Date post: | 29-Oct-2015 |
Category: |
Documents |
Upload: | sachin-sharma |
View: | 32 times |
Download: | 1 times |
1
CHAPTER1
INTRODUCTION
In our daily life, the importance of computer increases.Itcreatesnew demandsfor
connectivity. Solutions of wired network have been around for a long time but there is
increasing demand on working solutions of wireless network for connecting to the
Internet.
A mobile ad-hoc network (MANET) is a dynamic, wireless distributed network system
which consists of various numbers of mobile devices that are free to move in any
direction, independent of each other. The wireless nodes in MANET can communicate
with each other through a direct wireless link or multi-hop routing within their
communication range; whereas devices that are not in the communication range use
intermediate node(s) to communicate with each other. In these two types of cases, all the
nodes automatically participated in the communication to form a wireless network.
Therefore, this wireless network can be seen as mobile ad hoc network.
Mobilead-hoc networks (MANETs) are future wireless networks consisting entirely of
mobile nodes that communicate on-the-move without base stations. A MANET is a
network consisting of a set of mobile nodes capable of communicating with one another
while not facilitating the infrastructure of the network.
Figure 1.1: Mobile Ad hoc Network[28]
2
1.1Congestion Control
Congestion is a major issue in the MANET. Congestion occurs when the number of
packets is being transmitted through the network anddecreases the packet handling
capacity of the network. If the packet arrives is faster than the routing the packet, then
buffers will full and congestion occurs.
Congestion control is the process of controlling the traffic into the communication
networks. Congestion control concerns controlling traffic into a network, so as to avoid
or minimize interruption by either reducing the rate of sending packets or follows the
different path from source to destination for communication.The goal of congestion
control is to control the overflow of the buffer due to the congestion in the network and
minimize the delay. Congestion control mechanism provides efficiency in the network.
1.2Security
In recent years, security in MANET is expected as the pre-establishment of specific
information among the participating nodes, so that the future communication can be
secured through a newly designed protocol which deploys cryptographic mechanisms
over the pre-established information.
Cryptography is the technique of writing the message secretly code by changing message
into a kind of non-recognizable by its attackers. In cryptography, cryptography is the
technique of remodeling data by encryption formula (called cipher) to form it
undecipherable by anyone except those acquires special information, typically known as
a key. The output of this technique is encrypted data referred to as a cipher text. The
reverse of encoding in cryptography is the process that decrypts the encrypted data by
using key. Cryptography formula will be classified into radially symmetrical (single key)
and uneven (pair of keys) cryptography.
The sender node uses the key to encode the plain text (original) message into cipher text
(encoded)and sends cipher text to destination node. The destination node applies identical
key to decode the cipher text into plain text. The key ought to be strongly shared with
3
destination node before it starts its transmission. The strength of the symmetric key
encryption algorithm depends on the key size used[28].
There are principally five security services [3][7]:
Authentication: Authentication is the process of identifying an individual.
Authentication is the process of determining whether someone or something is, in fact,
who or what it is declared to be. Authentication would possibly involve confirming the
identity of an individual, tracing the source of a whole message.
Confidentiality: Message data is unbreakable, secure from unauthorized party.
Confidentiality is a set of rules that limits access or places restrictions.Confidentiality
refers to limiting information access and disclosure to authorized users and preventing
access by or disclosure to unauthorized ones.Confidentiality is related to the data privacy.
Integrity: Integrity refers to the trustworthiness of information resources.Message is
unedited throughout communication. Integrity is a concept of consistency of methods,
actions, principles, values, measures, expectations, and outcomes.Data cannot be changed
inappropriately either accidently or intentionally.
Non-repudiation: Non-repudiation means that the source of the message cannot deny
having consigned themessage.Non-repudiation is a way to guarantee that the sender of a
message cannot later deny having sent the message and that the recipient cannot deny
having received the message. Non-repudiation can be obtained through the use of digital
signatures.
Availability: Availability of a system is typically measured as a factor of its reliability -
as reliability increases, so does availability. An information system that is not available
when you need it is almost as bad as none at all. Availability of a system may also be
increased by the strategy on focusing of increasing testability & maintainability.
4
1.3Proposed Goals
The objectives of this dissertation are:
Design and implementation of MANETs.
Performing the shortest path from source to destination using existing algorithm.
Implementation of proposed algorithm in MANETs.
Analyzing the delay time in MANETs after including security in existing
algorithm.
Analyzing the throughput of MANETs after including security in existing
algorithm.
1.4Research Methodology
The aim of the proposed work is to implement secure congestion control algorithm on
MANET. In this, MATLAB (R2010b) is used as the tool for successful implementation
of the secure congestion control algorithm as a proposed work.
DES is a block cipher with key length 56 bits.Encryption of a block of message takes
place in 16 rounds. From the key of input, 48 bit size of 16 keys are created, one for each
round. In each round, S-boxes are created. These S-boxes are setup in the specification of
the standard. Using the S-boxes, collections of six bits are mapped to groups of four bits.
The contents of these S-boxes have been defined by the U.S. National Security Agency
(NSA).
The block of the message is divided into two halves. The right half is spread from 32 to
48 bits using another fixed table. The result is combined with the sub-key for that round
by using the XOR operation. Using the S-boxes, the 48 bits of the result are then
transformed again to 32 bits, which are permutated again subsequently byusing another
fixed table. This by now thoroughly shuffled right half is now attached with the left half
using the XOR operation. In the next round, this combination can be used as the new left
half [9].
5
1.5Dissertation Outline
In this chapter, we gives an overview of the proposed goals and research methodology of
the proposed algorithm on MANET and a brief introduction of MANET, Congestion
Control and Security in MANET.
Chapter 2 (BACKGROUND): In this chapter, we describe different security algorithms
for MANET and analysis of security in MANET.
Chapter 3 (LITERATURE REVIEW):In this chapter, weprovide previous research on
MANET, design characteristics in MANET, various different types of security aspects
and security approach in MANET.
Chapter 4 (SECURE CONGESTION CONTROL ALGORITHM): In this chapter,
wedescribe the algorithm on which this dissertation works. Description of security with
congestion control in MANET is the main aim of this chapter.
Chapter 5 (IMPLEMENTATION): This chapter includes the actual implementation of
the simulation a secure congestion control algorithm in MANET to send secure data.
Chapter 6 (RESULTS AND ANALYSIS): In this chapter, we generate the results of the
actual implementation and analyze the performance of the MANET.
Chapter 7 (CONCLUSION AND FUTURE SCOPE): This chapter describes the
conclusion of the work done in this dissertation. In this chapter, we also provide the
future perspective of the work done.
6
CHAPTER 2
BACKGROUND
Mobile ad-hoc network is a self-configuring, infrastructure less, decentralized network
that desires a strong dynamic routing protocol. To accommodate the requirements of
communication for mobile ad-hoc network several routing protocols are planned. A
mobile ad-hoc network is a collection of mobile devices connected by wireless link.
Since every device in a mobile ad-hoc network is to move independently in any direction.
