, malicious nodes rush route
requests towards the destination which will consider these
Keywords mobile ad hoc network . security . trust feature requests and ignore the others. The destination node then
replies to these requests. As a result, all source and
destination traffic will go through the malicious nodes [2].
1 Introduction Many researchers have proposed different methods to
secure the routing protocols. In this research, we focus on
Infrastructure networks are not suitable in environments securing AODV routing protocol. SAODV protocol has
where limited resources devices are connected through been proposed to secure AODV [3], in which both AODV
weak wireless links. In this case, the network should be messages (Rreq, Rrep) and the mutable information (hop
able to setup on-the-fly without the aid of any administrator count, hash value) is included in the protection mechanism.
or manager. MANET is one solution for such environments. Each node signs Rreq and Rrep message after reducing the
It is a self-organizing and self-configuring network. It is hop count and the hash value fields, in which these fields
established on a temporary basis and nodes can join or are changed in every hop. The signing process is
leave the network at any time. For example, new nodes can accomplished by using asymmetric cryptography. SAODV
quickly join or leave the network in a conference room, can defend against black hole attack [4]. However, it cannot
defend against worm-hole attack [5], hop-count altering
attack and routing messages dropping attack.
T. Eissa : S. Abdul Razak (*) : R. H. Khokhar : N. Samian
In this paper, friendship based AODV routing protocol
Universiti Putra Malaysia,
Selangor, Malaysia has been implemented in a simulation mode (using NS2)
e-mail: sabdrazak@gmail.com and real test-bed (using JADHOC framework). Some trust
Mobile Netw Appl (2013) 18:666–677 667

features are identified to evaluate the node friendship in the controlled session-based approach, the novel identifier-
network. A friendship mechanism algorithm is constructed based session key establishment, and its flexibility and
to secure AODV routing protocol. This paper is organized adaptability to network dynamics (e.g., the asymmetric
as follows: Section 2 describes some preliminaries about payment model). It is, however, by no means an easy task
MANET and trust concept. Section 3 presents our proposed to implement SIP in a secure, efficient manner. For
FrAODV scheme. The performance evaluation of our example, the introduction of credits may serve not only as
proposed scheme for simulation and real test-bed scenario an incentive for cooperation, but also as a stimulus for
are presented in Section 4. The paper is concluded with cheating. In addition, as an add-on, any incentive scheme
suggestions for future work in Section 5. like SIP should be efficient and lightweight enough not to
disturb other normal network functions such as routing.
Zhou et al. [9] developed a credit-based collusion-resistant
2 Preliminaries scheme to address node selfishness, but their approach
requires a centralized credit clearance service on the
2.1 Security in MANET backbone network, which may undermine the self-
organizing, decentralized nature of MANETs.
Flexibility, low cost, and ease of deployment are the main In another work, Hu and Perrig [2] proposed a new
characteristics of MANET. Early development of MANET secure on-demand ad hoc network routing protocol, called
routing protocols (such as DSR [6], DSDV [7] and AODV Ariadne. Ariadne prevents malicious nodes from tampering
[8]) did not consider important security issues. These highly with uncompromised routes consisting of uncompromised
dynamic routing protocols have no clear line of defence. As nodes, and also prevents many types of Denial-of-Service
a result, malicious attackers can disrupt the functionality of attacks. Ariadne used only highly efficient symmetric
a MANET. Recently, many MANET security protocols are cryptographic primitives. However, their role of defending
designed to address one or more attacks [9–14], yet no attacks is very limited, because schemes located in a single
protocol has proven secure against all attackers. Currently, protocol layer cannot solve problems in other layers.
researchers are investigating different MANET security Moreover, security attacks in a network may come
issues which include secure routing, privacy-aware routing, simultaneously from different protocol layers. Thus, a
group membership control, key distribution, intrusion multi-protocol layer security scheme is desired for network
detection and response systems, and DOS attacks. protocols. SCAN [13] presents a network-layer security
The use of threshold cryptography for MANET security solution that protects the control-plane (i.e., ad hoc routing)
was suggested in [9]. The basic idea was to distribute the and the data-plane (i.e., packet forwarding) operations in a
trust among MANET nodes such that no less than a certain unified framework. It does not apply any cryptographic
threshold of nodes is trusted. In this approach, the key primitives on the routing messages. Instead, it protects
element is the distributed Certification Authority (CA) routing and packets forwarding through a same reactive
which issues certificates to those nodes joining the network. approach, in which local neighbouring nodes collaborative-
The authors used a threshold signature protocol [15] to ly sustain each other, monitor each other, and react to
issue certificates. This approach is attractive, but cannot occasional attacks in their vicinity. Kong et al. [11]
directly be implemented on MANET node admission. The proposed a set of ubiquitous and robust admission protocols
approach is hierarchical in the sense that it only selects by considering the same problem. The security of these
nodes that can serve as components of the CA, i.e., take admission mechanisms relies upon a special variant of the
part in admission decisions. Also, contacting distributed proactive threshold RSA signature scheme. Unfortunately,
CA nodes in a multi-hop networks and dynamic MANET is this scheme is neither robust (i.e., it cannot tolerate
not always possible. malicious nodes) nor secure. Also, Saxena et al. [17] claim
Buttyan and Hubaux [10] proposed to stimulate packet that, all attempts to construct secure MANET admission
forwarding by remunerating intermediate forwarding nodes protocols from secure threshold/proactive RSA signature
with some credits paid by the source. Similarly, a Secure schemes have failed. Recently, Saxena et al. [18] also
Incentive Protocol (SIP) is proposed in [16] to motivate proposed an admission protocol for short-lived MANET
packet forwarding in totally self organizing MANETs which is based on secret sharing techniques using bivariate
without relying on any centralized infrastructure. In SIP, polynomials. They also presented a scheme that allows any
each node imprints a non-forged stamp on each packet pair of MANET nodes to efficiently establish an on-the-fly
forwarded as the proof of forwarding, based on which secure communication channel.
packet relays are remunerated, while packet sources and Zapata and Asokan [3] proposed Secure AODV
destinations are charged with appropriate credits. SIP (SAODV) using digital signature to authenticate most fields
differs from [10] in many aspects such as the source- of RREQ and RREP, and hash chain is used to authenticate
668 Mobile Netw Appl (2013) 18:666–677

