Authenticated and Trusted AODV (ATAODV) Routing Protocol to Detect Blackhole Attack in MANET-Based Military Environments

Authenticated and Trusted AODV (ATAODV) Routing Protocol to Detect Blackhole Attack in MANET-Based Military Environments

Prathapchandran Kannimuthu
DOI: 10.4018/IJITN.2021040105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this paper, an authenticated and trusted AODV (ATAODV) routing protocol is proposed to identify and eliminate the black attack and form the trusted route in MANET-based military environments. The aim is to provide two-level security by mapping the multi-agent system (MAS). The first level focuses on providing authentication by identifying blackhole soldiers/devices, and the second level focuses on forming a trusted path between the origin and the endpoint communication. The authentication is achieved by aggregated trust (AT), which is calculated based on the reputation, closeness, and energy by aggregated trust design agent (ATDA). Then, forming a trusted route between the source and the destination is achieved by combining route aggregated trust (RAT), which is calculated based on AT and hop count (HC). The trusted route is formed by a routing agent (RA). The simulation results demonstrate that the ATAODV routing protocol is performing well and shows improved results compared with the existing routing protocols.
Article Preview
Top

1. Introduction

Mobile Ad hoc Networks known us MANET is a wireless communication technology and it is identified as a capable resolution for large scale networks to contest against increasing complexity, dynamics and heterogeneity in developing mobile communication structures at present. It is composed of autonomous mobile nodes that are organized together with the help of wireless medium. It is self-organized networks with no fixed topology hence mobile nodes are moving around the network without any support of other nodes and dedicated server. Since it is dynamic, there is no restriction in joining and leaving the network by the mobile nodes with irrespective of time (Royer et al., 1999) Generally, nodes involving in this network are resource constrained, distributed in nature, and do not depend on any fixed infrastructure. In addition to this, each device act as router in order to forward the packets to other devices hence each node plays a dual role such as device itself as a node and router (Sivagurunathan et al., 2016). It is identified as a suitable technology for various real time applications such as urgent business meetings, games, mine cite operations, disaster relief operations, entertainment, education applications, commercial environment, emergency and rescues scenario, location aware services, collaborative work, military and police operations. Among the applications military is getting more attention since it is need to be established anytime on demand without any pre-determined infrastructure on the battlefield environment. Typically, battlefield environment does not contain any pre-existing infrastructure and soldiers are communicating with each other without support of any dedicated centralized devices on battlefield. Therefore, they are acted as a router and forward the packets of other soldiers/ devices by the way they executing the communication among the soldiers. It is used to connect the soldiers or man equipped devices such as personal digital assistance, cameras, man pact radio, hand held devices and laptops (Sivagurunathan et al., 2015).

Guaranteeing security in MANET environment is complicated task owing to its distinct nature. The basic vulnerability is coming from open and shared wireless environment. Therefore, physical security is low compared with wired environment. Since it is open and no central control entity, any device can easily join and leave so newly joined device may be a compromised device. Because due to lack of right identity of newly joined device. Alternatively, authentication is failed to meet in such environment. Besides, as devices are resource constrained, they will be compromised easily when they loss their energy while performing network operations (Sivagurunathan et al., 2014). Because of the above reasons, security is always one of the active research areas in MANET.

In MANET’s networking operations are efficiently accomplished by routing protocols. Routing operations fully depend on nodes’ cooperation in the network and all the nodes are working with the basic assumption that all the mobile nodes cooperating well in the network. But in reality, it is not so and ensuring such cooperation is always complicated owing to the features of MANET and it also leads to some unsecure routes. Security risks are arising in MANET due to both internal and external attacks and they affect the normal routing operations. Therefore, identifying such attacks are the basic requirements to prove authentication. However, authentication does not guarantee the trusted route because routing operations are still affected by compromised or selfish nodes (Goli´c, 2012). As mentioned earlier, black hole nodes are the ones that retain all incoming packets that are indented to be forwarded to others. To overcome the above shortcomings, an authenticated and trusted AODV protocol to provide authentication as well as form trusted route is proposed.

The remaining of the paper is prepared as follows: section 2 discusses the background and supporting elements of the proposed work, section 3 discusses the existing works have done, section 4 discusses the proposed ATAODV routing protocol, section 5 discusses the mathematical analysis of the proposed work, section 6 discusses the results through simulation and final section discusses the conclusion.

The main contribution of the paper is:

  • To develop Authenticated and Trusted Ad hoc On Demand Distance Vector Routing protocol (ATAODV) to guarantee authentication among the participating soldiers/devices by identify the black hole attack in MANET based military environment.

  • To ensure the secure routing from source to the destination.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 1 Issue (2022)
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing