SlideShare a Scribd company logo
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
DOI : 10.5121/ijasuc.2010.1304 45
Secured Preemptive DSR(S-PDSR): An
integration of SRP and SMT with Preemptive
DSR for Secured Route Discovery
V.Ramesh 1
Dr.P.Subbaiah 2
N.Sandeep Chaitanya 3
P. Bhaktavastalam 4
1
Research scholar,Sathyabama University ,Chennai & Assoc. Professor, Atmakur Engg. College, Nellore
Dt, AP, India.
v2ramesh634@yahoo.co.in.
2
Principal, Veerabrahmendra Institute of Technology & Sciences,Badvel,Kadapa-Dt,AP, India.
subbaiah_nani@sify.com.
3
Assoc.Professor, Dept of IT, SreeKavitha Engineering College, Khammam, AP,India.
n.sandeepchaitanya@gmail.com.
4
In-Charge Principal, Govt. Polytechnic College, Badvel, AP, India.
Bsakta365@gmail.com.
Abstract
In Contrast with traditional networks, ad hoc networks not require any previously built
infrastructure, they are distributed and fully self-organized systems. Due to absence of any
fixed node, each node acts as a router, providing routing capabilities of the MANET. In a
distributed network, with out any infrastructure communicating peers have to rely on the
whole network, therefore the proper security hardly can be established. This paper proposes
enhancements in Preemptive DSR to provide secured route discovery. This paper evaluates
integration of Secured Routing Protocol (SRP) and Secured Message Transmission(SMT) with
Preemptive Dynamic Source Routing (PDSR) to get Secured PDSR(S-PDSR), which is
capable of secured route discovery.
Keywords: MANET, SRP, SMT, Preemptive DSR
1.INTRODUCTION
A Mobile Ad-Hoc Network (MANET) is an autonomous collection of mobile nodes having no
centralized control or fixed infrastructure to support the network and it is entirely distributed.
MANET topology is dynamic; nodes enter and leave the network continuously. Each node in the
network acts as host as well as router and forwards the packets to destination node.
Due to frequent change in network topology, routing has become an essential network protocol in
mobile ad hoc networking, MANET routing protocol in mobile ad hoc networking. MANET
routing protocols are classified into two types:- Proactive (table-driven) and Reactive(on-demand)
routing based on when and how the routes are discovered. Proactive routing protocols is
consistent and up-to-date data routing information is available in each node, but in reactive the
routes are discovered only when required by the source node.
In MANET, proactive protocols have higher overhead than reactive protocols due to continuous
route updating. Reactive protocols may be used to get higher routing efficiency when only few
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
46
nodes with high mobility have data to send. Otherwise proactive protocols may be used to get
higher routing efficiency.
In this paper, new enhanced version of Preemptive DSR ( S-PDSR ), has been proposed which is
based on the principle used in SRP for secured route discovery. The feature of basic PDSR to
discover multiple routes is further exploited and it is suggested to incorporate the features of
Secured Message Transmission (SMT) using multiple routes. It thus ensures data transmission
in the data transmission phase of the MANET operation.[3]
2. Ad Hoc On Demand Distance Vector (AODV)
AODV [6] is perhaps the most well-known routing protocol for a MANET. It is a
reactive protocol: nodes in the network exchange routing information only when a
communication must take place and keep this information up-to-date only as long as the
communication lasts.
When a node must send a packet to another node, it starts a route discovery process in
order to
establish a route toward the destination node. Therefore, it sends its neighbors a route
request message (RREQ). Neighboring nodes receive the request, increment the hop
count, and forward the message to their neighbors, so that RREQs are actually
broadcasted using a flooding approach. The goal of the RREQ message is to find the
destination node, but it also has the side effect of making other nodes learn a route
towards the source node (the reverse route): a node that has received a RREQ message,
with source address S from its neighbor A, knows that it can reach S through A and
records this information in its routing table along with the hop count (i.e., its distance
from node S following that route).
The RREQ message will eventually reach the destination node, which will react with a
route reply message (RREP). The RREP is sent as a unicast, using the path towards the
source node
established by the RREQ. Similarly to what happens with RREQs, the RREP message
allows
intermediate nodes to learn a route toward the destination node (i.e., the originator of the
RREP).
Therefore, at the end of the route discovery process, packets can be delivered from the
source to the destination node and vice versa.
A third kind of routing message, called route error (RERR), allows nodes to notify errors,
for
example, because a previous neighbor has moved and is no longer reachable. If the route
is not active (i.e., there is no data traffic flowing through it), all routing information
expires after a timeout and is removed from the routing table.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
47
3. Dynamic Source Routing(DSR)
As described in (David B. Johnson and David A. Maltz 1996), DSR is a simple and an
efficient reactive routing protocol that is designed especially for use in multi-hop wireless
Ad hoc networks. It is designed for very high mobility rate with up to 200 mobile nodes.
It incurs very low overhead but reacts very quickly to changes in the network. DSR
allows an ad hoc network to be self-organizing and self-configuring without relying on an
existing network infrastructure or administration. Mobile nodes cooperate to forward
packets to each other to allow communications over multiple hopes between nodes that
are not within communication range of each other. The protocol is composed of two
mechanisms that operate on demand.
Route Discovery is the mechanism by which a node S wishing to send a packet to a destination
node D
obtains a source route to D. Route Discovery is used only when S attempts to send a packet to D
and
does not already know a route to D.
Route Maintenance is the mechanism by which node S is able to detect, while using a source
route
to D, if the network topology has changed such that it can no longer use its route to D because a
link
along the route no longer works. When Route Maintenance indicates a source route is broken, S
can
attempt to use any other route it happens to know to D, or can invoke Route Discovery again to
find a
new route. Route Maintenance is used only when S is actually sending packets to D.
Route Discovery
When some node S originates a new packet destined to some other node D, it places in the header
of the
packet a source route giving the sequence of hops that the packet should follow on its way to D.
Normally, S will obtain a suitable source route by searching its Route Cache of routes previously
learned, but if no route is found in its cache, it will initiate the Route Discovery protocol to
dynamically find a new route to D. In this case, we call S the initiator and D the target of the
Route Discovery.
For example, Figure 1 illustrates an example Route Discovery, in which a node A is attempting to
discover a route to node E. To initiate the Route Discovery, A transmits a ROUTE REQUEST
message as
a single local broadcast packet, which is received by (approximately) all nodes currently within
wireless