Every device continuously maintains the data needed to properly route traffic that is the
primary challenge in building a mobile ad-hoc networks. Such networks could operate by
themselves or is also connected to the larger network [4].
2.1 Security algorithms in MANET
2.1.1 RSA
RSA is an algorithm for public-key cryptography.RSA stands for Ron Rivest, Adi Shamir
and Leonard Adleman.
RSA uses a public key and a private key. The public key distributed over network and is
used for encrypting messages. Messages which are encrypted by the public key can only
be decrypted by using the private key [5].
The RSA algorithm involves following three steps:
Step 1: Key Generation:
RSA algorithm is generated the keys as following way:
Choose two distinct prime numbers p and q.For security purposes, theinteger’s p and q
should be chosen uniformly at random and should be of similar bit-length. Prime integers
can be efficiently found using a preliminarytest.
Step 1: Compute n = p.q,
n is used as the modulus for both the public and private keys.
7
Step 2: Compute φ(pq) = (p − 1)(q − 1).
Step 3: Choose an integer e such that 1 < e < φ(pq), and e and φ(pq) share no
divisors other than 1 (i.e. e and φ(pq) are co-prime).
e is released as the public key exponent.
e having a short bit-length and small Hamming weight results in more
efficient encryption. However, small values of e(such as e = 3) have been
shown to be less secure in some settings.
Step 4:Determine d (using modular arithmetic) which satisfies the congruence
relation.
de ≡ 1 mod (φ(pq))
Stated differently, ed − 1 can be evenly divided by the quotient (p−1)(q−1)
This is often computed using the extended Euclidean algorithm.
d is kept as the private key exponent.
The public key consists of the modulus n and the public (or encryption) exponent e.The
private key consists of the private (or decryption) exponent d which must be kept secret.
Step 2:Encryption
Destination node transmits its public key (n,e) to source node and keeps the private key
secret. Then, source wants to send message M to Destination. It first turns M into an
integer 0 < m < n by using an agreed-upon reversible protocol known as a padding
scheme. It then computes the cipher text c corresponding to:
C = me mod n.
Source device then transmits c to Destination device.
Step 3: Decryption
Destination node can regenerate m from C by using her private key (n, d) by the
following computation:
D = Cd mod n.
8
2.1.2 Key Distribution
Nowaday, researches show that MANETs are highly vulnerable to various security
threats due to their inherent characteristics. This leaves ad-hoc key management and key
distribution as a wide open problem.In powerful management of keys, keeping the keys is
one of the key factors for the successful diffused deployment of keys of the
cryptography[6].
ID-based cryptography (IBC) has been getting encouragement in recent years. The idea
of identity based cryptosystem was first proposed by Shamir [16] to simplify the
conventional public key cryptosystem, and make the key management easier[17]. Khalili,
et. al introduced a protocol for management and authentication in the ad-hoc network that
is based on an ID-based scheme[18].
2.1.3 Symmetric encryption - DES
Symmetric cryptography is a cryptographic technique using a single key for both
encoding and decoding. A single key is use to make the process of decoding simple
reverse process of encoding. Thus, both sender and recipient choose a key of a given
length and use it to encode and decode message over the network[9][11].
Figure 2.1: Symmetric key encryption & decryption process
Data Encryption Standard (DES)has been a worldwide standard for data encryption for
more than two decades before. On May 15, 1973, National Institute for Security
Technologies (NIST) issued a public request for a data encryption algorithm. This request
eventually resulted in the DES implementation. DES was officially endorsed by the U.S.
government in 1977 as an encryption standard. Although it was originally developed
9
byIBM (who holds the patent for DES). DES is the best-known and most widely used
cryptosystem in the world[10][20].
The algorithm is designed to encode and decode the blocks of data consisting of 64 bits
under control of a 64-bit key. Decoding must be accomplished by using the same key as
for encoding, but with the schedule of addressing the key bits altered so that the decoding
process is the reverse of the encoding process. A block to be encoded is subjected to an
initial permutation (IP), then to a complex key-dependent computation and finally to a
permutation which is the inverse of the IP[21].
Figure 2.2: DES Algorithm
10
Encoding
The input block is of 64 bits that is to be encoded are first subjected to the 64 bits
permutation, is known as the initial permutation i.e. IP:
Table 2.1: Initial Permutation
5850
4234
2618
10 2
6052
4436
2820
12 4
6254
4638
3022
14 6
6456
4840
3224
16 8
5749
4133
2517
9 1
5951
4335
2719
11 3
6153
4537
2921
13 5
6355
4739
3123
1 7
That is the permuted input has 58th bit of the input as the first bit of the IP, 50th bit as its
second bit, and so on with bit 7 as its last bit. Then, IP input block is the input to a
complex key-dependent computation.
The output of that computationsubjected to the following permutation which is the IP -1
(inverse of the initial permutation):
Table 2.2: Inverse of Initial Permutation
40 84
816
5
624
6
432
39 74
715
5
523
6
331
38 6 4 14 5 22 6 30
11
6 4 2
37 54
513
5
321
6
129
36 44
412
5
220
6
028
35 34
311
5
119
5
927
34 24
210
5
018
5
826
33 14
19
4
917
5
725
Theoutput of the algorithm has 40th bit of the IP-1as its first bit, 8th bit as its second bit,and
so on, until 25th bit of the IP-1 block is the last bit of the output.
The computation which uses the permuted input block as the input of the algorithm to
produce the IP block consists, but for a final exchange of blocks of 16 rounds of a
calculation that is described below in terms of the cipher function f which operates on
two blocks, one of 32 bits and one of 48 bits, and produces a block of 32 bits. The 64 bits
of the input block provided to a round consist of a 32 bit block L followed by a 32 bit
block R.
Using the notation defined in the introduction, the input block is then LR.
Let K be a block of 48 bits chosen from the 64-bit key. Then the output L'R' of iteration
with input LR is defined by:
L' = R
R' = L Ө f(R,K)
Where, Ө denotes bit-by-bit addition modulo 2.
12
The input of the first iteration of the calculation is the inverted input block. If L'R' is the
output of the 16thiteration. Then R'L' is the IP block. At each iteration, a different block K
of key bits is chosen from the 64-bit key designated by KEY.
Decoding
The permutation IP-1 applied to the IP block is the inverse of the IP applied to the input.
Further, from (1) it follows that:
R = L'
L = R' Ө f(L',K)
Consequently, the same algorithm is to be applied to decode the encoded message block.
The same block of key bits K is used at each round of the computation during decoding
as was used during the encoding of the block.
Using the notation, this can be expressed by the equations:
Rn-1 = Ln
Ln-1 = Rn Өf(Ln,Kn)
Where R16L16 is inverted input block for the decoding calculation and L0R0 is the IP
block. That is, for the decoding calculation with R16L16 as the permuted input, K16 is used
in the first round, K15 in the second, and so on, with K1 used in the 16th round.