hop count. Network nodes authenticate AODV routing phy for authentication, it is particularly vulnerable to DoS
packets with an extension of SAODV digital signature to attacks based on flooding the network with bogus control
prevent certain malicious attacks. SAODV provides rea- packets for which signature verifications are required. As
sonable security in AODV routing protocol, however, long as a node can’t verify signatures at line speed, an
SAODV relies on digital signatures and computing such attacker can force that node to discard some fraction of the
signatures on resource constrained nodes is expensive. control packets it receives. In another attempt, Carter and
Furthermore, SAODV cannot protect against invalid routes, Yasinsac [23] proposed a Secure Position Aided Ad hoc
because an authenticated malicious attacker node that Routing (SPAAR) protocol for a high-risk MANET
happens to be on a route between the source and destination environment. SPAAR is designed to fulfil the security
may pass on the routing message without updating routing requirements of the managed hostile environment. SPAAR
information. protects position information with authentication, privacy,
Papadimitratos and Haas proposed Secure Routing and integrity via cryptographic techniques. However,
Protocol (SRP) [19] to provide end-to-end DSR security SPAAR is an anonymous on-demand protocol that requires
via an existing security association between the source and online location servers.
destination. SRP allow the destination to produce a keyed A Secure Link-State Protocol (SLSR) proposed in [24]
MAC over the received path sequence. The MAC is used digital signatures and one-way hash chains to ensure
transmitted in the route reply packet that allows the source the security of link-state updates. SLSR is a periodic
to verify the route reply has been approved by the target protocol that receives link state information through a
node. The authors of SRP provide a guided discussion on periodic Neighbour Location Protocol (NLP). As a part of
possible attacks and describe how SRP is secure if NLP, each node broadcasts a pair of signs between its IP
malicious attackers do not collude or work together. SRP and MAC addresses. A node’s NLP can notify SLSR when
provides further route security in the presence of non- one MAC address uses two IP addresses, or two MAC
colluding attackers by using BAN logic method [20]. addresses claim the same IP address, or another node uses
However, Marshall et al. [18] described malicious attacker the same MAC address as the detecting node. These
does not append itself to the accumulated route path during protocols ensure some level of integrity of MAC and IP
route discovery and subsequently relays the signed route addresses within a two-hop radius. SLSR uses the same
reply, proving that the BAN claim is false. An additional lightweight flooding prevention mechanism as SRP,
attack against SRP is presented in [21]. This attack was wherein nodes that relay or generate fewer link-state
discovered via visual inspection after simulatability models updates are given priority over any node that sends more
indicated SRP is not provably secure. link-state updates. As in SRP, an attacker can masquerade
Yi et al. [22] designed Security-Aware ad hoc Routing as a victim node and flood the victim’s neighbours with
(SAR) protocol which is derived from AODV routing link-state updates that appear to originate at the victim.
protocol and based on the hierarchal trust values metric and Although the victim might be able to detect the attack, due
authentication. In SAR, the authors defined a new metric to NLP’s duplicate MAC address detection functionality,
called trust value that governs routing protocol behaviour. the victim will have no way to protest. A brief survey of
This metric is to be embedded into control packets to mirror security techniques in MANET Routing can be found in
the minimum trust value required by the sender. As a result, [25].
the received packet cannot be processed or forwarded to
next hop until it provides the essential trust level entrusted 2.2 Trust-based security schemes in MANET
to the packet. SAR prevents attacks from an internal node
on a higher trust level and shows better security as The traditional cryptography schemes that provide au-
compared to previous routing protocols. However, defining thentication and data privacy do not detect when an
the nodes’ trust values is problematic if there is no internal node provides false routing information, or
hierarchy in the network. Also, to secure the scheme, the where a node does not cooperate with the other nodes
authors suggest that all nodes at the same level of trust to save its resources. There should be another layer of
should share a common secret. This is not very practical, security that detects such misbehaviour. This layer is
and has many key-management issues. based on trust concept. This concept was first proposed
Sanzgiri et al. [1] proposed an AODV based authenti- in [26]. It is based on the way that human beings trust
cated routing for ad hoc networks (ARAN). In ARAN, each each other. When a person wants to verify another person,
node has a certificate signed by a trusted authority, which he usually asks his friends about this person. He also asks
associates its IP address with a public key. ARAN is an on- this person to provide him with the list of reference people
demand protocol, broken up into route discovery and who will be asked if he is to be trusted. In the same way,
maintenance. Because ARAN uses public-key cryptogra- when a node S wants to verify another node D, the first
Mobile Netw Appl (2013) 18:666–677 669