transmission range of A. Each ROUTE REQUEST message identifies the initiator and target of the
Route
Discovery, and also contains a unique request id, determined by the initiator of the REQUEST.
Each ROUTE REQUEST also contains a record listing the address of each intermediate node
through which this particular copy of the ROUTE REQUEST message has been forwarded. This
route record is initialized to an empty list by the initiator of the Route Discovery.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
48
Fig 1: Route Discovery example: Node A is the initiator, and node E is the target
When another node receives a ROUTE REQUEST, if it is the target of the Route Discovery, it
returns
a ROUTE REPLY message to the initiator of the Route Discovery, giving a copy of the
accumulated route
record from the ROUTE REQUEST; when the initiator receives this ROUTE REPLY, it caches this
route in its
Route Cache for use in sending subsequent packets to this destination. Otherwise, if this node
receiving the ROUTE REQUEST has recently seen another ROUTE REQUEST message from this
initiator bearing this same request id, or if it finds that its own address is already listed in the
route record in the ROUTE REQUEST message, it discards the REQUEST. Otherwise, this node
appends its own address to the route record in the ROUTE REQUEST message and propagates it by
transmitting it as a local broadcast packet (with the same request id).
In returning the ROUTE REPLY to the initiator of the Route Discovery, such as node E replying
back to A
in Figure 1, node E will typically examine its own Route Cache for a route back to A, and if
found, will use it for the source route for delivery of the packet containing the ROUTE REPLY.
Otherwise, E may perform its own Route Discovery for target node A, but to avoid possible
infinite recursion of Route Discoveries, it must piggyback this ROUTE REPLY on its own ROUTE
REQUEST message for A. It is also possible to piggyback other small data packets, such as a TCP
SYN packet [Postel 1981b], on a ROUTE REQUEST using this same mechanism. Node E could
also simply reverse the sequence of hops in the route record that it trying to send in the ROUTE
REPLY, and use this as the source route on the packet carrying the ROUTE REPLY itself. For MAC
protocols such as IEEE 802.11 that require a bi-directional frame exchange as part of the MAC
protocol [IEEE 1997], this route reversal is preferred as it avoids the overhead of a possible
second Route Discovery, and it tests the discovered route to ensure it is bi-directional before the
Route Discovery initiator begins using the route. However, this technique will prevent the
discovery of routes using uni-directional links. In wireless environments where the use of uni-
directional links is permitted, such routes may in some cases be more efficient than those with
only bi-directional links, or they may be the only way to achieve connectivity to the target node.
Route Maintenance
When originating or forwarding a packet using a source route,each node transmitting the packet is
responsible for confirming that the packet has been received by the next hop along the source
route; the packet is retransmitted (up to a maximum number of attempts) until this confirmation
of receipt is received. For example, in the situation illustrated in Figure 2, node A has originated a
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
49
packet for E using a source route through intermediate nodes B, C, and D. In this case, node A is
responsible for receipt of the packet at B, node B is responsible for receipt at C, node C is
responsible for receipt at D, and node D is responsible for receipt finally at the destination E. This
confirmation of receipt in many cases may be provided at no cost to DSR, either as an existing
standard part of theMAC protocol in use (such as the link-level acknowledgement frame defined
by IEEE 802.11 [IEEE 1997]), or by a passive acknowledgement [Jubin 1987] (in which, for
example, B confirms receipt at C by overhearing C transmit the packet to forward it on to D). If
neither of these confirmation mechanisms are available, the node transmitting the packet may set
a bit in the packet’s header to request a DSR-specific software acknowledgement be returned by
the next hop; this software acknowledgement will normally be transmitted directly to the sending
node, but if the link between these two nodes is uni-directional, this software acknowledgement
may travel over a different, multi-hop path.
If the packet is retransmitted by some hop the maximum number of times and no receipt
confirmation
is received, this node returns a ROUTE ERROR message to the original sender of the packet,
identifying the
link over which the packet could not be forwarded. For example, in Figure 2, if C is unable to
deliver the
packet to the next hop D, then C returns a ROUTE ERROR to A, stating that the link from C to D is
currently “broken.” Node A then removes this broken link from its cache; any retransmission of
the original packet is a function for upper layer protocols such as TCP. For sending such a
retransmission or other packets to this same destination E, if A has in its Route Cache another
route to E (for example, from additional ROUTE REPLYs from its earlier Route Discovery, or from
having overheard sufficient routing information from other packets), it can send the packet using
the new route immediately. Otherwise, it may perform a new Route Discovery for this target
(subject to the exponential backoff described in Section 3.2).
4. CLASSIFICATION OF ATTACKS
Like all kinds of networks, passive attack and active attack are two kinds of attacks which can be
launched against ad hoc networks. The passive attacks only intercept the message transmitted in
the network without disturbing the transmission. By doing this, the attacker will be able to
analyze the valuable information like network topology to perform further attacks. For example,
by eavesdropping and subsequent analyses, the attacker may notice that some particular node is
used much more than the others, which means it might be the ‘heart’ of this network. If this node
is brought down, the whole network will be out of action as well. Then the attacker can deploy
some special attacks to achieve this goal. Unfortunately, this kind of attack in wireless network is
impossible to detect due to the nature of wireless network that its medium is air which is widely
open to every user within the domain. The active attacks are carried out by malicious nodes
which aim to disrupt transmission among other nodes or selfish nodes which may just want to
save their own battery. There are mainly three ways to perform such an attack.[5]
Attacks using modification
Below we briefly talk about several modification attacks against AODV and DSR.
(1) Redirection by Modified Route Sequence Numbers:
Protocols such as AODV assign some value to routes to the specific destination to decide the
priority. A route with a higher value is preferred. The node may change traffic through itself by
advertising a route to a node with a greater value.
(2) Redirection with Modified Hop Counts:
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
50
Without other metrics, AODV uses the hop count field to determine a shortest path. Malicious
nodes can reset the hop count field of the RREQ to zero so that increases the chance that they are
included on a newly created route. Similarly, malicious nodes may be not included in the created
routes if they set the hop count field of the RREQ to infinity.
(3) Denial-of-service with Modified Source Routes:
DSR uses source routes stating routes in data packets. These routes lack integrity checks. So
denial-of-service attack can be launched by altering the source routes in packet headers so that the
packet can not be delivered to the destination.
Attacks using Fabrication
When a node misrepresent the identity in the network such as by altering MAC or IP address in
outgoing packets, spoofing can occur. It can modify the rooting of some nodes then lead to loops
in the network which will increase the power consumption greatly.
Attacks using Impersonation
These attacks generate false routing messages which can be difficult to distinguish from invalid
constructs.
(1) Falsifying Route Errors in AODV and DSR:
In ADOV and DSR, if the destination node or an intermediate node along the active path moves,
the node upstream of the link break broadcasts a route error message to all active up stream
neighbors. This message causes the corresponding route to be invalid. A denial-of-service attack
can be achieved by sending route error messages indicating a broken link on the route, then
prevent the source from communicating with destination.
(2) Route Cache Poisoning in DSR:
A node overhearing may add the routing information contained in the packet's header to its own
route cache. An attacker can exploit this method of learning modify route caches by transmitting
packets containing invalid routes in their headers.
5. OVERVIEW OF PREEMPTIVE DSR
Assumptions:
We assume that all nodes wishing to communicate with other nodes within the ad hoc network
are willing to participate fully in the protocols of the network. Each node participating in the
network should also be willing to forward packets for other nodes in the network.
We refer to the minimum number of hops necessary for a packet to reach from source to
destination. We assume that he diameter of an ad-hoc network will be small(5 to 10 hops), but
greater than 1. Packets may be lost or corrupted in transmission on the ad-hoc wireless network.
A node receiving a corrupted packet can detect the error and discard the packet.
<
Nodes within the ad hoc network may move at any time without notice, and may even move
continuously, but we assume that the speed with which nodes move is moderate with respect to
the packet transmission latency and wireless transmission range of that particular network
hardware in use. Preemptive DSR can support very rapid rates mobility, but we assume that
nodes do not continuously move with high peed, because it may flood data packet in ad-hoc
wireless networks. The wireless communications link between each pair of nodes will be bi-
directional. But some time the wireless link between two nodes may be uni-directional also.[2]
The Algorithm:
a) Route Discovery:
Step 1: When a source node S wants to send a data, it broadcast the RREQ packet to its neighbor
nodes.
Step 2: When an intermediate node on the route to the destination receives the RREQ packet, it
appends its address to the route record in RREQ and re-broadcast the RREQ.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
51
Step 3: When the destination node D receives the first RREQ packet, it starts a timer and collects
RREQ packets from its neighbors until quantum q time expires.
Step 4: The destination node D finds the two (primary +Backup) best routes from the collected
paths (Step 3) within the quantum q time.
Step 5: The destination node D sends RREP packet to the source node S by reversing (RREQ)
packets which includes the two routes (Primary +Backup) for further communication.
b) Route Monitoring:
Step 1: Each intermediate node on the route starts monitoring the signal strength.
Step 2: If signal strength falls below the specified threshold T, it will send a warning message
“Path likely to be disconnected”, to the source node S.
c) The Source node S Communicates with destination node D:
Step 1:The source node S starts Communicating with destination node D using primary path.
Step 2: On receiving the warning message from the intermediate node, it starts communicating
destination node D with the backup route also.
Step 3: If source node S receives the acknowledgement form the destination node D go to step 4
else step 5.
Step 4: Preemption, switch over from Primary to Backup route.
Step 5: Initiates Route Discovery Process.
Ex:
When a source node S want to send message to the destination node D, it initiates route discovery
by broadcasting the RREQ packet to its neighbors (A, E, F) as shown in Fig 2. The intermediate
nodes (A, E, F) on receive the RREQ packet rebroadcast the packet to its neighbors by appending
its id in the route record of the RREQ packet. Similarly other intermediate nodes also forward the
RREQ packet to the destination. When the destination node D receives two or more RREQ
packets from the same source through different routes, it finds the two best routes based on the no
of hopes. The route which has least number of hopes. The route which has least number of hops it
becomes primary<S, F, G>, and second least number of hops route becomes backup route<S, A,
B, C>.
The destination node D sends Route Reply (RREP) packet using the Primary (<S, F, G>) and
Backup(<S, A, B, C>) route as shown in Fig. 1. Each RREP packet contains the Primary as well
as the Backup route information. When source node S receives first RREP packet form
Fig. 2
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
52
destination, it treats this is the primary route and wireless communication is more error prone
compared to wired network. To improve the reliability we are sending route reply (primary +
backup routes information) through the primary and the secondary route. If any one packet gets
corrupted at the time of transmission, source must be able to use the other packet.
6. SECURED ROUTING PROTOCOL (SRP)
SRP works as an extension of basis protocols and ensures secured route discovery in presence of
adversarial nodes, which may prevent discovery of new routes by the basis protocols. SRP
introduces a set of new features which can be incorporated in Preemptive DSR(PDSR) with very
low overhead. The features like, control of the query propagation, the rate of query generation
etc. are all retained by PDSR. SRP only extends the basis protocol by enforcing rules on the
processing of the Route Request, Route Reply and the Route Error messages, by introducing the
required additional functionality for authentication.[4]
Fig 3: SRP
SRP is based on SA (Security Association) between the Source (S) and Destination (D), which is
instantiated by using public key of the other communicating end and the two nodes can negotiate
a shared secret key KS, D. The basic attempt is to ensure that the packet received from a node is
actually from the node which it claims to be - meaning the received packet is authenticated
against the sender’s id. MAC (Message Authentication Code) is calculated by using a random
query identifier, query sequence number, source address, destination address and KS,D as inputs.
The source S initiates the Route Discovery and constructs a Route Request packet. The Route
Request packet is identified by two identifiers, which are the query sequence number and a
random query identifier. The node identities (IP addresses) of the traversed nodes are
accumulated in the Route Request packet. For the same example of ad hoc network, as depicted
in Figure 2, the query request will be denoted by:
{QS,D;S,F,G},
where QS,D denotes the SRP header, which typically contains the query identifier, query