The Cipher Function f
A sketch of the calculation of f(R,K) is given in
13
Figure 2.3: Calculation of f(R, K)
Let E denote a function which takes a 32 bits block as input and yields a 48 bits block as
output. Let E be such that the 48 bits of its output, inscribed as 8 blocks of 6 bits each, are
acquired by selecting the bits in its inputs in order according to the following table:
Table 2.3: E Bit Selection
32 1 2 3 4 5
4 5 6 7 8 9
8 9 10 11 1
2
13
12 1
3
14 15 1
6
17
16 1 18 19 2 21
14
7 0
20 2
1
22 23 2
4
25
24 2
5
26 27 2
8
29
28 2
9
30 31 3
2
1
Thus the first three bits of E(R) are the bits in positions 32, 1 and 2 of R while the last 2
bits of E(R) are the bits in positions 32 and 1. Each of the unique selection functions
S1,S2...S8 takes a 6-bit block as input and yields a 4-bit block as output and is illustrated
by using a table containing the recommended S1:
Table 2.4: S-1
Column No.
Row No. 0 1 2 3 4 5 6 7 8 9 10 11 1
2
13 14 15
0 1
4
4 13 1 2 15 11 8 3 10 6 12 5 9 0 7
1 0 15 7 4 1
4
2 13 1 1
0
6 12 11 9 5 3 8
2 4 1 14 8 1
3
6 2 11 1
5
12 9 7 3 10 5 0
3 1
5
12 8 2 4 9 1 7 5 11 3 14 1
0
0 6 13
If S1 is the function defined in this table and B is a 6-bits block, then S1(B) is defined as
follows: The first bit and last bit of B represent in base 2 a number in the range 0 to 3.
15
Let that number be i. The middle 4 bits of B represent in base 2 a number in the range 0
to 15.
Let that number be j. Look up in the table the number in the row i and column j. It is a
number in the range of 0 to 15 and is uniquely represented by a 4 bit of block. That block
is the output S1(B) of S1 for the input B.
The permutation function P yields an output of 32-bit from an input of 32-bit by
permuting the bits of the input. Such a function is defined by the following table:
Table 2.5: P
16 7 20 21
29 12 28 17
1 15 23 26
5 18 31 10
2 8 24 14
32 27 3 9
19 13 30 6
22 11 4 25
The output P(L) for the function P determined by this table is obtained from the input L
by taking the 16th bit of L as the first bit of P(L), the 7th bit as the second bit of P(L),
and so on until the 25th bit of L is taken as the 32nd bit of P(L).
Now let S1,...,S8 be eight distinct functions to select, let P be the permutation function
and let E be the function defined above.
To define f(R,K) firstly define B1,...,B8 to be blocks of 6 bits each for which
B1B2...B8 = K Ө E(R)
The block f(R,K) is then defined to be
P(S1(B1)S2(B2)...S8(B8))
16
As output.
Thus K Ө E(R) is first divided into the 8 number of blocks. Then each Bi is taken as an
input to Si and the 8 blocks S1(B1),S2(B2),...,S8(B8) of 4 bits each are unified into a
single block of 32 bits which forms the input to P.
2.2 Analysis of Security
Several attacks are designed to analysis the security of the key exchange protocol, as the
follows[6]:
2.2.1 Prevention from brute-force attacks
Attack 1:If an attacker can derive the private key d from the public key of the key
generator by computing d = e-1 mod ᶲ(n), then he can obtain gj by computing gi = IDid
mod n; thus he can play the role of Uito forge (IDj, yi ,ti, si, Tj). However derive the
private key d using the operation d = e-1mod f (n) needs to factor the large integer n.
Attack 2: The user Ui picks out a number R such that IDj (IDi, Re )mod n, where
gcd(R,n)=l, and computes the private information of Uj using gj = ID jd = IDi
d.R = gi.Rmod
n, then he can play the role of U j to develop (IDj,yj,tj,sj,Tj). However, before picks out the
number R, the security key d is required for the operation of R =( IDjIDi
)d mod n as Attack
1, he still needs to factor n.
2.2.2 Prevention of replay attacks
In each of the communication sessions during key exchange, “two-way” authentication
has been adopted to prevent the replaying attack. During key exchange process, user foils
the replay attack by checking the freshness of datum using random number and
timestamp.
2.2.3 Prevention of man-in-the-middle attacks
17
The proposed scheme avoids Man-in-the-middle attack. When U isending (IDjyi, ti,si,Tj) to
Uj, an adversary can intercept the datum from the public channel, then plays the role of U i
to cheat Ujor another users using (IDj yi, ti, si, Tj).Both the timestamp Tiand the
identification information IDj are inputs of the one-way function h() and used in the
operation of si = gi .rih ( yi ,ti ,Ti , IDj)mod n.
18
CHAPTER 3
LITERATURE REVIEW
H. Zare, F. Adibnia, V. Derhami (2013) proposed “A Rate based Congestion
Control Mechanism using Fuzzy Controller in MANETs”[22].
The traditional congestion control mechanism TCP performs very poorly in MANETs.
Because there are a number of new challenges such as wireless link error, medium
contention and frequent route failures in this kind of networks. In this paper, the authors
proposed a fuzzy ad-hoc rate-based congestion control (FARCC) to enhance the
efficiency of network in MANETs. In FARCC, they use a rate-based transmission
scheme using two fuzzy controller of zero order Takagi Sugeno Kang (TSK) model to
congestion detection and congestion control. The FARCC sender adjusts data rate by
receiving a feedback packet from FARCC destination. In this research, NS2-based
simulation results showed that FARCC outperforms ITP and ATP to achieve, in terms of
throughput and fair resource allocation in ad-hoc networks under random topology.
Chun-Ta Li, Chi-Yao Weng et al. (2013) introduced “Security Flaws of a Password
Authentication Scheme for Hierarchical WSNs”[23].
With the growing popularity of sensor-based monitoring devices, sensor networks are
becoming an essential part of wireless heterogeneous networks and numerous researches
have been widely studied in recent years. Recently, Das et al. proposed a dynamic
password-based user authentication scheme with dynamic node addition for hierarchical
wireless sensor networks (WSNs). They claimed that their scheme achieves better
security as compared to those for other existing password-based user authentication
approaches. However, the authors observed that Das et al.'s scheme is vulnerable to smart
card breach attack, privileged-insider attack, and many logged-in users' attack and is not
easily reparable. By adopting power analysis attacks, they found their protocol may suffer
from off-line password guessing attacks, impersonation attacks, compromised cluster
19
head attacks and any attacker who possesses the legitimate user's smart card can easily
launch a many logged-in users' attack.
Dr.U.Karthikeyan , R.Aravindhan,(2013) worked on “ Secured Data Delivery for
Mobile Ad-hoc Networks”[24].
Mobile ad-hoc Network is an infrastructure less and decentralized network which needs a
robust dynamic routing protocol. To accommodate the needs of communications for
Mobile ad-hoc Network many routing protocols have been proposed. In this research,
there is problem in delivering data packets for highly dynamic mobile ad hoc networks in
a reliable and timely manner. The existing ad hoc routing protocols are susceptible to
node mobility for the large scale networks. An efficient Position-based Opportunistic
routing protocol was introduced for this issue. It takes advantage of the stateless property
of geographic routing and the broadcast nature of wireless medium. Some of the neighbor
nodes that have overheard the transmission will serve as forwarding candidates when a
data packet is sent out and forward the packet if it is not relayed by the specific best
forwarder within a certain period of time.