step, S requests recommendations from the list of trusted metrics such as Encryption / Key, Hardware Configuration,
entities (friends). This request implies a question to each Battery Power, Credit History/ACK, Exposure, Organiza-
entity in the list about the identity of D. Each entity tion Hierarchy, Identity, and Location.
answers yes (trusted) or no (un-trusted). Any entity that On the other hand, the quantitative trust value category
does not find D in its friends list forwards the request to its represents the method of evaluating trust features by using
trusted entities list (Recommendation list). If any entity of certain mathematical functions or equations. Each feature
the friends list or the recommendation list knows D and has its own trust value metric that can be assigned based on
trusts him, information about D is sent back to S. In the one’s judgment for a specific application. At present, there
next step, node S will ask D about the references, i.e. other is no standard to determine value metrics. The values are
entities with which he has communicated before. When S determined based on intuitive decisions. The features’ trust
receives D references, he asks his friends list if they know value metrics are computed in a formulated equation and
these references and trusts them. S also may ask the the output will be used to determine whether a node can be
references for references (References chain, [27]). In [28– trusted or vice versa. According to recent research [32, 33],
30] also proposed to use the trust concept to evaluate the there are eight features which can be considered for
nodes in MANET. performance metrics evaluation and ten features for
quantitative trust value. Three features that are not very
2.3 Features selection in trust-based security schemes useful for both categories are battery power, credit history
or acknowledgement and identity which were proposed in
A good features selection scheme plays an important role in [28, 32].The other frequently used potential selected feature
creating a trust-based MANET community. Features actual- is encryption or key type which falls under the performance
ly represent the characteristics or evidence properties of metrics evaluation category [28, 32, 34]. The remaining
each node in the network. We had made a set of expected suitable features are trust value metric, packet
comparative studies on several features selection schemes precision and blacklist [33, 34].
in our previous work [31]. In general, feature based In this paper, we have considered 3 features to represent
schemes can be divided into 2 categories including each node in our MANET environment which includes trust
performance metrics evaluation and quantitative trust value. value metric, packet precision and blacklists. As aforemen-
In the category of performance metrics evaluation, the tioned in [31], the selection of these features is based on the
efficiency of selected features are evaluated by using certain justification that they have been frequently used in the
metrics such as routing traffic, route discovery time, routing previous six research works [28, 32–36]. However, these
overhead and number of data packets delivery. For instance, features are subject to change after an emulation process
each feature contains its own corresponding attribute has been carried out, which may give results on the
number that will be presented during packet forwarding suitability of the features used. The remaining unselected
process [32]. When a source node wants to forward a features are not discarded but are reserved for later
packet to its destination, it will ask its neighbouring nodes deployment, for example, in case the current selected
to present their feature’s attribute number for checking. If features are found to have weaknesses.
the neighbouring nodes manage to present an attribute
number that fulfills the source node’s requirement, the
attribute number will be embedded in the packet format and 3 Our scheme
the node is granted to forward the packet to other
neighbouring nodes before reaching the required destina- In this section, we present our friendship-based framework
tion. The effectiveness of packet forwarding process based proposed to secure AODV (Fig. 1). Two algorithms
on selected features are measured using performance (FwEvaluate and RvEvaluate) are used to evaluate the