sequence number and MAC. The type field of header is set to request. S,F and G are the ids of the
intermediate nodes accumulated in the route request packet. The Route Request will traverse
through the network and will reach the destination, D. The destination will construct the route
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
53
replies. It calculates an MAC covering the route reply contents and returns the packet to Source S
over the reverse of the route accumulated in the respective request packet. The Route Reply will
be denoted by:
{RS,D;G,F,S},
where RS,D denotes the SRP header with the type field of the header set to reply. G,F,S is the
reversed sequence of the ids of the intermediate nodes used for traversing the path by the Route
Reply packet. Since the destination responds to multiple requests for the same query, it provides
the source with a diverse topology view. The source node S - the querying node -verifies each of
the replies and updates its topology view. The topology view is maintained as per the basis
protocol, which in following discussion is going to be PDSR. SMT presumes that there exists a
protocol to discover the routes. For our discussion, it is presumed that the responsibility of route
discovery is entrusted to SRP, with its integration with DSR as discussed in the following section.
7. SECURE MESSAGE TRANSMISSION
The goal of SMT is to ensure secure data forwarding after discovery of the route between the
source and the destination, which may or may not be free of malicious nodes. It is important to
understand here that SMT is a protocol which tolerates the existence of malicious nodes. SMT
combines four important elements; end-to-end secure and robust feedback mechanism, dispersion
of the transmitted data, simultaneous usage of multiple paths, and adaptation to the network
changing conditions. SMT requires Security Association (SA) between the two communicating
nodes, but does not depend on any cryptographic operations at the intermediate nodes. Active
Path Set (APS) with disjoint nodes is made available at the source for use by SMT. The source
disperses outgoing message into a number of pieces (P packets) at the source .Redundancy is
introduced and message is encoded. At the destination, the dispersed message is successfully
reconstructed to form original message, provided that sufficient number of pieces are received.
Since the fragmentation of the packets is done at the source using a secret sharing technique such
that if Q out of P such packets are received, the message can be reconstructed. Each dispersed
piece is transmitted through a different route and each piece carries the MAC. MAC is used at the
destination to verify the integrity and authenticity of its origin. The destination acknowledges the
receipts of the pieces. The feedback mechanism is also made secured and fault tolerant, the
acknowledgements are cryptographically protected and are also dispersed.
8. INTEGRATION OF SRP WITH PREEMPTIVE DSR
We shall now focus on the integration of SRP with PDSR to get S-PDSR for Secured Route
Discovery. There exists no security association in the PDSR protocol and it is presumed that
among the nodes participating in the network none are having malicious intent. As has been
discussed in the previous section, SRP can work over and above basic protocols, which now in
our discussion is limited to PDSR. The source S, trying to find a route to destination D, will
trigger a route discovery if there is no route available in the route cache of the source node. SRP
needs a SA between the two communicating nodes and it uses two identities, for it, random
request identifier and request id. MAC is calculated based on these ids and KS,D where KS,D is
shared key between source and destination. It may be noted here that PDSR also needs a random
id for its operation and it also accumulates ids of traversed nodes in the route request packet. In S-
PDSR it is proposed to integrate the PDSR and SRP functionality into a single protocol.
The route request packet format for S-PDSR will be:
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
54
{S,D,requestid, randomrequestidentifier, MAC,NodeList : S},
only the relevant components, which are applicable for the S-PDSR are listed in the above
format. As the Route Request packet will flow, ids of the intermediate nodes will get accumulated
in the “Node List” of the request packet. At the end typically, it will look like the following for
the example schematic of Figure 2:
{S,D,requestid, randomrequestidentifier, MAC,NodeList : S,S,F,G}.
When destination node D will receive this packet, it will first verify the authenticity of the packet,
by calculating the MAC using KS,D, the secret shared key. The reply packet will flow back to the
source from the destination and it will be re-verified at the source first by the SRP methodology
and then by the PDSR protocol. Successful verification will cache the discovered routes in the
route cache. In this process multiple routes will be discovered, since PDSR and SRP do not
prevent discovery of multiple routes. Thus S-PDSR retains the basic route discovery functionality
of PDSR and integrates the security aspects based on SRP proposals into its basic functioning.
The secured route discovery of multiple routes between two communicating nodes is achieved in
S-PDSR with minimum modifications in the methodology of PDSR and SRP.
9. INTEGRATION OF SMT WITH PREEMPTIVE DSR
PDSR, by its design, suggests to use alternate cached routes only when the ‘in use’ link is broken.
An alternate link from the route cache is used for continuing the data transmission. As an
enhancement to the ad hoc network operations, it is now proposed to use multiple routes
concurrently for data transmission, as per the methodology suggested in SMT. It may be noted
here that PDSR is only for route discovery and not for data transmission, although route
maintenance is a part of the PDSR operation. The data transmission phase of the ad hoc routing
protocol uses the links discovered by the route discovery phase of the protocol. SMT is one such
secured protocol suggested for data transmission phase of the MANET operations. SMT strongly
relies on usage of multiple routes between the communicating nodes. Data packets to be
transmitted from the source to the destination are dispersed into multiple packets (P) and are
routed through multiple routes simultaneously. At the destination, receipt of Q out of P packets
can ensure reconstruction of the original packet.[3]
Feature DSR Preemptive S-PDSR
Discovery of multiple
paths
Yes Yes
Secured Route Discovery No Yes
Advanced recovery from
link breakdowns
No Yes
Table 1: Parameter comparison of on demand routing
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
55
Fig 4: Example of SMT
Figure 3 depicts how dispersed packets and acknowledgement flow takes place in SMT. Let us
say for example, the data packet is dispersed into four parts (P =4) and each dispersed piece is
transmitted through different routes and carries a Message Authentication Code (MAC), based on
which the destination can verify the integrity of the packet and authenticity of its origin. Three
out of four packets are enough to reconstruct the original message. Each packet received at the
destination is acknowledged through a feedback. The feedback mechanism is also fault tolerant,
secure, dispersed and cryptographically protected. In the example of Figure 4, two packets are
received at the destination and two are either lost or compromised. The destination extracts
