Document Type : Research Article

Authors

1 Department of Computer Engineering, Cyprus International University, Lefkosa, North Cyprus.

2 Information Technology Department, School of Applied Sciences, Cyprus International University, Lefkosa, North Cyprus.

Abstract

Ad hoc network is infrastructure-less support, so network nodes are vulnerable to many attacks. Security attacks in Ad-Hoc networks are increasing significantly with time. They communicated and exchanged data should be also secured and kept confidential. Therefore, hybrid cryptography is proposed to avoid unauthorized access to data. Data will be transmitted in an encrypted state, through Diffie-Hellman and later decrypted by the intended party. If a third party intercepts the encrypted data, it will be difficult to decipher. Ad Hoc on Demand Distance Vector (AODV) routing protocol is employed to determine the destination. The proposed solution is a hybrid mechanism of encryption algorithms. The NS-2.3 simulator was used to evaluate the performance of the proposed security algorithm. Simulation results have shown the performance of the proposed algorithm in the ad-hoc network on several metrics outperformed many developed security algorithm. A hybrid encryption algorithm for mitigating the effects of attacks in ad hoc networks was developed based on ADOV routing protocol. The algorithm manipulated AES and Blowfish encryption algorithms to increase the speed of the algorithm as well as encryption which will lead to preventing access to a packet while transmission in Ado- hoc network

Keywords

[1] R Shiva Kumaran, Rama Shankar Yadav, and Karan Singh. Multihop wireless lan. HIT haldia March, 2007.
[2] Vishal Kumar Sagtani and Sandeep Kumar. Modern approach to enhance routing recitation in manet. International Journal of Emerging Technology and Advanced Engineering, 4(7):265–270, 2014.
[3] Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani. A survey of secure mobile ad hoc routing protocols. IEEE communications surveys & tutorials, 10(4):78–93, 2008.
[4] Monika Goyal, Sandeep Kumar Poonia, and Deepak Goyal. Attacks finding and prevention techniques in manet: a survey. Adv Wireless Mob Commun, 10(5):1185–1195, 2017.
[5] Houda Moudni, Mohamed Er-rouidi, Hicham Mouncif, and Benachir El Hadadi. Secure routing protocols for mobile ad hoc networks. In 2016 international conference on information technology for organizations development (IT4OD), pages 1–7. IEEE, 2016.
[6] Ana Lucila Sandoval Orozco, Juli´an Garc´ıa Matesanz, Luis Javier Garc´ıa Villalba, Jos´e Duv´an M´arquez D´ıaz, and T-H Kim. Security issues in mobile ad hoc networks. International Journal of Distributed Sensor Networks, 8(11):818054, 2012.
[7] Priyanka Sogani and Dr Aman Jain. A study on security issues in mobile ad hoc networks. IJIACS ISSN, pages 2347–8616, 2015.
[8] Y-C Hu, Adrian Perrig, and David B Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), volume 3, pages 1976–1986. IEEE, 2003.
[9] Imad Aad, Jean-Pierre Hubaux, and Edward W Knightly. Denial of service resilience in ad hoc networks. In Proceedings of the 10th annual international conference on Mobile computing and networking, pages 202–215, 2004.
[10] Patroklos G Argyroudis and Donal O’mahony. Secure routing for mobile ad hoc networks. IEEE Commun. Surv. Tutorials, 7(1-4):2–21, 2005.
[11] Junghyun Nam, Seokhyang Cho, Seungjoo Kim, and Dongho Won. Simple and efficient group key agreement based on factoring. In International Conference on Computational Science and Its Applications, pages 645–654. Springer, 2004.
[12] Yih-Chun Hu, Adrian Perrig, and David B Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security, pages 30–40, 2003.
[13] Charles Perkins and E. Royer. The ad hoc ondemand distance-vector protocol. In Ad Hoc Networking, page 173219. Addison-Wesley, 2001.
[14] Jim Parker, John Pinkston, Anupam Joshi, et al. On intrusion detection in mobile ad hoc networks. In 23rd IEEE International Performance Computing and Communications Conference–Workshop on Information Assurance, 2004. [15] S Sarika, A Pravin, A Vijayakumar, and K Selvamani. Security issues in mobile ad hoc networks. Procedia Computer Science, 92:329–335, 2016.
[16] Jeremy J Blum and Azim Eskandarian. A reliable link-layer protocol for robust and scalable intervehicle communications. IEEE Transactions on Intelligent Transportation Systems, 8(1):4–13, 2007.
[17] Jung-San Lee and Chin-Chen Chang. Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications, 30(4):1377–1396, 2007.
[18] Yuh-Ren Tsai and Shiuh-Jeng Wang. Routing security and authentication mechanism for mobile ad hoc networks. In IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, volume 7, pages 4716–4720. IEEE, 2004.
[19] Joan Daemen and Vincent Rijmen. The design of Rijndael, volume 2. Springer, 2002.
[20] AkoMuhamad Abdullah. Advanced encryption standard (aes) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, 2017.
[21] G Manikandan, N Sairam, and M Kamarasan. A new approach for improving data security using iterative blowfish algorithm. Research Journal of Applied Sciences, Engineering and Technology, 4(6):603–607, 2012.
[22] B. Schneier. Applied Cryptography. John Wiley & Sons, New York, 1994.
[23] Whitfield Diffie and Martin Hellman. New directions in cryptography. IEEE transactions on Information Theory, 22(6):644–654, 1976.
[24] Hiral Vegda and Nimesh Modi. Secure and efficient approach to prevent ad hoc network attacks using intrusion detection system. In 2018 Second international conference on intelligent computing and control systems (ICICCS), pages 129–133. IEEE, 2018.