Fig. 1 Overview of friendship


M
routing protocol. H and M
X
indicate honest network node
H
and malicious node, M
respectively. S and D indicate X H
the source and destination node, H X X D
M
respectively H
H
S
X
M
X
H
670 Mobile Netw Appl (2013) 18:666–677

forward and reverse routes respectively in AODV protocol. Figure 2 shows RvEvaluate algorithm and the explanation
We assume that each node has identity information that is as follows:
cannot be forged by malicious nodes. This Identity
& The source node broadcasts RREQ as in the original
information can be some type of smart card provided in
AODV protocol.
the initialization phase. For simplicity, we use IP and MAC
& When any node receives RREQ , we have the following
addresses. The friends list is created in the initialization
two cases:
phase and distributed (offline) to the devices. We also
assume that the number of malicious nodes is less than the 1. If the current node is the final destination, it
number of good nodes. evaluates the friendship of the previous hop, and
if this is not a friend it rejects the request.
3.1 Friendship-based AODV routing protocol (FrAODV) Otherwise it evaluates the friendship of the reverse
route from the destination to the originator node by
In the proposed scheme, each node keeps a list of friends comparing its friendship value with the current
and the friendship value of these friends. The friendship routes friendship values. The friendship value of
values are represented as numbers ranging from 0 to 100. the reverse route is calculated as:
The bigger the number, the more it trusts in that node. Two
algorithms are used to build up trusted routes in AODV
X
h
Pr FrHpi
protocol: RvFrRte ¼
i¼1
h
& RvEvaluate algorithm
This algorithm builds up trusted reverse route from the where Pr FrHpi the friendship is value of a
destination and intermediate nodes to the originator node. previous hop i, h is the number of hops from the

Receiving new RREQ

I am the
No destination of
Yes
the RREQ?

Evaluate the Evaluate the


friendship of the friendship of the
previous and next hop previous hop

No friend? Yes Yes friend? No

Evaluate the
Reject the route friendship of the Reject the route
route to originator

More friendly than


existing route ? No
Yes

Reject the route

Register the new


route

Fig. 2 RvEvaluate algorithms


Mobile Netw Appl (2013) 18:666–677 671

destination node to the originator node. Then, it 3.1.1 Example


compares it with the friendship value of the
existing route. If it’s less, it simply rejects the new Let’s have a look at the following example where node A
route. Otherwise, it registers the new route as the wants to creates a route to node D. From Fig. 4, it can be
best friendly reverse route received up to now. seen that the friend value of the route A→B→D is:
2. If the current node is an intermediate node, it ðFrðA ! BÞ þ FrðB ! DÞÞ=2 ¼ ð8 þ 8Þ=2 ¼ 8. While
evaluates the friendship of the previous and the the friend value of the route A→C→D is ðFrðA ! CÞ þ
next hop and if one of these hops is not friends, it FrðC ! DÞÞ=2 ¼ ð10 þ 10Þ=2 ¼ 10
rejects the request. Otherwise it creates a reverse As a result, A chooses route A→C→D since it has more
route from the current node to the originator node friendship value than route
and evaluates it as in the previous step.
A!B!D
& FwEvaluate algorithm
This algorithm builds up trusted forward routes from the 3.2 Friendship evaluation in FrAODV
source and intermediate nodes to the final destination node.
Figure 3 shows FwEvaluate algorithm and the explanation The evaluation of any node depends on the friend’s value
is as follows: appended to that node. The more friend value a node has
the more trustworthiness it is granted. However, when this
& The final destination node generates RREP messages value is less than a specific threshold called Threshold
according to the received RREQ message and sends Friendship (TF), the node is considered untrusted. As a
them to the previous node as in the original AODV result, all communication coming from that node is
protocol. blocked. The TF value can be chosen by the network
& When any node receives RREP , we have the following designer according to the scenario. When a node is blocked,
two cases: all the Rreq and Rrep messages coming from or going to
that node are rejected.
1. If the current node is the originator node, it
evaluates the friendship of the next hop and if this 3.3 Node authentication in FrAODV scheme
is not a friend, it rejects the request. Otherwise it
evaluates the friendship of the forward route from Mobility is achieved through a list of rules that are
the originator node to the final destination node by dynamically issued to the appropriate test-bed notebooks,
comparing its friendship value with the current changing their configuration in a controlled way. The IP
routes friendship value. The friendship value of the and MAC addresses have been used as an identity to check
forward route is calculated as: the friend’s authentication.

& Logical Address authentication


X
h
FwFrHpi
FwFrRte ¼ The first task of a new node is to associate itself with a
i¼1
h
Friendly MANET node. Thus, the new node listens for
hello messages and selects one configuring node. Then, a
Where FwFrHpi the friendship values of the hello message is created and transmitted in order to request
next hop i, h is the number of intermediate hops address configuration from the selected configuring node. If
from the originator node to the destination node. an IP address is not available, the MAC address of the new
Then, it compares it with the friendship value of the node must be checked in order to uniquely identify the new
existing route. If it’s less, it simply rejects the new node. Upon receiving a hello message, the configuring
route. Otherwise, it registers the new route as the node assigns a local address to the new node, and signals
best friendly forward route received up to now. this assignment through another hello message. Addition-
2. If the current node is an intermediate node, it ally, the configuring node marks the assigned address as
evaluates the friendship of the previous and the used in its hello messages.
next hop and if one of these hops is not friends, it
& Physical Address authentication
rejects the request. Otherwise it creates a forward
route from the current node to the destination node MAC address has been used as a second identity in our
and evaluates it as in the previous step. friendship mechanism that works by discriminating against
672 Mobile Netw Appl (2013) 18:666–677

Receiving new RREP

I am the
No Originator of
Yes
the Request?