information from first received packet and waits for remaining packets while setting a reception
timer. On expiry of the timer, the receiver generates acknowledgement for the two successfully
received packets. The sender rejects the two failing routes, on receipt of the acknowledgement
packets and retransmits the two packets. One of the retransmitted packet is again compromised.
Since only three out of four packets are enough to reconstruct the message at the destination, the
receiver acknowledges successful reception, even before expiration of timer. This paper strongly
suggests another aspect of multiple route usage. In addition to security, as dealt in SMT, S-PDSR
proposes to use multiple paths for improved throughput. This multiple path usage is another
feature for improved QoS for MANET operations. Integration of SMT into PDSR, giving one of
the proposed extensions of PDSR results in S-PDSR that can be summarized in Table 1.
10. PERFORMANCE IMPLICATIONS FOR S-PDSR
Since the nodes in ad hoc network are operating under constrained conditions owing to limited
battery life, limited transmission range, limited bandwidth and limited computing resource, it is
essential that any protocol change/enhancement must be verified and validated for their
influence/implications on the performance of the protocol. This section discusses the various
related over heads, based on the enhancements suggested in the previous sections of this paper[1].
8.1 Proactive Route Discovery Overhead
By design, proactive protocols are not aimed at initiating route discovery unless there is a need
for a route between two nodes. However in S-PDSR, it is proposed to include proactive route
discovery in case number of standby routes fall below a threshold level. The associated overhead
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
56
is justified, in view of the QoS factor to support continued service for applications like voice over
IP, video conferencing etc.
8.2 Overhead of Checking Route up Status Periodically
The route status in S-PDSR is proposed to be checked periodically. Since the stand by routes are
likely to be used whenever needed, their availability must be ascertained by the protocol. S-PDSR
proposes to have a light weight heart beat algorithm built into the protocol. This should be
triggered whenever the source is actively using the cached routes for a particular destination. S-
PDSR is also proposed to have an algorithm for arranging the cached routes for efficient
selection. A suitable data structure is proposed to be worked out for organizing the cached routes
at the nodes and operate using an efficient search criteria.
8.3 Packet Dispersion and Reconstruction Overhead
The proposed inclusion of SMT functionality in S-PDSR will disperse data into multiple packets
and reconstruct the packets at the destination. This will increase the processing overheads, but
will provide secured data transmission. In addition, use of multiple routes concurrently will
provide enhanced throughput. For bandwidth hungry applications, use of multiple routes will
improve QoS for data transmission.
8.4 Overhead for Basic DSR Functioning with SRP Enhancement in S-PDSR
By definition PDSR has a large route request packet and inclusion of another id and MAC will
further increase the packet size in S-PDSR. This overhead due to extended packet size is marginal
as compared to the size of the PDSR packet. To further compensate for this increased size, it is
proposed to have a single header, instead of two (PDSR+ SRP) and achieve the required
functionality of secured route discovery. Although, the processing time for the packet at each
node will increase, as the computing power is increasing, it is likely to become null and void in
future.
11. CONCLUSION
PDSR is a very matured protocol and a lot of research work has verified its functioning and
effectiveness. The latest IETF draft on DSR does not include the security aspects and it has been
left as future work for possible enhancements. In this paper, possible enhancements to PDSR to
provide security features have been proposed. Further, proposals are also made for better route
cache maintenance and management. By incorporating the functioning of SRP into PDSR, new
secured protocol, which has been named as S-PDSR is proposed. Concurrent use of multiple
paths, as per the functioning guidelines of SMT, has further enhanced the capabilities of PDSR
for secured delivery of data packets, even in presence of malicious nodes.
REFERENCES
1. Anil Rawat, Prakash Dttatraya and Ashwani kumar Ramani “ Enhanced DSR For MANET
With improved QoS”, International journal of network security, Vol 5, No.2, PP.158-166, Sept
2007.
2. Mr. V.Ramesh, Dr.P. Subbaiah “ Preemptive DSR for MANET” in International Conference
Proceedings (ICETCSE-2008), VR Siddartha Engg. College, Vijayawada.
3. P. Papadimitratos and Z. J. Haas, “Secure message transmission in mobile Ad hocNetworks”,
Elsevier Ad Hoc Networks Journal, vol. 1, no. 1, pp. 193-209, July 2003.
4. Y. C. Hu and D. B. Johnson, “Securing quality-of-service route discovery in on-demand
routing for Ad hoc networks”, in Security of Ad Hoc and Sensor Networks 2004(SASN 2004),
Washington, USA, Oct.2004.
5. Y. C. Hu and A. Perrig, “A survey of secure wireless Ad hoc routing”, IEEE Security &
Privacy, vol. 2, no. 3, IEEE Computer Society, pp. 28-39, May-June 2004.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010
57
6. M. F. Juwad, and H. S. Al-Raweshidy, “Experimental Performance Comparisons
between
SAODV & AODV”, IEEE Second Asia International Conference on Modelling &
Simulation,
2008.
7. Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark.
Routing Protocols for Mobile Ad-hoc Networks—A Comparative Performance Analysis. In
Proceedings of the Fifth International Conference on Mobile Computing and Networking
(MobiCom’99). ACM, August 1999.
8. David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless
Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages
153–181. Kluwer Academic Publishers, 1996.
ABOUT AUTHORS
1. Mr.V. Ramesh received his B.Tech from N.B.K.R.I.S.T, Vidyanagar, AP in
Computer Science & Engineering and M.Tech in IT from Sathyabama University, Chennai.
Presently he is working as Associate Professor at Atmakur Engineering College, Atmakur, Nellore-
Dt, AP, India. He has published several papers in various International & National Conferences and
Journals. Presently he is pursuing his Ph. D in the field of Ad-hoc networks at Sathyabama
University. His research interests include Operating Systems, Computer Networks and Data
Mining.
2. Dr P. Subbaiah received M.Tech(D.S.C) from JNTU and Ph. D from S.K
University, Ananthapur in the area of fault tolerant systems. He has published several papers in
international, national conferences and journals. He guided 6 research scholars. Presently he is
working as Principal, Veerabrahmendra Institute of Tech & Science, Badvel, Kadapa, AP, India.
His research interests include Mobile ad-hoc networks, Digital image processing and VLSI design.
3. N.Sandeep Chaitanya, received his B.Tech from DVRCET, Hyd, AP in Computer
Science & Information Technology and M.Tech in Information Technology from Sathyabama
University, Chennai. Presently he is working as Associate Professor at SreeKavitha Engineering
College,Khammam,AP.. He has published several papers in various International & National
Conferences and Journals.. His research interests include Mobile Networking, Computer Networks
and Data Mining.
4. Mr Bakthavachalam, working as In-Charge Principal at Govt. Polytechnic College, Badvel,
Kadapa,AP,India.

