Title :
Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks
Author :
Woungang, Isaac ; Dhurandher, S.K. ; Koo, V. ; Traore, Issa
Author_Institution :
Dept. of Comput. Sci., Ryerson Univ., Toronto, ON, Canada
Abstract :
In Emergency MANETs (eMANETs), the broadcasting nature of the wireless medium, the lack of pre-established trust relationship among nodes, and the frequent topology changes, cause some serious security challenges, making the network vulnerable to malicious attacks such as wormhole attacks. This paper investigates a recently proposed Advanced Encryption Standard (AES)-based routing algorithm (so-called AODV-Wormhole Attack Detection Reaction - here referred to as AODV-WADR-AES) for securing AODV-based eMANETs against wormhole attacks. The proposal consists of substituting the AES part of the scheme by the Triple Data Encryption Standard (TDES), yielding the AODV-WADR-TDES routing algorithm, with the goal to study the performance of the algorithm where mobile devices that are incompatible with AES are part of eMANET nodes. In doing so, markers in the form of hash codes are included in the data packets to help consolidating the data integrity. Simulation results are presented to validate the proposed AODV-WADR-TDEA scheme. It is also shown that the AODV-WADR-AES scheme outperforms the AODV-WADR-TDES scheme in terms of end-to-end delay, packet delivery ratio, and number of packets traversing through the wormhole link.
Keywords :
cryptographic protocols; mobile ad hoc networks; telecommunication network routing; telecommunication network topology; telecommunication security; AES-based routing algorithm; AODV; TDEA scheme; TDES; WADR; advanced encryption standard; data integrity; eMANET; emergency MANET; end-to-end delay; hash codes; malicious attack; message tampering attack; mobile ad hoc network; mobile device; packet delivery ratio; packet dropping; security protocol; triple data encryption standard; trust relationship; wireless medium; wormhole attack detection reaction; wormhole link; Ad hoc networks; Cryptography; Delay; Mobile computing; Routing; Routing protocols; AES; AODV; Triple DES; cryptographic protocol; eMANETs; malicious nodes; wormhole attack;
Conference_Titel :
Globecom Workshops (GC Wkshps), 2012 IEEE
Conference_Location :
Anaheim, CA
Print_ISBN :
978-1-4673-4942-0
Electronic_ISBN :
978-1-4673-4940-6
DOI :
10.1109/GLOCOMW.2012.6477720