Mr. Abhishek Bande & Mr. Gaurav Deshmukh (2012) worked on “An
Improvement in Congestion Control Using Multipath Routing in MANET”[25].
In ad-hoc network nodes are movable and there is no centralized management. Routing
is an important factor in mobile ad hoc network which not only works well with a small
network, but also it can also work well if network get expanded dynamically. Routing in
MANETS is a main factor considered among all the issues. Mobile nodes in MANET
have limited transmission capacity; they intercommunicate by multi hop relay. Multi hop
routing have many challenges such as limited wireless bandwidth, low device power,
dynamically changing network topology, and high vulnerability to Failure. To answer
those challenges, many routing algorithms in MANETs were proposed. But one of the
problems in routing algorithm is congestion which decreases the overall performance of
the network so in this research the authors are trying to identify the best routing algorithm
which will improve the congestion control mechanism among the entire Multipath
routing protocols.
20
Robin Choudhary, Niraj Singhal (2012) proposed “A Novel Approach for
Congestion Control in MANET”[26].
In mobile ad-hoc networks have limited bandwidth and are more prone to error than
wired networks which further impose limits on the amount of data that can be sent. In
order to conserve the limited resources, it is highly desirable that transmission should be
as efficient as possible with minimal loss. The objective of congestion control is to limit
the delay and buffer overflow caused by network congestion and provide better
performance of the network. The traditional congestion control mechanism, applied by
the transport control protocol is unable to catch up the network dynamics of ad-hoc
networks. Congestion control assumes all losses induced by congestion. In this research,
a novel approach of congestion control for supporting applications like multimedia
streaming over MANET is being proposed.Result from this research had shown that
MANET performance can be improved by using novel approach as it reduces packet loss
ratio and increase transmission efficiency. Moreover, its computational burden is
negligible; it is ideally suited for resource constrained environment such as MANETs.
Prasad Lokulwar And Vivek Shelkhe,(2012) worked on “Security Aware Routing
Protocol For Manet Using Asymmetric Cryptography Using RSA Algorithm”[27].
Mobile ad-hoc networks (MANETs) are temporary networks that are built up
momentarily in order to satisfy a certain emergency. Ad-hoc networks are in a great
demand now-a-day and have a lot of advantages like emergency control, short term
connections for roaming subscribers, etc. In this research, authors had designed the Ad
Hoc on Demand Routing Protocol (AODV) using RSA algorithm on platform NS. Which
is efficient as well as they had implemented the security technique so they can prevent
the data loss at the time of transmission. The main advantage of using the Network
Simulator for the design of AODV is that they can actually observe the working of the
specific protocol without the establishment of the network as NS provides the
environment for the working of protocol.
21
S.Sudha, V.Madhu Viswanatham et al. (2012) proposed “Implementation of
Enhanced Data Encryption Standard on MANET with less energy consumption
through limited computation”[28].
A mobile ad-hoc network (MANET) is a self-organizing system of mobile nodes. The
nodes in MANET are free to move arbitrarily in any direction. The nature of the mobile
ad-hoc network (MANET) makes them very vulnerable to an adversary’s security threats.
Providing security through cryptographic algorithms in these networks is very important.
To provide an information security in MANET symmetric encryption algorithms play a
main role among all of the cryptographic algorithms. Encryption algorithms used to
provide information security are known to be computationally intensive. This algorithm
consumes a significant amount of computing resources such as memory, processing time
and battery power. A mobile node consists of very limited resources, especially limited
battery power, is subject to the problem of more energy consumption due to encryption
algorithms. Designing an energy efficient security algorithm requires an understanding of
the common encryption schemes related to the energy consumption. This research
paperrepresents an Enhancement to Data Encryption Standard algorithm in terms of less
energy consumption through limited computation by reducing number of rounds and
increasing key size. In this research,a proposed new algorithm EDES uses limited
computation by reducing the number of rounds used in DES algorithm by which energy
consumption is reduced and security is improved than DES in terms of brute force attack,
differential crypto analysis attack by increasing the key size. Symmetric key also shared
by using one of the public key crypto systems Diffie-Hellman key exchange algorithms
based on discrete logarithm problem. Since the less energy consumption and security is
the major requirement in the MANET, the EDES algorithm is one of the most suitable
encryption algorithms for MANET nodes.
Gulshan Kumar et al. (2011) introduced “DSAB – A Hybrid Approach for
Providing Security in MANET”[29].
With the pace of life, technology has also been evolved. The authors have moved from
the fixed transmission to the mobility aspect. In today’s environment, MANETs is of
great importance. The dynamic feature of MANETs makes the networks vulnerable to
22
different security attacks. So, it is great concern to provide security and authentication
along with power utilization and robustness for the MANETs for successful transmission.
In this research, they had introduced a novel hybrid security approach by using digital
signature (DSA) with Blowfish algorithm (DSAB) and compared its performance with
existing encryption techniques like DES.
D.SuganyaDevi et al. (2010) proposed “Secure Multicast Key Distribution for
Mobile ad-hoc Networks”[30].
Many emerging applications in mobile ad-hoc networks involve group-oriented
communication. Multicast is an efficient way of supporting group oriented applications,
mainly in mobile environment with limited bandwidth and limited power. For using such
applications in an adversarial environment as military, it is necessary to provide secure
multicast communication. Key management is the fundamental challenge in designing
secure multicast communications. In many multicast interactions, new member can join
and current members can leave at any time and existing members must communicate
securely using multicast key distribution within constrained energy for mobile ad-hoc
networks. This has to overcome the challenging element of “1 affects n” problem which
is due to high dynamicity of groups. Thus, this research shows the specific challenges
towards multicast key management protocols for securing multicast key distribution in
mobile ad-hoc networks and present relevant multicast key management protocols in
mobile ad hoc networks. A comparison is done against some pertinent performance
criteria.This research presents challenges, constraints and requirements for securing
multicast key distribution for mobile ad-hoc networks. It also presents taxonomy of key
management protocols. This research suggested OMCT (Optimized Multicast Cluster
Tree) is a scalable scheme, which provides secure multicast communication in mobile ad-
hoc network. This scheme is based on simple technique of clustering and key
management approach. Thus, this approach is scalable and efficient for dynamic
multicast groups.
23
Pradeep Rai et al. (2010) surveyed “A Review of ‘MANET’s Security Aspects and
Challenges”[31].