More Related Content

PDF
G343741
IJERA Editor
 
PDF
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
ijwmn
 
PDF
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
PDF
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
PDF
An Enhanced DSR Protocol for Improving QoS in MANET
KhushbooGupta145
 
PDF
Hj2413101315
IJERA Editor
 
PDF
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
ijasuc
 
PDF
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
IJERA Editor
 
G343741
IJERA Editor
 
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
ijwmn
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
An Enhanced DSR Protocol for Improving QoS in MANET
KhushbooGupta145
 
Hj2413101315
IJERA Editor
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
ijasuc
 
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
IJERA Editor
 

What's hot (15)

PDF
Performance Comparison and Analysis of Preemptive-DSR and TORA
ijasuc
 
PDF
Ge3411331139
IJERA Editor
 
PDF
Fo35991995
IJERA Editor
 
PDF
Caching strategies for on demand routing protocols for wireless ad hoc network
Acel-Omeran
 
PDF
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
International Journal of Technical Research & Application
 
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
Par petal ant routing algorithm for
IJCNCJournal
 
PDF
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
PDF
ICICCE0367
IJTET Journal
 
PDF
Be31390392
IJERA Editor
 
PDF
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Eswar Publications
 
PDF
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR
 
PDF
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
IJNSA Journal
 
PDF
Eb34777780
IJERA Editor
 
PDF
Ly2520762079
IJERA Editor
 
Performance Comparison and Analysis of Preemptive-DSR and TORA
ijasuc
 
Ge3411331139
IJERA Editor
 
Fo35991995
IJERA Editor
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Acel-Omeran
 
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
International Journal of Technical Research & Application
 
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Par petal ant routing algorithm for
IJCNCJournal
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
ICICCE0367
IJTET Journal
 
Be31390392
IJERA Editor
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Eswar Publications
 
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
IJNSA Journal
 
Eb34777780
IJERA Editor
 
Ly2520762079
IJERA Editor
 
Ad

Similar to Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive DSR for Secured Route Discovery (20)

PDF
Hd3312521256
IJERA Editor
 
PDF
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
PDF
Performance evaluation of various types of nodes in
eSAT Publishing House
 
PDF
Performance evaluation of various types of nodes in manet with dsr routing pr...
eSAT Journals
 
PDF
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
PDF
SURVEY: COMPARISON ESTIMATION OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD-HOC N...
samueljackson3773
 
PDF
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
PDF
A Survey of Enhanced Routing Protocols for Manets
pijans
 
PDF
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
PDF
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
PDF
Performance analysis of aodv, olsr, grp and dsr routing
eSAT Publishing House
 
PDF
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
eSAT Journals
 
PDF
ENERGY EFFICIENT SHORTEST PATH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
AM Publications
 
PDF
J017515960
IOSR Journals
 
PDF
Tree Based Proactive Source Routing Protocol for MANETs
paperpublications3
 
PDF
F41023946
IJERA Editor
 
PDF
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
PDF
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Hd3312521256
IJERA Editor
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
Performance evaluation of various types of nodes in
eSAT Publishing House
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
eSAT Journals
 
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
SURVEY: COMPARISON ESTIMATION OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD-HOC N...
samueljackson3773
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
A Survey of Enhanced Routing Protocols for Manets
pijans
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
Performance analysis of aodv, olsr, grp and dsr routing
eSAT Publishing House
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
eSAT Journals
 
ENERGY EFFICIENT SHORTEST PATH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
AM Publications
 
J017515960
IOSR Journals
 
Tree Based Proactive Source Routing Protocol for MANETs
paperpublications3
 
F41023946
IJERA Editor
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
INTRODUCTION TO HTML .pptx
bbariaroshan003
 
PDF
THE EFFECTIVENESS OF USING THE E-OFFICE AND THE SRIKANDI APPLICATIONS AT THE ...
AJHSSR Journal
 
PPTX
INTRODUCTION TO HTML. pptx
bariabariabariabaria
 
PDF
Buy Facebook Growth That Works Get Started
SocioCosmos
 
PDF
Dominate Your Niche—The Smart Way...............
SocioCosmos
 
PDF
Best Digital Marketing Services in India
Kunal Chouhan
 
PDF
Make Your Presence Non-Negotiable .......
SocioCosmos
 
PDF
TikTok UGC Marketing_ Use Hashtags to Boost Sales.
Ufki
 
PDF
ATTITUDE OF GENERATION Z COLLEGE STUDENTS TOWARDS STUDYING SOCIAL SCIENCE
AJHSSR Journal
 
PDF
MIL LESSON 1 - MEDIA IN THE CONTEXT OF MIL.pdf
ellakimoxford
 
PDF
Improving Rural Teachers' Pedagogical Competence Through Peer Coaching Approa...
AJHSSR Journal
 
PDF
Boost Your Business with Expert Digital Marketing Services
Amrit Web
 
PPTX
IMPACT OF AI FOR FUTURE GENERATIONS.pptx
holin7
 
PPTX
INTRODUCTION TO HTML .pptx
bbariaroshan003
 
PDF
EMMANUEL LEVINAS’ CONCEPT OF INTERSUBJECTIVITY AS INFINITE RESPONSIBILITY
AJHSSR Journal
 
PDF
The Journey of Digital Marketing Explained
dhanalakshmipanchadh
 
PDF
STRESS AND COPING STRATEGIES DURING PANDEMIC AMONG ELEMENTARY SCHOOL TEACHERS
AJHSSR Journal
 
PDF
Modern & Stylish Kitchen Design Ideas.pdf
muqarrab277
 
PDF
Your Brand’s Pinterest Blueprint Build Your Pinterest Plan
SocioCosmos
 
PDF
Be Seen Where It Scrolls Claim Your Spot
SocioCosmos
 
INTRODUCTION TO HTML .pptx
bbariaroshan003
 
THE EFFECTIVENESS OF USING THE E-OFFICE AND THE SRIKANDI APPLICATIONS AT THE ...
AJHSSR Journal
 
INTRODUCTION TO HTML. pptx
bariabariabariabaria
 
Buy Facebook Growth That Works Get Started
SocioCosmos
 
Dominate Your Niche—The Smart Way...............
SocioCosmos
 
Best Digital Marketing Services in India
Kunal Chouhan
 
Make Your Presence Non-Negotiable .......
SocioCosmos
 
TikTok UGC Marketing_ Use Hashtags to Boost Sales.
Ufki
 
ATTITUDE OF GENERATION Z COLLEGE STUDENTS TOWARDS STUDYING SOCIAL SCIENCE
AJHSSR Journal
 
MIL LESSON 1 - MEDIA IN THE CONTEXT OF MIL.pdf
ellakimoxford
 
Improving Rural Teachers' Pedagogical Competence Through Peer Coaching Approa...
AJHSSR Journal
 
Boost Your Business with Expert Digital Marketing Services
Amrit Web
 
IMPACT OF AI FOR FUTURE GENERATIONS.pptx
holin7
 
INTRODUCTION TO HTML .pptx
bbariaroshan003
 
EMMANUEL LEVINAS’ CONCEPT OF INTERSUBJECTIVITY AS INFINITE RESPONSIBILITY
AJHSSR Journal
 
The Journey of Digital Marketing Explained
dhanalakshmipanchadh
 
STRESS AND COPING STRATEGIES DURING PANDEMIC AMONG ELEMENTARY SCHOOL TEACHERS
AJHSSR Journal
 
Modern & Stylish Kitchen Design Ideas.pdf
muqarrab277
 
Your Brand’s Pinterest Blueprint Build Your Pinterest Plan
SocioCosmos
 
Be Seen Where It Scrolls Claim Your Spot
SocioCosmos
 

Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive DSR for Secured Route Discovery

