CFP last date
22 April 2024
Reseach Article

Enhancing Security in DSR Protocol with Energy and Buffer Control Mechanism

by Priyanka, Harwant Singh Arri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 8
Year of Publication: 2015
Authors: Priyanka, Harwant Singh Arri
10.5120/21085-3773

Priyanka, Harwant Singh Arri . Enhancing Security in DSR Protocol with Energy and Buffer Control Mechanism. International Journal of Computer Applications. 119, 8 ( June 2015), 6-10. DOI=10.5120/21085-3773

@article{ 10.5120/21085-3773,
author = { Priyanka, Harwant Singh Arri },
title = { Enhancing Security in DSR Protocol with Energy and Buffer Control Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 8 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number8/21085-3773/ },
doi = { 10.5120/21085-3773 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:29.319553+05:30
%A Priyanka
%A Harwant Singh Arri
%T Enhancing Security in DSR Protocol with Energy and Buffer Control Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 8
%P 6-10
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

DSR is an on-demand routing protocol. This means routes are not pre-established routes and routes are only active during the transmission. The main problem in the MANET is attack on data. As we know in MANET we cannot differentiate which node is the attacker node and which is benign node. So, the attacker node can easily capture the data. And these types of attacks are known as Black-hole, worm-hole and gray-hole attack. So, identifying which node is genuine node or for preventing the data from the attacker node is necessary in MANETs. This paper provides the good technique which helps in preventing from these types of routing attacks during data transmission. And this leads to the secure communication as we select the intermediate node on the basis of its energy and buffer state. This paper consider the two parameters for selecting the forwarding nodes, first one is their energy state and second is buffer value. Only those nodes will participate in the transmission which have their energy state equal to some threshold value and have the less buffer value. Because the attacker nodes have less energy due to continuously sending the RREP message to the nodes and have high buffer value as it always attract the neighbor nodes for transmission. So, the implemented technique only selects the nodes which seem to be genuine on the basis of measuring two factors its thresh-hold energy and buffer value of the IN. And this result into the less packet loss as compared to the DSR. And even if the attacker captures the packets, the packets will be in encrypted form. Attackers have to decrypt the packet for reading it and it's really hard to decrypt the data. The packet loss will be less in the proposed technique and throughput will be increased.

References
  1. Tuteja, Asma, Rajneesh Gujral, and Sunil Thalia. "Comparative performance analysis of DSDV, AODV and DSR routing protocols in MANET using NS2. "Advances in Computer Engineering (ACE), 2010 International Conference on. IEEE, 2010.
  2. Hu, Yih-Chun, Adrian Perrig, and David B. Johnson. "Wormhole attacks in wireless networks. " Selected Areas in Communications, IEEE Journal on 24. 2 (2006): 370-380.
  3. Goyal, Priyanka, Vinti Parmar, and Rahul Rishi. "Manet: Vulnerabilities, challenges, attacks application. "IJCEM International Journal of Computational Engineering & Management 11 . . 2011 (2011): 32-37.
  4. Bouhorma, Mohammed, H. Bentaouit, and A. Boudhir. "Performance comparison of ad-hoc r routing protocols AODV and DSR. " Multimedia Computing and Systems, 2009. ICMCS'09. I International Conference on. IEEE, 2009.
  5. Sanzgiri, Kimaya, et al. "A secure routing protocol for ad hoc networks. "Network Protocols, 2 -2002. Proceedings. 10th IEEE International Conference on. IEEE, 2002.
  6. Cai, Jiwen, et al. "The simulation and comparison of routing attacks on DSR protocol. "Wir e -eless Communications, Networking and Mobile Computing, 2009. WiCom'09. 5th Internatio n -nal Conference on. IEEE, 2009.
  7. Parashar, Gargi, and Manisha Sharma. "Congestion Control in Manets Using Hybrid Routi - ng Protocol. " IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), e e-ISSN: 2278-2834.
Index Terms

Computer Science
Information Sciences

Keywords

DSR MANET AODV IN and RREP