Mobile ad-hoc Network (MANET) is a collection of communication devices or nodes
that wish to communicate without any fixed infrastructure and pre-determined
organization of available links. The nodes in MANET themselves are responsible for
dynamically discovering other nodes to communicate. Although the ongoing trend is to
adopt ad-hoc networks for commercial uses due to their certain unique properties, the
main challenge is the vulnerability of security attacks. A number of challenges like open
peer-to-peer network architecture, stringent resource constraints, shared wireless
medium, dynamic network topology etc. are posed in MANET. MANET is quickly
spreading for the property of its capability in forming temporary network without the aid
of any established infrastructure or centralized administration. A security challenge has
become a primary concern to provide secure communication. In this research, they
identified the existent security threats an ad-hoc network faces. To accomplish their goal,
they had done literature survey in gathering information related to various types of
attacks and solutions. In our study, we have found that necessity of secure routing
protocol is still a burning question. There is no general algorithm that suits well against
the most commonly known attacks such as wormhole, rushing attack etc. However, in
short, they can say that the complete security solution requires the prevention, detection
and reaction mechanisms applied in MANET.
Alexis Bonnecaze et al. (2009) worked on “On Key Distribution in MANETs”[32].
In this, authors firstly reviewed and compared private key distributions in MANETs
based on secret sharing schemes. Since there exist many kinds of networks with different
objectives and constraints. Then, they determine the suitable private key distribution
scheme according to the nature of the network. They also stress that identity-based
cryptography represents a valuable security solution as it provides many interesting
features for MANETs.
24
Nishu Garg, R.P.Mahapatra (2009) introduced “MANET Security Issues”[33].
When a routing protocol for MANET (mobile and ad-hoc networks) does a route
discovery, it does not discover the shortest route but the route through which the route
request flood travelled faster. In addition, since nodes are moving, a route that was the
shortest one at discovery time might stop in a short period of time. This causes, not only a
much bigger end-to-end delay, but also more collisions and faster power consumption. In
order to avoid all the performance loss due to these problems, this research develops a
technique to periodically discover shortcuts to the active routes that can be used with any
destination vector routing protocol. It also shows how the same mechanism can be used
as a bidirectional route recovery mechanism. They considered the problem of
incorporating security mechanisms into routing protocols for ad-hoc networks. Security
solutions like IPsec are not applicable. They looked at AODV in detail and develop a
security mechanism to protect its routing information. They also briefly discussed
whether their techniques would also be applicable to other similar routing protocols and
about how a key management scheme could be used in conjunction with the solution that
they provide.
Christian Lochert et al. (2007) reviewed on “A Survey on Congestion Control for
Mobile Ad-Hoc Networks”[34].
Congestion control is a key problem in mobile ad-hoc networks. The standard TCP
congestion control mechanism is not able to handle the special properties of a shared
wireless multihop channel well. In particular, the frequent changes of the network
topology and the shared nature of the wireless channel pose significant challenges. Many
approaches have been proposed to overcome these difficulties. In this research, the author
gave an overview over existing proposals, explain their key ideas and show their
interrelations.
Sandhya Khurana Neelima Gupta et al.,(2006) proposed “Reliable Ad-hoc On-
demand Distance Vector Routing Protocol”[35].
Mobile ad-hoc Networks (MANETs) properties present major vulnerabilities in security.
The threats considered in MANETS are due to maliciousness that intentionally disrupt
25
the network by using variety of attacks and due to selfishness of node which do not
perform certain operations due to a wish to save power. In this research, a co-operative
security scheme called Reliable Ad-hoc On-demand Distance Vector (RAODV) routing
protocol based on local monitoring has been proposed to solve the problem of attack by
malicious node as well as selfish behavior. RAODV behaves as AODV in the absence of
attack. It detects and isolates misbehaving nodes in the presence of attack. Also it
recovers from the attack when a misbehaving node leaves the network or becomes good.
Gergely ´Acs et al., (2005) worked on “Provable Security of On-Demand Distance
Vector Routing in Wireless Ad-hoc Networks”[36].
In this research, they proposed a framework for the security analysis of on-demand,
distance vector routing protocols for ad-hoc networks, such as AODV, SAODV, and
ARAN. The proposed approach is an adaptation of the simulation paradigm that is used
extensively for the analysis of cryptographic algorithms and protocols, and it provides a
rigorous method for proving that a given routing protocol is secure. They demonstrated
the approach by representing known and new attacks on SAODV in their framework, and
by proving that ARAN is secure in their model.
26
CHAPTER 4
SECURE CONGESTION CONTROL ALGORITHM
The major issue in MANETs is congestion control with security. In MANETs, any active
node can be communicated with any other active node using intermediate node. An
important objective of this algorithm is to send secure data from valid source to valid
destination without congestion. Maintaining and allocating network resources effectively
and fairly among a collection of users is a major issue. The resources shared mostly are
the bandwidth of the links and the queues on the routers. Packets are queued in these
queues awaiting transmission. When too many packets are contending for the identical
link, the queue overflows and packets have to be dropped. When such drops become
general events, the network is said to be congested. In ad-hoc networks, since there is no
fixed infrastructure there are no separate network elements called routers and hence the
mobile nodes themselves act as the routers. The source is informed about the congestion
in the network so that either it may slow down the packet transmission rate or find an
alternate route which may not necessarily be an optimal route. It must be pointed out that
all the congestion control methods are able to inform the source about the congestion
problem because they use Transmission Control Protocol (TCP)[28][38][39].
4.1 Congestion control with Security Algorithm
4.1.1 Assumption
In MANETs, the following assumptions are:
The Grid is implemented in 2-D.
Source node and destination node is selected using random function.
Key is generated at each node using random function.
Data at source node and destination node are encrypted and decrypted by
usingDES algorithm.
27
Establish Grid Topology with 70 nodes
Generate the KEY at each node using random function
Encrypt the KEY at each node using DES
Select source & destination.
Select next node from the current node such that next node minimum neighbor.
If Next node is Destination
YES
NO
4.1.2 Proposed Algorithm
Step1: Establish Grid Topology with 70 nodes.
Step2: Generate the KEY at each node using random function.
Step3: Encrypt the KEY at each node using DES.
Step4: Select source & destination.
Step5: Select next node from the current node such that next node minimum neighbor.
Step6: If next node is Destination, then transfer the data.
Else go to step 5.
Step7: Decrypt the KEY.
Step8: If KEY matches, then Data transferred successfully.
Else go to step 5.
28
Figure 4.1: Flowchart of Proposed Algorithm
CHAPTER 5
IMPLEMENTATIONS
5.1 Simulation Tool
MATLAB 7.11.0 (R2010b) Math works Product
MATLAB (Matrix laboratory) is an interactive software system for numerical
computations and graphics. As the name suggests, MATLAB is especially designed for
matrix computations: solving systems of linear equations, computing eigenvalues and
eigenvectors, factoring matrices, and so forth. In addition, it has a variety of graphical
capabilities, and can be extended through programs written in its own programming
language. Many such programs come with the system; a number of these extend the
capabilities of MATLAB to nonlinear problems, such as the solution of initial value
problems for ordinary differential equations.
MATLAB is designed to solve problems numerically, that is, in finite-precision
arithmetic. Therefore it produces approximate rather than exact solutions, and should not
be confused with a symbolic computation system (SCS) such as Mathematica or Maple.
It should be understood that this does not make MATLAB better or worse than an SCS; it
is a tool designed for different tasks and is therefore not directly comparable.
