A Secure and Efficient Routing Protocol with Genetic Algorithm in Mobile Ad-hoc Networks
Abstract
Routing in Mobile Ad-Hoc Networks (MANETs) is a challenging task due to its nature of open medium, infrastructure-lessness, dynamicity and no trusted central authority. In MANET, a node can be compromised during the route discovery process. Attackers from inside or outside can easily exploit the network. Several secure routing protocols have been proposed for MANETs. In this paper, Ad-Hoc On-Demand Distance Vector (AODV) routing protocol is considered due to the fact that it uses the shortest number of wireless hops towards a destination as the primary metric for selecting a route with independence of the traffic congestion. To add security to AODV, Secure AODV was designed to enhance security services to the original AODV. Secure AODV protocol has been designed with cryptographic techniques such as digital signatures and hash chains, which can have a significant impact on the routing performance of AODV routing protocol. To improve efficiency of SAODV, Enhanced SAODV (ESAODV) was proposed based on Genetic Algorithm and alternative path. The genetic algorithm optimizes the routes in terms of selected metrics. The performance and impacts of using AODV, S-AODV and ESAODV routing protocols were compared using NS-2 Simulator. The simulation results demonstrated that using the proposed mechanism could significantly decrease the End-to-end delay and routing overhead.
Keywords
Full Text:
PDFReferences
M.Manjunath, D.H. Manjaiah, “Comparative Study of AODV, SAODV, DSDV and AOMDV Routing Protocols in MANET Using NS2,” in International Conference on Computing and Intelligence Systems, , March 2015, vol. 4, special issue, pp. 1174-1180.
G. Cerri, A. Ghioni, “Securing AODV: The A-SAODV secure routing prototype,” Communications Magazine, IEEE , vol. 46, no. 2, 2008, pp. 120-125.
J. Rajeshwar, Dr. G. Narsimha, “A Comparative Study on Secure Routing Algorithms SAODV and A-SAODV in Mobile Ad-hoc Networks (MANET)- The Enhacements of AODV,” International Journal of Computers and Technology, vol. 3, no. 2, 2012, pp. 419-424.
T. R. Andel, “Surveying Security Analysis Techniques in MANET Routing Protocols,” IEEE Communications Survey, The Electronic Magazine of Original Peer-Reviewed Survey Articles, vol. 9, no. 4, 2007, pp. 70-85.
J. Neeli, Dr. N.k. Cauvery, “Comparative Study of Secured Routing Protocols in Wireless Ad hoc Networks: A Survey,” International Journal of Computer Science and Mobile Computing, vol. 4, no. 2, February 2015, pp. 225-229.
A. k. Mishra, B. D. Sahoo, “A Modified Adaptive-SAODV Prototype for Performance Enhancement in MANET,” International Journal of Computer Applications in Enineering, Technology and Sciences (IJ-CA-ETS), vol. 1, no. 2, 2009, pp. 443-447.
A. Banerjee, “Administrator and Trust Based Secure Routing in MANET,” in Advances in Mobile Network, Communication and its Applications (MNCAPPS), 2012 International Conference on, 2012.
A. Sharma, M. Sinha, “Influence of crossover and mutation on the behavior of Genetic algorithms in Mobile Ad-hoc Networks,” Computing for Sustainable Global Development (INDIACom), International Conference on. IEEE, 2014, pp. 895-899.
J.H. Holland, Adaptation in Natural and Artificial, in The University
of Michigan Press, USA, 1975.
D. Suresh Kumar, K. Manikandan, M.A. Saleem Durai, “Secure on-demand Routing Protocol for MANET Using Genetic Algorithm,” International Journal of Computer Applications, vol. 19, no. 8, April 2011, pp. 29-35.
E. Baburaj, V. Vasudevan, “An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs,” Journal of Networks, vol. 3, no. 6, June 2008, pp. 62-69.
P. Gaur, “An Efficient Routing Implementation Using Genetic Algorithm,” International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 2, no. 7, 2013, pp. 250-257.
P. Singh, G. Singh, “Security issues and link expiration in secure routing protocols in MANET: a review,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 7,July 2014, pp. 7559-7565.