Evaluate the Evaluate the


friendship of the friendship of the
previous and next hop next hop

No friend? Yes Yes friend? No

Evaluate the
Reject the route friendship of the Reject the route
route to destination

More friendly
than existing No
route ?

Reject the route


Yes

Register the new


route

Fig. 3 FwEvaluate algorithm

certain traffic at Layer 2. By specifying which node (by which decides the next best hop based on the friendship
their MAC addresses) can communicate directly (friends) value. MAC address provides extra security between
or which node cannot (blacklist) certain one hop routes can mobile nodes, where in a real MANET the association
be individually discarded or accepted. In case of friend would occur between wireless cells. Specifically, the MAC
node, it is the data packet to be passed up to next node address of the mobile node has to be accepted by its new
neighbouring nodes as well as the mobile node accepting
the MAC address of its new neighbours. Through the
proposed friendship mechanism, the initial topology can be
specified by selecting node-to-node associations. To realize
mobility, each time node is mobile and disassociated from
its current neighbours. The next node that it wishes to
associate with is set through friendship value. Once a
scenario has been created, running the scenario causes the
nodes to remotely connect to the relevant nodes and
dynamically exchanges their friendship value.

4 Performance evaluation

Our implementation includes two separate parts, simulation


Fig. 4 Example on the scheme friendship mechanism and test-bed. The simulation has been done to compare the
Mobile Netw Appl (2013) 18:666–677 673

Fig. 5 Packet delivery fraction for three AODV implementations Fig. 7 Normalized routing load for three AODV implementations
under malicious attacks (100 m×100 m) under malicious attacks (100 m×100 m)

proposed scheme with the other existing schemes and test- AODV: original AODV routing protocol, AODV with
bed implementation is done by using a real-world scenario friendships mechanism without trust features and AODV
setup. with friendships mechanism that is enhanced with trust
features. The performance of the proposed mechanism is
4.1 Performance evaluation with existing schemes evaluated using packet delivery fraction (PDF) and nor-
malized routing load (NRL). PDF derives the ratio of
A simulation experiment has been done to evaluate the received data packets over sent packets delivered to the
friendships mechanism with plugged-in trust features. The destinations [37]. It is a measurement of a protocol’s
simulation is run on AODV routing protocol by using NS-2. successfulness delivering packets from source to destina-
For all simulations, the same movement models will be tion, also known as the throughput of a network. The higher
used where the number of mobile nodes involved is 100, percentage value of PDF obtained denotes the better
the simulation time is 250 s, the pause time is varied as 0, network throughput performance of a routing protocol.
50, 100, 150, 200 and 250 s, and the network boundaries Meanwhile, NRL is the ratio of the number of control
are set to 100 m×100 m and 1000 m×1000 m areas. The packets (routing packets) broadcasted by every node in the
purpose of having two different sets of network boundaries network and the number of data packets received by the
is to determine how the proposed mechanism performs in destination nodes [38]. Lower NRL prescribes that a
the most and less dense areas. The test was carried out on routing protocol is more efficient as less unnecessary
100 m × 100 m network size with 100 mobile nodes control packets have been propagated in the network in
involved. Some malicious attacks have been launched to comparison to the data packets received at destination.
see how the proposed mechanism could endure the AODV The PDF comparison for the three AODV implementa-
routing protocol under such attacks. Performance compar- tions in 100 m×100 m is illustrated in Fig. 5. From the
ison will be made between three implementations on graph, it can be seen that under malicious attacks, the
implementation of proposed friendships mechanism with
Packet Delivery Fraction (PDF) trust features on AODV outperforms the other two AODV
100 implementations by approximately 10% at each interval of
90
80
nodes’s mobility pause time. On the other hand, the other
70 two parameters achieved percentages of PDF in the same
PDF (%)

60
50
40
30
20
10
0
0 50 100 150 200 250
Pause Time (seconds)

AODV-Malicious Attacks

AODV-Friendships Mechanism (Malicious Attacks)

AODV-Friendships Mechanism with Trust features (Malicious Attacks)

Fig. 6 Packet delivery fraction for three AODV implementations


under malicious attacks (1000 m×1000 m) Fig. 8 Friendship mechanism test-bed setup
674 Mobile Netw Appl (2013) 18:666–677

Table 1 Node hardware


specifications Model Processor Ram Wireless card

HP 520 2.0 GHz 1 GB Intel(R) PRO/Wireless 3945ABG Network Connection


HP Pavilion dv2000 2.0 GHz 3 GB Intel(R) Wireless WiFi Link 4965AGN
HP Pavilion dv2000 2.0 GHz 3 GB Intel(R) Wireless WiFi Link 4965AGN
Fujitsu Siemens 1.73 GHz 510 MB Intel(R) PRO/Wireless 2200 GB Network Connection
HP Pavilion (Desktop) 2.20 GHz 2 GB Linksys Wireless-G PCI Adapter

vicinity with each other at about 75%. The performances of malicious nodes having been restricted from doing so with
the two AODV implementations are in such a way because the implementation of trust features in AODV.
the malicious nodes have not been excluded earlier, and that
causes them to successfully carry out malicious activities. 4.2 Performance evaluation in real test-bed implementation
As a result, less data packets are received than sent as many
have been dropped by malicious nodes. In order to do the experimental performance analysis of
Different output patterns have been exhibited after a friendship based AODV networks, the experimental test-
simulation ran in a 1000 m×1000 m area as shown in bed as illustrated in Fig. 8 was constructed. The experiment
Fig. 6. At high mobility level, the performance of the was conducted in the wireless communication lab at
AODV with trust features’ implementation is lower than the Universiti Teknologi Malaysia. The area was approximately
original AODV. This is because the number of total trust 20 m by 8 m and during the experiments all 5 notebooks
relationships gained for this terrain size is smaller than the were placed in the same lab. The laptops have the following
one obtained in the smaller area, leading to a smaller hardware and software configurations.
number of cooperation among friends. Thus, at high
& Hardware configurations
mobility level where a nodes’ movements are more
frequent, more cooperative friends are needed to increase All the 5 nodes have the hardware specifications as
PDF performance. However, the PDF performance is outlined in Table 1.
increasing when the mobility level is decreasing, out- & Software configurations
performing the original AODV.
The results of routing load achieved for the three AODV All notebooks have been installed with Windows XP.
implementations in 100 m×100 m area are as illustrated in The WLAN interface of each notebook has been allocated a
Fig. 7. The graph shows that the proposed AODV different IP address from a different sub network as shown
implementation with trust features acquired relatively lower in the Fig. 7. Jadhoc prompts the user to start each test-bed
routing loads at all pause times, whereas the remaining two node that will be used to aid the user in configuring the
AODV implementations gained higher routing loads. The initial MANET topology. This MANET experiment specif-
result proves the hypothesis that less control (routing) ically tries to emulate the hops that exist between
packets have been broadcast in the network due to the neighbours nodes and their mobility. By definition, the

Fig. 9 Scenario setup


Mobile Netw Appl (2013) 18:666–677 675

two hop distance between nodes indicates that they are


geographically separated in such a way that they are not
able to communicate directly; instead they must communi-
cate at the Network Layer, routing via an intermediary
node. This separation is shown in Fig. 8 and highlights that
the wireless cells have minimal interference with one
another.
& Nodes Initialization
Each node should be from different subnet. The gateway
of each node should be the IP address of a node that does
not exist. This will launch the route requests multicasting to
all the nodes in range. For example, if the node IP address
Fig. 11 Friendship message activity
is 192.168.2.1/24, the gateway is set as: 192.168.2.100 (this
IP address is virtual). The wireless network of each node
should be configured to use the open mode. rate of one message per minute. The nodes sent messages
for ten minutes, and then statistics were recorded one
4.3 Scenario setup minute afterwards. One of the goals of this experiment is to
determine how well it scales. How does our friendship
The environment used here consists of five nodes, each one mechanism performance vary with respect to the number of
provided by a wireless network interface as shown in nodes in the network? Attempting to answer this question,
Fig. 9. Each node is equipped with the following setup: we have conducted experiments by considering 3 scenarios
Windows XP professional Version 5.1.2600 service pack 2, including packet delivery ratio, friendship message activity,
JDK version 1.4, JRE version 1.4, JPCAP version 0.4.4, and average time. These scenarios are explained as follows:
and JADHOC version 0.2. The nodes hardware specifica-
tions are as shown in Table 1. & Packet Delivery Ratio
& Experimental Results Average packet delivery ratio has been calculated using
10 different experiments. A 10 MB data packet has been
This section provides the results of the performance
sent with TTL=128 in each experiment. UDP actual load
analysis done on the basis of the scenarios and the tests
for given load of 10240 bps, out of order sequence packets
described in the previous section. Varying the number of
are shown both for friendship mechanism and JAdhoc.
nodes can be accomplished in two basic ways. One is by
Packet Delivery Ratio of both Friendship Mechanism and
varying field size, keeping node density constant. The other
JAdhoc protocol handlers was found to be between 93% to
one is by keeping the field size constant and increasing the
96%, and 98% to 100% respectively, as shown in Fig. 10.
density. The experiments have been performed using both
The loss of packets is due to the load caused by the security
of these approaches. In all the simulated experiments, each
messages. The original JAdhoc version does not include
node sent messages to random destinations at an average
any security messages. This justifies why PDR is higher in