MATLAB is widely used in all areas of applied mathematics in education and research at
universities and in the industry. MATLAB stands for MATrix LABoratory and the
software is built up around vectors and matrices. This makes the software particularly
useful for linear algebra but MATLAB is also a great tool for solving algebraic and
differential equations and for numerical integration. MATLAB has powerful graphic
tools and can produce nice pictures in both 2D and 3D. It is also a programming language
29
(similar to C) and is one of the easiest programming languages for writing mathematical
programs. MATLAB also has some tool boxes useful for signal processing, image
processing, etc.
5.2Installation
Step 1: Start the Installer
The method you use to start the installer depends on your platform.
Windows Systems — Insert the DVD into the DVD drive connected to your system
or double-click the installer file you downloaded from the MathWorks Web site. The
installer should start automatically.
Linux Systems — Insert the DVD into the DVD drive connected to your system and
execute the following command:/path_to_dvd/install &If you are installing from
downloaded files, extract the installer from the archive file and execute the installer
command:./install
Macintosh Systems — Insert the MathWorks DVD into the DVD drive connected to
your system or download product files from the MathWorks Web site. When the
DVD icon appears on the desktop, double-click the icon to display the DVD contents,
and then double-click the Install for Mac OSX icon to begin the installation.
Step 2: Choose to Install Without Using the Internet
If you do not have an Internet connection, select the Install without using the Internet
option and click Next.
30
Step 3: Review the License Agreement
Review the software license agreement and, if you agree with the terms, select Yes and
click Next. After the installation is complete, you can view or print the license agreement
using the file license.txt located in the top-level installation folder.
31
Step 4: Specify the File Installation Key
If you do not have an Internet connection, and choose to install manually, the installer
displays the File Installation Key dialog box. A File Installation Key identifies the
products you can install. If you have the key, select the I have the File Installation Key
formy license option, enter the File Installation Key, and click Next. The administrator
contact on a license can retrieve the File Installation Key from the License Center at the
Math Works Web site. If you do not have the key, select the I do not have the File
InstallationKey option and click Next. The installer will provide you with the
information you need to get a key.
If You Do Not Have the File Installation Key
The Installation and Activation Next Steps dialog box contains the information you need
to retrieve your File Installation Key from the License Center at the MathWorks Web
site.
This information includes:
Host ID
32
Release number (for example, R2010b)
Operating system user name (Note that user names are case-sensitive in activation.)
To get you’re File Installation Key:
1 Remember the information displayed in this dialog box and click Finish to exit the
installer. On Windows and Linux systems, you can click Print to print out the
information.
2 Go to a computer with an Internet connection and log in to your account at the
MathWorks Web site.
3 Visit the License Center and enter the information from this dialog box. MathWorks
uses this information to generate a File Installation Key and License File for your license.
4 Return to your computer and re-run the installer. With the File Installation Key and a
License File, you can install and activate the software without an Internet connection.
33
Step 5: Choose the Installation Type
In the Installation Type dialog box, specify whether you want to perform a Typical or
Custom installation and click Next.
Choose Typical if you have an Individual or Group license and do not need to specify
which products you want to install and do not need to access any installation options.
Choose Custom if you need to specify which products to install, need access to
installation options, or need to install the license manager (network license options
only).
Step 6: Specify the Installation Folder
Specify the name of the folder where you want to install MathWorks products. Accept
the default installation folder or click Browse to select a different one. If the folder
doesn’t exist, the installer creates it. On Macintosh systems, the installer puts the
34
MATLAB application package, MATLAB_R2010b.app, in the Applications folder, by
default. When specifying a folder name, you can use any alphanumeric character and
some special characters, such as underscores. The installer will tell you if the name you
specified includes any characters that are not permitted in file names. If you make a
mistake while entering a folder name and want to start over, click Restore Default
Folder. After making your selection, click Next.
Step 7: Specify Products to Install (Custom Only)
If you are performing a custom installation, you can specify which products you want to
install in the Product Selection dialog box. This dialog box lists all the products
associated with the license you selected or with the Activation Key you specified. In the
dialog box, all the products are preselected for installation. If you do not want to install a
particular product, clear the check box next to its name. After selecting the products you
want to install, click Next to continue with the installation.
35
Step 8: Specify Installation Options (Custom Only)
For Custom installations, you can specify several installation options, depending on your
platform.
Windows Systems
On Windows system, the Installation Options dialog box presents the following options:
Determining whether the installer puts shortcuts for MATLAB software in the Start
menu and on the desktop.
Specifying which files the operating system associates with MATLAB, based on their
file extension. The installer preselects the extensions associated with products you are
installing. After selecting installation options, click Next to proceed with the
installation.
36
Step 9: Confirm Your Choices and Begin Copying Files
Before it begins copying files to your hard disk, the installer displays a summary of your
installation choices. To change a setting, click Back. To proceed with the installation,
click Install.
37
Step 10: Complete the Installation
When the installation successfully completes, the installer displays the Installation
Complete dialog box. In this dialog box, you can choose to activate the software you just
installed. You cannot use the software you installed until you activate it. MathWorks
recommends activating immediately after installation. Click Next to proceed with
activation. If you choose to exit the installer without performing activation, clear the
Activate MATLAB option and click Finish (the button label changes). You can activate
later using the activation application.
38
Step 11: Activate Your Installation
Because you were not logged in to your MathWorks Account during installation, or you
started the activation application independently, you must choose whether to activate
automatically or manually. Select the Activate manually without the Internet option
and click Next.
39
Step 12: Specify the Path to the License File
To activate without an Internet connection, you must have a License File. The License
File identifies which products you can run. The administrator contact on the license can
retrieve the License File from the License Center at the MathWorks Web site. Select the
Enter the path to the License File option and enter the full path of your License File in
the text box (or drag and drop the file) and click Next If you do not have your License
File, select the I do not have a license file option and click Next to get information about
how to retrieve a License File.
40
Step 13: Complete the Activation
After activating your installation, click Finish to exit the activation process
41
5.3Starting MATLAB
After installing, you can enter MATLAB by double-clicking on the MATLAB shortcut
icon (MATLAB 7.0.4) on your Windows desktop. When you start MATLAB, a special
window called the MATLAB desktop appears. The desktop is a window that contains
other windows. The major tools within or accessible from the desktop are:
The Command Window
The Command History
The Workspace
The Current Directory
The Help Browser
The Start button
42
Figure 5.1: The graphical interface to the MATLAB workspace
When MATLAB is started for the first time, the screen looks like the one that shown in
the Figure. This illustration also shows the default configuration of the MATLAB
desktop. You can customize the arrangement of tools and documents to suit your needs.
You are now faced with the MATLAB desktop on your computer, which contains the
prompt (>>) in the Command Window. Usually, there are 2 types of prompt:>> for full
version &EDU> for educational version.
Note: To simplify the notation, we will use this prompt, >>, as a standard prompt sign,
though our MATLAB version is for educational purpose.
5.4 Quitting MATLAB
To end your MATLAB session, type quit in the Command Window, or select File -> Exit
MATLAB in the desktop main menu.
