Title :
Implementation of a trust model over AODV in a wireless ad hoc testbed
Author :
Gaurav, Chandrakant ; Chandramouleeswaran, Dhivya ; Khanam, Rashda ; Venkataraman, R. ; Pushpalatha, M. ; Rao, T.R.
Author_Institution :
SRM Univ., Chennai, India
Abstract :
We have customized Ad hoc On demand Distance Vector (AODV) protocol and augmented security aspect in real time scenario using numeric step values called Trust assigned to finite number of neighbor nodes to evaluate network behavior, subsequently secure the network by barricading the network from malicious nodes in Blackhole and flooding attack modes. Experiments were carried out using a custom-made testbed built on wxPython that supports various characteristics of nodes like variable data rates, node positions and malicious behavior for testing and display results in a graphical format. The results have favored aforementioned proposal showing a 70% increase in throughput obtained from trust implemented experimentation as compared to standard one without the trust parameter. The overhead in trusted scenario encountered was minimal despite the end to end delay of packets being higher than the traditional AODV by 30 msec. Hence, we have concluded that our method of using trust has resulted in a secured reactive protocol with applications suited for wireless attack prone environment when applied to a network consisting of four nodes. Our work is also the first ever implementation of a trust model over an adhoc routing protocol in a real adhoc testbed.
Keywords :
ad hoc networks; routing protocols; telecommunication security; AODV protocol; Blackhole attack modes; Trust numeric step values; ad hoc on demand distance vector protocol; ad hoc routing protocol; augmented security aspect; custom-made testbed built; flooding attack modes; malicious behavior; malicious nodes; network behavior evaluation; network security; secured reactive protocol; trust model; wireless ad hoc testbed; wireless attack prone environment; wxPython; Computational modeling; Educational institutions; IP networks; Internet; Routing; AODV; Blackhole attacks; Trust Model; Trusted AODV; flooding attacks;
Conference_Titel :
Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on
Conference_Location :
Coimbatore
DOI :
10.1109/ICCCNT.2012.6395934