Fig. 10 Performance comparison of packet delivery ratio between Fig. 12 Performance comparison of average time between friendship
friendship mechanism and Jadhoc (0.20) mechanism and Jadhoc (0.20)
676 Mobile Netw Appl (2013) 18:666–677

the original JAdhoc than in our version. However, this loss scheme in wireless PDA devices and perform the experi-
does not have a critical effect on data communications ment in more mobility environments where nodes can move
among the nodes. freely in a wide range of area (such as in forest or street). In
future implementations, we should consider a high number
& Friendship Message Activity of PDA nodes in the environment (at least 20 PDA devices)
Friendship message activity is calculated by varying the and evaluate the proposed scheme under this scenario.
number of nodes. The total message activity has been
computed as the total number of AODV messages sent and Acknowledgment This research has been supported by the Ministry
received at each node. It is important to count both sent and of Science, Technology and Innovation (MOSTI) Malaysia under E-
received messages, as they will generally differ, for not all Science Project vote No. 79261.
sent messages are received, while some messages are
received many times (broadcasts). Experiments were
performed by varying nodes in the lab of range 20 m by References
8 m. In all experiments, each node sent one message to
particular destinations. The nodes sent messages 10 times, 1. Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM
and then statistics were recorded for each second after- A secure routing protocol for ad hoc networks. In Proceedings of
wards. In this experiment, friendship message activity has the 10th IEEE International Conference on Network Protocols,
been calculated per node in a constant-density field. Nodes ICNP ’02, pp 78–89, Washington, DC, USA, 2002. IEEE
Computer Society
were initially arranged in a grid format with each node 2. Hu Y-C, Perrig A, Johnson DB (2003) Rushing attacks and
separated by 5 m. From Fig. 11, it is clear that the amount defense in wireless ad hoc network routing protocols. In
of message activity is increased each time more nodes are Proceedings of the 2nd ACM workshop on Wireless security,WiSe
added to the network. With mobility, destinations can ’03, pp 30–40, New York, NY, USA. ACM
3. Zapata MG, Asokan N (2002) Securing ad hoc routing protocols.
become unreachable, causing route error messages to be In Proceedings of the 1st ACM workshop on Wireless security,
sent and routes to be removed. To create those routes again, WiSE ’02, pp 1–10, New York, NY, USA. ACM
new route request need to be sent, resulting in the increased 4. Al-Shurman M, Yoo S-M, Park S (2004) Black hole attack in
message activity. mobile ad hoc networks. In Proceedings of the 42nd annual
Southeast regional conference, ACM-SE 42, pp 96–97, New York,
& Average Time NY, USA. ACM
5. Hu Y-C, Perrig A, Johnson DB (2003) Packet leashes: a defense
Average time has been referred to in this experiment as against wormhole attacks in wireless networks. In INFOCOM
the time taken by messages to travel from the source to the 2003. Twenty-Second Annual Joint Conference of the IEEE
Computer and Communications. IEEE Societies, volume 3, pp
destination. The results show that the average time 1976–1986, march-3 April 2003
calculated in the proposed scheme is almost the same as 6. Johnson DB, Maltz DA (1996) Dynamic Source Routing in Ad
the performance of the original JadHoc scheme. A small HocWireless Networks. Kluwer Academic Publishers
delay may happen due to the friendship messages transfer- 7. Perkins CE, Bhagwat P (1994) Highly dynamic destination-
sequenced distance-vector routing (dsdv) for mobile computers. In
ring prior to sending data. However, the friendship security Proceedings of the conference on Communications architectures,
communication chosen in our system is lightweight and protocols and applications, SIGCOMM ’94, pp 234–244, New
suitable for the limited resources of MANET. In other York, NY, USA. ACM
words, the security implementation that has been added to 8. Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector
routing. In Mobile Computing Systems and Applications, 1999.
JadHoc does not cause significant delay for the messages to Proceedings. WMCSA ’99. Second IEEE Workshop on, pp 90–100,
reach their destinations (Fig. 12). Feb 1999
9. Zhou L, Haas ZJ (1999) Securing ad hoc networks. Network,
IEEE 13(6):24–30
10. Buttýan L, Hubaux J-P (2003) Stimulating cooperation in self-
5 Conclusion and future work organizing mobile ad hoc networks. Mob Netw Appl 8:579–592
11. Kong J, Luo H, Xu K, Gu DL, Gerla M, Lu S (2002) Adaptive
In this paper we have shown that our friendship based security for multilevel ad hoc networks
mechanism is a useful framework to secure AODV routing 12. Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-
demand routing protocol for ad hoc networks. Wirel Netw 11:21–
protocols in MANET. We also presented in detail the 38
routing mechanism used to evaluate the nodes using the 13. Yang H, Meng X, Lu S (2002) Scane: Selforganized network-layer
trust concepts. We have evaluated our proposed friendship security in mobile ad hoc networks. In Proceedings of the 1st
based mechanism in a real test-bed using JADHOC ACM workshop on Wireless security, WiSE ’02, pp 11–20, New
York, NY, USA. ACM
framework. The results show that this approach is a 14. Saxena N, Tsudik G, Yi JH (2009) Efficient node admission and
promising way of securing AODV routing protocols. The certificateless secure communication in short-lived manets. Parallel
future work of this research is to implement the proposed and Distributed Systems, IEEE Transactions 20(2):158–170
Mobile Netw Appl (2013) 18:666–677 677