43
CHAPTER 6
RESULTS& ANALYSIS
6.1 ResultsBased on the implementation of Security with congestion control algorithm in MANET,
following is the result obtained:
Design a Grid topology of 70 nodes as 7x10 matrix. Position of each node on the grid is calculated as:
posx(1,(i-1)*10+j)=30+j*30; posy(1,(i-1)*10+j)=(i-1)*40+30;
Foreach node in ith row and jth column.
Figure 6.1: Grid Topology with 70 Nodes
44
Generate a Key at each node on the network.
Figure 6.2(i): Key Distribution
Figure 6.2(ii): Key Distribution
45
Encrypt of the key is done by using DES algorithm.
Figure 6.3(i): Encrypted Key
Figure 6.3(ii): Encrypted Key
46
Source node and destination node are select at random using random function.
Figure 6.4: Shows Source as S and Destination as D
47
Optimal path from source node to destination node is selected using existing algorithm.
Figure 6.5: Path from S to D
48
Decryption of the Key is done by using DES Algorithm.
Figure 6.6(i): Decrypted Key
Figure 6.6(ii): Decrypted Key
49
6.2 Performance Evaluation
We performed a number of simulation runs for the different number of packets sends
over the network.
Table 6.1 show the value of Delay & Throughput of different simulation runs using
different number of packets with security.
Table 6.1: Congestion Control with Security
Total Packets DelayThroughpu
t600 1.0838 553.5959700 1.0939 639.911800 1.0779 834.9685900 1.0859 828.7926
1000 1.0779 927.7083
Table 6.2 show the value of Delay & Throughput of different simulation runs using
different number of packets without security.
Table 6.2: Congestion Control without Security
Total Packets DelayThroughpu
t600 1.165 515.0185700 1.1621 602.3494800 1.112 719.4257900 1.0943 822.4699
1000 1.1604 861.7885
50
600 700 800 900 10001.021.041.061.08
1.11.121.141.161.18
Delay
Existing Proposed
Number of Packets
Del
ay
Figure 6.7: Delay versus Number of Packets
Delay is an important design and performance characteristics of MANETs. The delay of
the n/w specifies how long it takes for a bit of data to travel across the n/w from source
node to destination node. In the above figure 6.7, shows the delay time of existing and
proposed algorithm in MANETs.
600 700 800 900 10000
200
400
600
800
1000
Throughput
ExistingProposed
Number of Packets
Thr
ough
put
Figure 6.8: Throughput versus Number of Packets
Throughput in the network is the average rate of successful data delivery between nodes
over the network. In figure 6.8, shows the throughput of the existing and proposed
algorithm in the MANET.
51
CHAPTER 7
CONCLUSION AND FUTURE WORK
7.1 CONCLUSION
In this dissertation, we define the problem of secure data delivery in mobile ad-hoc
networks. We propose a secure congestion control algorithm in MANET which sends the
encrypted data from source node to destination node by using congestion controlled path
and decrypt the data at the destination node. Destination node decrypts the data into
original form, if it has a valid key through which received data is decrypted. To inhibit
the data misuse and loss of data, we have implemented the security using symmetric
technique. The encryption and decryption are used for the security in congestion control
mechanism. In this proposed work, we use the DES encryption system for the encrypting
of the data to be sent. Then, choose the path between source and destination with the use
of congestion control mechanism and data are sent to the destination nodes via
intermediate node. Finally, we use the DES decryption system for the decryption of the
received data.
After implementing the proposed algorithm, we analyze the delay time and throughput.
Average delay time of congestion control with security is decreased as compare to the
congestion control without security and Throughput of congestion control with security is
increased as compare to congestion control without security.
According to the performance analysis, the proposed work is more efficient because it
provides security, reduces the delay time and increases the throughput.
7.2 FUTURE WORK
In the present work, we have used security algorithm to provide the secure congestion
controlled path for communication in MANETs. This work can be extended in different
manners:
52
1. We can combine the security in congestion controlled network using Genetic
Algorithms.
2. We can minimize the overhead of security algorithm in the network.
3. We can use different algorithms and protocols for providing more security in
MANETs.
53
References
[1] Neeraj Tantubay, Dinesh Ratan Gautam and Mukesh Kumar Dhariwal“A Review of
Power Conservation in Wireless Mobile Ad-hoc Network (MANET)”, In Proceeding
ofIJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July
2011.
[2]Md. Mahbubul Alam, ID- 09221116 and Tanmoon Taz Shetu, “Congestion control in
Mobile Ad-Hoc Networks (MANETs)”.
[3] Pradeep Rai, Shubha Singh “A Review of 'MAENT's Security Aspects and
Challenges” In Proceeding of IJCA Special Issue on “Mobile Ad-hoc Networks”
MANETs, 2010.
[4] Dr.U.Karthikeyan, R.Aravindhan. “Secured Data Delivery for Mobile Ad-hoc
Networks” In Proceeding of International Journal of Research in Computer Engineering
and Electronics: 1, VOl. 2 ISSUE 1, Feb 2013.
[5] Prasad Lokulwar, Vivek Shelkhe “Security Aware Routing Protocol for MANET
using Asymmetric Cryptography Using RSA Algorithm” In Proceeding of BIOINFO
Security Informatics, Vol. 2, Issue 1, pp.-11-14, 2012.
[6] Prof. Anil Kapil & Mr. Sanjeev Rana,“Identity-Based Key Management in MANETs
using Public Key Cryptography”, In Proceeding of International Journal of Security (IJS),
Vol. 3, Issue 1, 2005.
[7] Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai “DSAB – A Hybrid Approach for
Providing Security in MANET”, In Proceeding of International Journal Of Information
Security Science, Vol.1, No.3, 2011.
[8] Venkatesan Balakrishnan and Vijay Varadharajan “Designing Secure Wireless
Mobile Ad hoc Networks” .
[9] thesis-The adaptation of security mechanisms(DES)
[10] Tara M., Charles R.Elden, 2002. “Wireless security and privacy Best
Practices and Design Techniques”, Addison Wesley.
54
[11] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing Robust and Ubiquitous
Security Support for Mobile Adhoc Networks”, In Proceeding of IEEE Int’l Conf.
Network Protocols, Nov. 2001.
[12] M. Narasimha, G. Tsudik, and J.H. Yi, “On the Unitility of Distributed
Cryptography in P2P and Manets: The Case of Membership Control”, In Proceeding of
IEEE Int’l Conf. Network Protocols Nov. 2003.
[13] S. Yi and R. Kravets, “Moca: Mobile Certificate Authority Wireless Ad Hoc
Networks”, In Proceeding of Second Ann. PKI Research Workshop (PKI ’03), Apr.
2003.
[14] M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, and L. Wolf, “A Cluster-Based Security
Architecture for Ad Hoc Networks”, In Proceeding of IEEE INFOCOM, Mar. 2004.
[15] H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: Ubiquitous and Robust
Access Control for Mobile Ad Hoc Networks”,In Proceeding of IEEE/ACM Trans.
Networking, vol. 12, no. 6, pp. 1049-1063, Dec. 2004.