  • 1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 DOI : 10.5121/ijasuc.2010.1304 45 Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive DSR for Secured Route Discovery V.Ramesh 1 Dr.P.Subbaiah 2 N.Sandeep Chaitanya 3 P. Bhaktavastalam 4 1 Research scholar,Sathyabama University ,Chennai & Assoc. Professor, Atmakur Engg. College, Nellore Dt, AP, India. [email protected]. 2 Principal, Veerabrahmendra Institute of Technology & Sciences,Badvel,Kadapa-Dt,AP, India. [email protected]. 3 Assoc.Professor, Dept of IT, SreeKavitha Engineering College, Khammam, AP,India. [email protected]. 4 In-Charge Principal, Govt. Polytechnic College, Badvel, AP, India. [email protected]. Abstract In Contrast with traditional networks, ad hoc networks not require any previously built infrastructure, they are distributed and fully self-organized systems. Due to absence of any fixed node, each node acts as a router, providing routing capabilities of the MANET. In a distributed network, with out any infrastructure communicating peers have to rely on the whole network, therefore the proper security hardly can be established. This paper proposes enhancements in Preemptive DSR to provide secured route discovery. This paper evaluates integration of Secured Routing Protocol (SRP) and Secured Message Transmission(SMT) with Preemptive Dynamic Source Routing (PDSR) to get Secured PDSR(S-PDSR), which is capable of secured route discovery. Keywords: MANET, SRP, SMT, Preemptive DSR 1.INTRODUCTION A Mobile Ad-Hoc Network (MANET) is an autonomous collection of mobile nodes having no centralized control or fixed infrastructure to support the network and it is entirely distributed. MANET topology is dynamic; nodes enter and leave the network continuously. Each node in the network acts as host as well as router and forwards the packets to destination node. Due to frequent change in network topology, routing has become an essential network protocol in mobile ad hoc networking, MANET routing protocol in mobile ad hoc networking. MANET routing protocols are classified into two types:- Proactive (table-driven) and Reactive(on-demand) routing based on when and how the routes are discovered. Proactive routing protocols is consistent and up-to-date data routing information is available in each node, but in reactive the routes are discovered only when required by the source node. In MANET, proactive protocols have higher overhead than reactive protocols due to continuous route updating. Reactive protocols may be used to get higher routing efficiency when only few
  • 2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 46 nodes with high mobility have data to send. Otherwise proactive protocols may be used to get higher routing efficiency. In this paper, new enhanced version of Preemptive DSR ( S-PDSR ), has been proposed which is based on the principle used in SRP for secured route discovery. The feature of basic PDSR to discover multiple routes is further exploited and it is suggested to incorporate the features of Secured Message Transmission (SMT) using multiple routes. It thus ensures data transmission in the data transmission phase of the MANET operation.[3] 2. Ad Hoc On Demand Distance Vector (AODV) AODV [6] is perhaps the most well-known routing protocol for a MANET. It is a reactive protocol: nodes in the network exchange routing information only when a communication must take place and keep this information up-to-date only as long as the communication lasts. When a node must send a packet to another node, it starts a route discovery process in order to establish a route toward the destination node. Therefore, it sends its neighbors a route request message (RREQ). Neighboring nodes receive the request, increment the hop count, and forward the message to their neighbors, so that RREQs are actually broadcasted using a flooding approach. The goal of the RREQ message is to find the destination node, but it also has the side effect of making other nodes learn a route towards the source node (the reverse route): a node that has received a RREQ message, with source address S from its neighbor A, knows that it can reach S through A and records this information in its routing table along with the hop count (i.e., its distance from node S following that route). The RREQ message will eventually reach the destination node, which will react with a route reply message (RREP). The RREP is sent as a unicast, using the path towards the source node established by the RREQ. Similarly to what happens with RREQs, the RREP message allows intermediate nodes to learn a route toward the destination node (i.e., the originator of the RREP). Therefore, at the end of the route discovery process, packets can be delivered from the source to the destination node and vice versa. A third kind of routing message, called route error (RERR), allows nodes to notify errors, for example, because a previous neighbor has moved and is no longer reachable. If the route is not active (i.e., there is no data traffic flowing through it), all routing information expires after a timeout and is removed from the routing table.
  • 3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 47 3. Dynamic Source Routing(DSR) As described in (David B. Johnson and David A. Maltz 1996), DSR is a simple and an efficient reactive routing protocol that is designed especially for use in multi-hop wireless Ad hoc networks. It is designed for very high mobility rate with up to 200 mobile nodes. It incurs very low overhead but reacts very quickly to changes in the network. DSR allows an ad hoc network to be self-organizing and self-configuring without relying on an existing network infrastructure or administration. Mobile nodes cooperate to forward packets to each other to allow communications over multiple hopes between nodes that are not within communication range of each other. The protocol is composed of two mechanisms that operate on demand. Route Discovery is the mechanism by which a node S wishing to send a packet to a destination node D obtains a source route to D. Route Discovery is used only when S attempts to send a packet to D and does not already know a route to D. Route Maintenance is the mechanism by which node S is able to detect, while using a source route to D, if the network topology has changed such that it can no longer use its route to D because a link along the route no longer works. When Route Maintenance indicates a source route is broken, S can attempt to use any other route it happens to know to D, or can invoke Route Discovery again to find a new route. Route Maintenance is used only when S is actually sending packets to D. Route Discovery When some node S originates a new packet destined to some other node D, it places in the header of the packet a source route giving the sequence of hops that the packet should follow on its way to D. Normally, S will obtain a suitable source route by searching its Route Cache of routes previously learned, but if no route is found in its cache, it will initiate the Route Discovery protocol to dynamically find a new route to D. In this case, we call S the initiator and D the target of the Route Discovery. For example, Figure 1 illustrates an example Route Discovery, in which a node A is attempting to discover a route to node E. To initiate the Route Discovery, A transmits a ROUTE REQUEST message as a single local broadcast packet, which is received by (approximately) all nodes currently within wireless transmission range of A. Each ROUTE REQUEST message identifies the initiator and target of the Route Discovery, and also contains a unique request id, determined by the initiator of the REQUEST. Each ROUTE REQUEST also contains a record listing the address of each intermediate node through which this particular copy of the ROUTE REQUEST message has been forwarded. This route record is initialized to an empty list by the initiator of the Route Discovery.