15. Frankel Y, Yung M, Desmedt Y (1994) How to share a function 28. Eschenauer L, Gligor VD, Baras J (2002) On trust establishment
securely (extended summary (1994)). In Symposium on the in mobile ad-hoc networks. In In Proceedings of the Security
Theory of Computation (STOC) Protocols Workshop, pp 47–66. Springer-Verlag
16. Zhang Y, Lou W, Liu W, Fang Y (2007) A secure incentive 29. Zhu S, Zhu S, Xu S, Setia S, Jajodia S (2003) Lhap: A lightweight
protocol for mobile ad hoc networks. Wirel Netw 13:569–582 hop-by-hop authentication protocol for ad-hoc. In In Proc. of the
17. Saxena N, Tsudik G, Yi JH (2007) Threshold cryptography in p2p 23rd International Conference on Distributed Computing Systems
and manets: the case of access control. Comput Netw 51:3632– Workshops, p 749755
3649 30. Ren K, Li T, Wan Z, Bao F, Deng RH, Kim K (2004) Highly
18. Thakur V, Marshall J, Yasinsac A (2003) Identifying flaws in the reliable trust establishment scheme in ad hoc networks. Comput
secure routing protocol. In Proc. 2003 IEEE Intl. Performance, Netw 45:687–699
Computing, and Commun. Conf, p 167174 31. Samian N, Maarof MA, Razak SA (2008) Towards identifying
19. Papadimitratos P, Haas ZJ (2002) Secure routing formobile ad features of trust in mobile ad hoc network. In Proceedings of the
hoc networks. In SCS Communication Networks And Distrib- 2008 Second Asia International Conference on Modelling &
uted Systems Modeling And Simulation Conference (CNDS Simulation (AMS), pages 271–276, Washington, DC, USA, 2008.
2002), pp 193–204 IEEE Comput Soc
20. Burrows M, Abadi M, Needham R (1990) A logic of authentica- 32. Abusalah L, Khokhar A, BenBrahim G, ElHajj W (2006) Tarp:
tion. ACM Trans Comput Syst 8:18–36 trust-aware routing protocol. In Proceedings of the 2006 interna-
21. Buttyn L, Vajda I (2004) Towards provable security for ad hoc tional conference on Wireless communications and mobile
routing protocols. In In Proceedings of the ACM Workshop on computing, IWCMC ’06, pp 135–140, New York, NY, USA, ACM
Security in Ad Hoc and Sensor Networks (SASN, pp 94–105. 33. Li H, Singhal M (2006) A secure routing protocol for wireless ad
ACM Press hoc networks. In Proceedings of the 39th Annual Hawaii
22. Yi S, Naldurg P, Kravets R (2001) Security-aware ad hoc routing International Conference on System Sciences - Volume 09, pages
for wireless networks 225.1–, Washington, DC, USA. IEEE Comput Soc
23. Carter S, Yasinsac A (2002) Secure position aided ad hoc routing. 34. Nekkanti RK, Lee C (2004) Trust based adaptive on demand ad
In Proc. IASTED Intl. Conf. Commun. And Computer Networks hoc routing protocol. In Proceedings of the 42nd annual Southeast
(CCN02), pp 329–334 regional conference, ACM-SE 42, pp 88–93, New York, NY, USA,
24. Papadimitratos P, Haas ZJ (2003) Secure link state routing for ACM
mobile ad hoc networks 35. Pirzada AA, McDonald C (2004) Establishing trust in pure ad-hoc
25. Andel TR, Yasinsac A (2007) Surveying security analysis networks. 27th Conference on Australasian Computer Science
techniques in manet routing protocols. Communications Surveys (CRPIT 04), January 2004
Tutorials, IEEE 9(4):70–84 36. Zhang P, Yan Z, Virtanen T (2003) Trust evaluation based security
26. Weimerskirch A, Thonet G (2002) A distributed light-weight solution in ad hoc networks. In Proceedings of the 7th Nordic
authentication model for ad-hoc networks. In Proceedings of the Workshop on Secure IT Systems, pp 1–14
4th International Conference Seoul on Information Security and 37. Pandey AK (2005) Study of manet routing protocols by glomosim
Cryptology, ICISC ’01. Springer-Verlag, London, UK, pp 341–354 simulator. In International Journal Of Network Management,
27. Wang G, Wang Q, Cao J, Guo M (2007) An effective trust volume 15, pp 393–410. John Wiley and Sons, Ltd
establishment scheme for authentication in mobile ad hoc net- 38. Rani A, Dave M (2007) Performance evaluation of modified aodv
works, pp 749–754, Oct for load balancing 1. J Comput Sci

View publication stats

You might also like