Sec.AODV for MANETs using MD5 with Cryptography

Abstract

Mobile Ad hoc Networks (MANETs) characteristics present major vulnerabilities in security. The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts the network by using variety of attacks and due to insecure routing protocols (e.g. AODV), which were developed without considering security in mind. Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Ad-hoc Networks) are frequently established in insecure environments, which make them more vulnerable to attacks. These attacks are initiated by sharing malicious nodes against different services of network. Ad-hoc On-Demand Distance Vector (AODV) is one such widely used routing protocol that is at present undergo extensive research and development. AODV is based on distance vector routing, but here the updates are shared not on a periodic basis but on an as per demand basis. The control packets contain a hopcount and sequence number field which recognizes the freshness of routing. These fields are editable, so it creates a possible susceptibility that is frequently abused by malicious nodes to advertise false better routes. As well as, transmission of routing updates in form of clear text also reveals crucial information about the network topology, which is again a probable security danger. In this paper we are presenting a novel and practical security mechanism for securing the AODV routing protocol that protects against a number of attacks carried out in MANETs. We will present message digest with secret key mechanism to secure AODV messages which is very effective and less power consuming security solution for MANETs.

Authors and Affiliations

Mr. Suketu D. Nayak and Mr. Ravindra K. Gupta

Keywords

Related Articles

Role of information technology in dissemination and development of education

Information technology has been developed to provide education in different fields like marketing, engineering, arts etc. Some of the technological tools use information technology to spread out or promote education an...

ATTENDANCE SYSTEM BASED ON AUTOMATIC DOOR UNIT RADIO FREQUENCY IDENTIFICATION (RFID)

Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and...

An efficient implementation of Triple DES (Data Encryption Standard) through Hash function

Cryptography, being one of the techniques that is handed out for securing a network. It is utilized by implementing many different algorithms. DES (Data Encryption Standard) is one of the most popular algorithms. But a...

Systematic Design of High-Speed and LowPower Digit-Serial Multipliers VLSI Based

Terms of both latency and power Digit-serial implementation styles are best suited for implementation of digital signal processing systems which require moderate sampling rates. Digit-serial architectures obtain using...

Comparative Approach for Work Study and RTA (Robot Time Analysis) Method on Powder Coating Line Based on Minimization of Cost.

The aim of this research paper is to minimize the processes and production cost in a spray powder line. The coating operation is the bottleneck point in modular furniture industries. For minimize the wastage of the pow...

Download PDF file
  • EP ID EP26523
  • DOI -
  • Views 382
  • Downloads 9

How To Cite

Mr. Suketu D. Nayak and Mr. Ravindra K. Gupta (2011). Sec.AODV for MANETs using MD5 with Cryptography. International Journal of Engineering, Science and Mathematics, 1(6), -. https://europub.co.uk/articles/-A-26523