[16] Shamir, "Identity-based cryptosystems and signature schemes", In Proceeding of
Advances in Cryptology - Crypto '84, Lecture Notes in Computer Science 196, Springer,
pp. 47-53, Springer-Verlag, 1984.
[17] M. Bohio, and A. Miri, "An Authenticated Broadcasting Scheme for Wireless Ad
Hoc Network", In Proceedings of Second Annual Conference on Communication
Networks and Services Research (CNSR '04), IEEE Computer Society, pp. 6974, May
19-21, 2004.
[18] A. Khalili, J. Katz, and W. Arbaugh, "Toward Secure Key Distribution in Truly Ad
Hoc Networks", In Proceeding of Symposium on Applications and the Internet Workshop
(SAINT 2003), IEEE Computer Society, pp. 342-346, 2003.
[19] Stinson Douglas, Vande May Serge. Cryptographie : théorie et
pratique. Vuibert,2001.
[20] Cunsheng Ding “The Data Encryption Standard in Detail”
[21] “Data Ecryption Standard” Chapter-12, pp. 270
[22] H. Zare, F. Adibnia, V. Derhami “A Rate based Congestion Control Mechanism
using Fuzzy Controller in MANETs”. In Proceeding of IJCC, ISSN 1841-9836 8(3):486-
491, June, 2013.
55
[23]Chun-Ta Li, Chi-Yao Weng et al., “Security Flaws of a Password Authentication
Scheme for Hierarchical WSNs”, In Proceeding of Journal of Advances in Computer
Networks, Vol. 1, No. 2, June 2013.
[24] Dr.U.Karthikeyan , R.Aravindhan , “ Secured Data Delivery for Mobile Adhoc
Networks” In Proceeding of International Journal of Research in Computer Engineering
and Electronics. VOl : 2 ISSUE 1, Feb 2013.
[25] Mr. Abhishek Bande & Mr. Gaurav Deshmukh “An Improvement in Congestion
Control Using Multipath Routing in Manet” In Proceeding of Global Journal of
Computer Science and Technology Network, Web & Security, Type: Double Blind Peer
Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online
ISSN: 0975-4172 & Print ISSN: 0975-4350, Vol. 12, Issue 17, Version 1.0, 2012.
[26] Robin Choudhary, Niraj Singhal, “A Novel Approach for Congestion Control in
MANET”, In Proceeding of International Journal of Engineering and Innovative
Technology (IJEIT), ISSN: 2277-3754 ISO 9001:2008 Certified. Volume 2, Issue 5,
November 2012.
[27] Prasad Lokulwar And Vivek Shelkhe, “Security Aware Routing Protocol For Manet
Using Asymmetric Cryptograpy Using Rsa Algorithm”, In Proceeding of Bioinfo
Publications,ISSN: 2249-9423 & E-ISSN: 2249-9431, Volume 2, Issue 1, pp.-11-14,
2012.
[28] S.Sudha, V.Madhu Viswanatham et al. “Implementation of Enhanced Data
Encryption Standard on MANET with less energy consumption through limited
computation” In Proceeding of International Journal of Engineering Research and
Development eISSN : 2278-067X, pISSN : 2278-800X, www.ijerd.com Vol. 2, Issue 4,
pp. 46-52July 2012).
[29] Gulshan Kumar et al. “A Hybrid Approach for Providing Security in MANET”, In
Proceeding of International Journal Of Information Security Science,Vol.1, No.3, 2011.
[30]D.SuganyaDevi, “Secure Multicast Key Distribution for Mobile Adhoc Networks”,
In Proceeding of International Journal of Computer Science and Information Security,
Vol. 7, No. 2, 2010.
[31] Pradeep Rai et al. “A Review of ‘MANET’s Security Aspects and Challenges”, In
Proceeding of IJCA Special Issue on “Mobile Ad-hoc Networks”, 2010.
56
[32] Alexis Bonnecaze et al. “On Key Distribution in MANETs”,2009.
[33] Nishu Garg, R.P.Mahapatra “MANET Security Issues” In Proceeding of IJCSNS
International Journal of Computer Science and Network Security, VOL.9, No.8, August
2009.
[34] Christian Lochert et al. “A Survey on Congestion Control for Mobile Ad-Hoc
Networks”, In Proceeding of Wiley Wireless Communications and Mobile Computing 7
(5), pp. 655–676, June 2007.
[35] Sandhya Khurana Neelima Gupta et al., “Reliable Ad-hoc On-demand Distance
Vector Routing Protocol”. In Proceedings of the Fifth International Conference on
Networking (ICN 2006), The International Conference on Systems (ICONS 2006), and
The First International Conference on Mobile Communications and Learning (MCL),
2006.
[36] Gergely ´Acs et al., “Provable Security of On-Demand Distance Vector Routing in
Wireless Ad-Hoc Networks”, R. Molva, G. Tsudik, and D. Westhoff (Eds.): ESAS 2005,
LNCS 3813, pp. 113–127, 2005.c Springer-Verlag Berlin Heidelberg 2005.
[37]
[38] Xiaoqin Chen, Haley M. Jones, A.D.S Jayalath, “Congestion Aware Routing
Protocol for Mobile Ad-hoc Networks”, Department of Information Engineering,
National University, Canberra.41
[39] Raju Kumar, Riccardo Crepaldi, Hosam Rowaihy, Albert F. Harris III, Guohong
Cao, Michele Zorzi, Thomas F. La Porta, “Mitigating Performance Degradation in
Congested Sensor Networks.”, IEEE Transactions on Mobile Computing, Vol. 7, No. 6,
June 2008.
[40] MATLAB Manuals, “www.mathworks.com”.
57
Figure 1.1: Mobile Ad hoc Network....................................................................................1
Figure 2.1: Symmetric key encryption & decryption process............................................8
Figure 2.2: DES Algorithm..................................................................................................9
Figure 2.3: Calculation of f(R, K).....................................................................................12
Figure 4.1: Flowchart of Proposed Algorithm...................................................................27
Figure 5.1: The graphical interface to the MATLAB workspace......................................42
Figure 6.1: Grid Topology with 70 Nodes.........................................................................43
Figure 6.2(i): Key Distribution..........................................................................................44
Figure 6.2(ii): Key Distribution.........................................................................................44
Figure 6.3(i): Encrypted Key.............................................................................................45
Figure 6.3(ii): Encrypted Key............................................................................................45
Figure 6.4: Shows Source as S and Destination as D........................................................46
Figure 6.5: Path from S to D..............................................................................................47
Figure 6.6(i): Decrypted Key.............................................................................................48
Figure 6.6(ii): Decrypted Key............................................................................................48
Figure 6.7: Delay versus Number of Packets....................................................................50
Figure 6.8: Throughput versus Number of Packets...........................................................50
58
Table 2.1: Initial Permutation............................................................................................10
Table 2.2: Inverse of Initial Permutation...........................................................................10
Table 2.3: E Bit Selection..................................................................................................13
Table 2.4: S-1......................................................................................................................13
Table 2.5: P........................................................................................................................14
Table 6.1: Congestion Control with Security....................................................................49
Table 6.2: Congestion Control without Security...............................................................49