SECURITY AWARE ROUTING PROTOCOL FOR MANET USING ASYMMETRIC CRYPTOGRAPY USING RSA ALGORITHM

PRASAD LOKULWAR1*, VIVEK SHELKHE2
1Computer Science & Engineering Department, J.D. Institute of Engineering & Technology.
2Computer Science & Engineering Department, J.D. Institute of Engineering & Technology.
* Corresponding Author : prasadengg16@gmail.com

Received : 21-02-2012     Accepted : 15-03-2012     Published : 19-03-2012
Volume : 2     Issue : 1       Pages : 11 - 14
Bioinfo Secur Inform 2.1 (2012):11-14

Cite - MLA : PRASAD LOKULWAR and VIVEK SHELKHE "SECURITY AWARE ROUTING PROTOCOL FOR MANET USING ASYMMETRIC CRYPTOGRAPY USING RSA ALGORITHM ." BIOINFO Security Informatics 2.1 (2012):11-14.

Cite - APA : PRASAD LOKULWAR, VIVEK SHELKHE (2012). SECURITY AWARE ROUTING PROTOCOL FOR MANET USING ASYMMETRIC CRYPTOGRAPY USING RSA ALGORITHM . BIOINFO Security Informatics, 2 (1), 11-14.

Cite - Chicago : PRASAD LOKULWAR and VIVEK SHELKHE "SECURITY AWARE ROUTING PROTOCOL FOR MANET USING ASYMMETRIC CRYPTOGRAPY USING RSA ALGORITHM ." BIOINFO Security Informatics 2, no. 1 (2012):11-14.

Copyright : © 2012, PRASAD LOKULWAR and VIVEK SHELKHE, Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

Mobile ad-hoc networks (MANTEs) are temporary networks that are built up momentarily in order to satisfy a certain emergency. Ad-hoc networks are in a great demand now a days and have a lot of advantages like emergency control, short term connections for roaming subscribers, etc. In this direction, we have designed the Ad Hoc on Demand Routing Protocol (AODV) using RSA algorithm on platform NS. Which is efficient as well as we have implemented the security technique so the we can prevent the data loss at the time of transmission. The main advantage of using the Network Simulator for the design of AODV is that we can actually observe the working of the specific protocol without the establishment of the network as NS provides the environment for the working of protocol. Which ultimately gives scope for more experimentation for applying more security techniques for getting robust network? .

Keywords

AODV protocol, Network Security, Encryption and Decryption using RSA algorithm.

Introduction

Scope of The Thesis

WIRELESS ad hoc networks are comprised of Mobile Nodes (MNs) that are self-organizing and cooperating to ensure routing of packets among themselves. They provide robust communication in a variety of hostile environments, such as communication for the military or in disaster recovery situations when all infrastructures are down.Since the network topology of ad hoc networks is unstable and changes frequently with nodes mobility, traditional routing protocols in static networks are not efficient for ad hoc networks. Routing protocols for ad hoc networks can be classified broadly as either proactive, reactive, or hybrid (combining both behaviors).proactive protocols continuously exchange network topology information so as to constantly monitor topology changes and use that knowledge for efficient, low latency data transmission. In their turn, proactive protocols can be classified into two categories: link state routing and distance vector routing. Common proactive routing protocols include Dynamic Destination-Sequenced Distance-Vector Routing (DSDV), Optimized Link State Routing (OLSR), Multicast Optimized Link State Routing (MOLSR), etc.
Since the topologies of ad hoc networks depend on node locations and since nodes are mobiles, updates of topologies may occur more frequently than static networks, especially at high node mobility. Due to the large number of control packets required by the proactive behavior that affects the battery longevity of the MNs and restricts the goodput on the channel.
Reactive protocols were introduced to remedy the above shortcomings. These adopt a lazy approach to communication requirements, where nodes reacts only on-demand to data transmission requests and perform path finding operations only when needed. Reactive protocols do effectively save channel and battery power usage as they generate fewer control packets when there is no demand for transmission. The most common reactive protocols include Ad Hoc On-Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR), Source Routing-Based Multicast Protocol (SRMP), etc.

Literature Review

a. Reactive Routing Protocols

Another approach used for routing is reactive approach. This type of routing creates routes only when desired by the source node. When a node requires a route to a destination, it initiates a route discovery process within the network. This process is completed once a route is found or all possible route permutations have been examined. Once a route has been established, it is maintained by a route maintenance procedure until either the destination becomes inaccessible along every path from the source or until the route is no longer desired.
Example: Dynamic State Routing (DSR), Ad hoc On-Demand Distance Vector (AODV), Temporally Ordered Routing Algorithm (TORA).

b. Ad hoc On-Demand Distance Vector (AODV)

The Ad hoc On-demand Distance Vector (AODV) protocol, one of the on-demand routing algorithms that has receive the most attention, however, does not utilize multiple paths. It joins the mechanisms of DSDV and DSR. The periodic beacons, hop-by-hop routing and the sequence numbers of DSDV and the pure on-demand mechanism of Route Discovery and Route Maintenance of DSR are combined. In AODV at Every instance, route discovery is done for fresh communication which consumes more bandwidth and causes more routing over head. The source prepares RREQ packet which is broadcast to it's neighboring nodes, if neighboring node will keep backward path towards source. As soon as destination receives the RREQ packet, it sends RREP packet on received path. This RREP packet is unicast to the next node on RREP path. The intermediate node on receiving the RREP packet make reversal of path set by the RREQ packet. As soon as RREP packet is received by the source, it starts data transmission on the forward path set by RREP packet. Sometimes while data transmission is going on, if path break occurs due to mobility of node out of coverage area of nodes on the active path, data packets will be lost. When the network track requires real time delivery (voice, for instance), dropping data packets at the intermediate nodes can be costly. Likewise, if the session is a best effort, TCP connection, packet drops may lead to slow start, timeout, and throughput degradation.

