By Topic

Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Maan, F. ; Nat. Univ. of Sci. & Technol. (NUST), Islamabad, Pakistan ; Abbas, Y. ; Mazhar, N.

Secure routing is an important issue in MANETs. Routing protocols can have vulnerabilities that may be exploited by malicious nodes to disrupt the normal routing behavior. In fact, vulnerabilities may even exist in secure versions of the routing protocols, which makes secure routing a real challenge to achieve. In this paper, we present vulnerability analysis of AODV and Secure AODV (SAODV) routing protocols against routing attacks. SAODV is a secure version of the basic AODV protocol that uses asymmetric key cryptography. We simulate a number of routing attacks to show that SAODV can counter most attacks that are successful against AODV. However, SAODV has vulnerabilities of its own that allow replay attacks to succeed. We, therefore, propose a new security scheme, Robust SAODV (R-SAODV), which incorporates temporal time stamping of SAODV extensions. Temporal time stamping addresses the issue of replay attacks by ensuring the freshness of the exchanged control messages. Our simulation results in ns-2 indicate that our proposed security scheme, R-SAODV, is able to achieve similar performance as SAODV. This implies that we have achieved added security with less additional cost to the system.

Published in:

Wireless Advanced (WiAd), 2011

Date of Conference:

20-22 June 2011