Proposed Mechanism

a. Security Aware AODV Using RSA Algorithm

Introduction

Encryption is the act of encoding text so that others not privy to the decryption mechanism (the "key") cannot understand the content of the text. Encryption has long been the domain of spies and diplomats, but recently it has moved into the public eye with the concern of the protection of electronic transmissions and digitally stored data. Standard encryption methods usually have two basic flaws: A secure channel must be established at some point so that the sender may exchange the decoding key with the receiver; and There is no guarantee who sent a given message. Public key encryption has rapidly grown in popularity (and controversy, see, for example, discussions of the Clipper chip on the archives given below) because it offers a very secure encryption method that addresses these concerns. In a classic cryptosystem in order to make sure that nobody, except the intended recipient, deciphers the message, the people involved had to strive to keep the key secret. In a public-key cryptosystem. The public key cryptography solves one of the most vexing problems of all prior cryptography: the necessity of establishing a secure channel for the exchange of the key.
In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.

Operation

The RSA algorithm involves three steps: key generation, encryption and decryption.

Key Generation

RSA involves a public key and a private key. The public key can be known to everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted using the private key. The keys for the RSA algorithm are generated the following way:
Choose two distinct prime numbers p and q.For security purposes, the integers p and q should be chosen uniformly at random and should be of similar bit-length. Prime integers can be efficiently found using a primality test.
1. Compute n = pq.
• n is used as the modulus for both the public and private keys
2. Compute φ(pq) = (p − 1)(q − 1). (φ is Euler's totient function).
3. Choose an integer e such that 1 < e < φ(pq), and e and φ(pq) share no divisors other than 1 (i.e. e and φ(pq) are coprime).
• e is released as the public key exponent.
• e having a short bit-length and small Hamming weight results in more efficient encryption. However, small values of e (such as e = 3) have been shown to be less secure in some settings.
4. Determine d (using modular arithmetic) which satisfies the congruence relation.

• Stated differently, ed − 1 can be evenly divided by the quotient (p − 1)(q − 1)
• This is often computed using the extended Euclidean algorithm.
• d is kept as the private key exponent
The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the private (or decryption) exponent d which must be kept secret..
Encryption
Destination node transmits its public key (n,e) to Source node and keeps the private key secret. then source wants to send message M to Destination
It first turns M into an integer 0 < m < n by using an agreed-upon reversible protocol known as a padding scheme. It then computes the cipher text c corresponding to:

This can be done quickly using the method of exponentiation by squaring. Source then transmits c to Destination.

Decryption

Destination can recover m from c by using her private key exponent d by the following computation:

Given m, Destination can recover the original message M by reversing the padding scheme.

Example of RSA Algorithm

Example of RSA with small numbers:
p = 47, q = 71, compute n = pq = 3337
Compute phi = 46 * 70 = 3220
Let e be 79, compute d = 79-1 mod 3220 = 1019
Public key is n and e, private key d, discard p and q.
Encrypt message m = 688, 68879 mod 3337 = 1570 = c.
Decrypt message c = 1570, 15701019 mod 3337 = 688 = m.
Thus RSA is very useful algorithm in order to obtain the security aware AODV protocol as it uses both the public key as well as the private key.

Testing

Technical investigations conducted for our project are self explained with respective snapshots.

Conclusion

In this paper, we design a security to the protocol to provide reliable efficient data transfer. Here we implement the Ad hoc On Demand Distance Vector protocol and provide the security by using Asymmetric technique. The AODV network protocol establish at the time of broadcasting. To prevent the data loss and misuse of data we have implemented the security using Asymmetric technique. The encryption and decryption are used for the security in AODV protocol. The Asymmetric technique uses the RSA encryption method for the encoding of the data to be sent. Thus with the use of broadcasting methods of AODV the network is established and data packets are sent to the destination nodes.

Acknowlegement

A project is creative work of many minds. A proper synchronization between individuals is must for any project to be completed successfully. We are extremely grateful to all the helping contributors for the successful completion of our project.
I express my sincere gratitude to Resp. p. M. Jawandhiya Head of the Department, Computer Science and Engineering.

References

[1] Charles E. Perkins, Elizabeth M. (2003) RFC 3561, IETF, rfc356.txt.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] Law and Kelton W. (2000) McGraw-Hill.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] CMU Monarch Group, CMU Monarch extensions to the NS-2 simulator, http://monarch.cs.cmu.edu/cmu-ns.html.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Fall K., and Varadhan K (2003) http://www.isi.edu/nsnam/ns/ns-documentation.html.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Perkins C.E. and Royer E.M. (2001) In Ad Hoc Networking, 173-219.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Perkins C. Ad hoc On Demand Distance Vector (AODV) Routing, Internet draft, draft-ietfmanet- aodv-00.txt.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[7] Perkins C.E. and Royer E.M. (1999) In Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications, 90-100, IEEE Computer Society.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[8] Johnson D.B. and Maltz D.A. (1996) Ad Hoc Wireless Networks, Mobile Computing, 5, 153-181, Kluwer Academic Publishers.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

Images
Fig. 4.1- snapshot of terminal showing execution of aodv. tcl(Encrypting Data)
Fig. 4.2- Snapshot of terminal showing execution of aodv.tcl(Decrypting data)
Fig. 4.3- Snapshot of terminal showing execution of xgraph of aodv
Fig. 4.4- Snapshot of nodes start the broadcasting
Fig. 4.5- Snapshot shows the node range
Fig. 4.6- Snapshot of multiple node broadcasting to finding a route
Fig. 4.7- Snapshot of aodv protocol send a packet from source to destination
Fig. 4.8- Snapshot of drop the packet