  • 4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 48 Fig 1: Route Discovery example: Node A is the initiator, and node E is the target When another node receives a ROUTE REQUEST, if it is the target of the Route Discovery, it returns a ROUTE REPLY message to the initiator of the Route Discovery, giving a copy of the accumulated route record from the ROUTE REQUEST; when the initiator receives this ROUTE REPLY, it caches this route in its Route Cache for use in sending subsequent packets to this destination. Otherwise, if this node receiving the ROUTE REQUEST has recently seen another ROUTE REQUEST message from this initiator bearing this same request id, or if it finds that its own address is already listed in the route record in the ROUTE REQUEST message, it discards the REQUEST. Otherwise, this node appends its own address to the route record in the ROUTE REQUEST message and propagates it by transmitting it as a local broadcast packet (with the same request id). In returning the ROUTE REPLY to the initiator of the Route Discovery, such as node E replying back to A in Figure 1, node E will typically examine its own Route Cache for a route back to A, and if found, will use it for the source route for delivery of the packet containing the ROUTE REPLY. Otherwise, E may perform its own Route Discovery for target node A, but to avoid possible infinite recursion of Route Discoveries, it must piggyback this ROUTE REPLY on its own ROUTE REQUEST message for A. It is also possible to piggyback other small data packets, such as a TCP SYN packet [Postel 1981b], on a ROUTE REQUEST using this same mechanism. Node E could also simply reverse the sequence of hops in the route record that it trying to send in the ROUTE REPLY, and use this as the source route on the packet carrying the ROUTE REPLY itself. For MAC protocols such as IEEE 802.11 that require a bi-directional frame exchange as part of the MAC protocol [IEEE 1997], this route reversal is preferred as it avoids the overhead of a possible second Route Discovery, and it tests the discovered route to ensure it is bi-directional before the Route Discovery initiator begins using the route. However, this technique will prevent the discovery of routes using uni-directional links. In wireless environments where the use of uni- directional links is permitted, such routes may in some cases be more efficient than those with only bi-directional links, or they may be the only way to achieve connectivity to the target node. Route Maintenance When originating or forwarding a packet using a source route,each node transmitting the packet is responsible for confirming that the packet has been received by the next hop along the source route; the packet is retransmitted (up to a maximum number of attempts) until this confirmation of receipt is received. For example, in the situation illustrated in Figure 2, node A has originated a
  • 5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 49 packet for E using a source route through intermediate nodes B, C, and D. In this case, node A is responsible for receipt of the packet at B, node B is responsible for receipt at C, node C is responsible for receipt at D, and node D is responsible for receipt finally at the destination E. This confirmation of receipt in many cases may be provided at no cost to DSR, either as an existing standard part of theMAC protocol in use (such as the link-level acknowledgement frame defined by IEEE 802.11 [IEEE 1997]), or by a passive acknowledgement [Jubin 1987] (in which, for example, B confirms receipt at C by overhearing C transmit the packet to forward it on to D). If neither of these confirmation mechanisms are available, the node transmitting the packet may set a bit in the packet’s header to request a DSR-specific software acknowledgement be returned by the next hop; this software acknowledgement will normally be transmitted directly to the sending node, but if the link between these two nodes is uni-directional, this software acknowledgement may travel over a different, multi-hop path. If the packet is retransmitted by some hop the maximum number of times and no receipt confirmation is received, this node returns a ROUTE ERROR message to the original sender of the packet, identifying the link over which the packet could not be forwarded. For example, in Figure 2, if C is unable to deliver the packet to the next hop D, then C returns a ROUTE ERROR to A, stating that the link from C to D is currently “broken.” Node A then removes this broken link from its cache; any retransmission of the original packet is a function for upper layer protocols such as TCP. For sending such a retransmission or other packets to this same destination E, if A has in its Route Cache another route to E (for example, from additional ROUTE REPLYs from its earlier Route Discovery, or from having overheard sufficient routing information from other packets), it can send the packet using the new route immediately. Otherwise, it may perform a new Route Discovery for this target (subject to the exponential backoff described in Section 3.2). 4. CLASSIFICATION OF ATTACKS Like all kinds of networks, passive attack and active attack are two kinds of attacks which can be launched against ad hoc networks. The passive attacks only intercept the message transmitted in the network without disturbing the transmission. By doing this, the attacker will be able to analyze the valuable information like network topology to perform further attacks. For example, by eavesdropping and subsequent analyses, the attacker may notice that some particular node is used much more than the others, which means it might be the ‘heart’ of this network. If this node is brought down, the whole network will be out of action as well. Then the attacker can deploy some special attacks to achieve this goal. Unfortunately, this kind of attack in wireless network is impossible to detect due to the nature of wireless network that its medium is air which is widely open to every user within the domain. The active attacks are carried out by malicious nodes which aim to disrupt transmission among other nodes or selfish nodes which may just want to save their own battery. There are mainly three ways to perform such an attack.[5] Attacks using modification Below we briefly talk about several modification attacks against AODV and DSR. (1) Redirection by Modified Route Sequence Numbers: Protocols such as AODV assign some value to routes to the specific destination to decide the priority. A route with a higher value is preferred. The node may change traffic through itself by advertising a route to a node with a greater value. (2) Redirection with Modified Hop Counts:
  • 6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 50 Without other metrics, AODV uses the hop count field to determine a shortest path. Malicious nodes can reset the hop count field of the RREQ to zero so that increases the chance that they are included on a newly created route. Similarly, malicious nodes may be not included in the created routes if they set the hop count field of the RREQ to infinity. (3) Denial-of-service with Modified Source Routes: DSR uses source routes stating routes in data packets. These routes lack integrity checks. So denial-of-service attack can be launched by altering the source routes in packet headers so that the packet can not be delivered to the destination. Attacks using Fabrication When a node misrepresent the identity in the network such as by altering MAC or IP address in outgoing packets, spoofing can occur. It can modify the rooting of some nodes then lead to loops in the network which will increase the power consumption greatly. Attacks using Impersonation These attacks generate false routing messages which can be difficult to distinguish from invalid constructs. (1) Falsifying Route Errors in AODV and DSR: In ADOV and DSR, if the destination node or an intermediate node along the active path moves, the node upstream of the link break broadcasts a route error message to all active up stream neighbors. This message causes the corresponding route to be invalid. A denial-of-service attack can be achieved by sending route error messages indicating a broken link on the route, then prevent the source from communicating with destination. (2) Route Cache Poisoning in DSR: A node overhearing may add the routing information contained in the packet's header to its own route cache. An attacker can exploit this method of learning modify route caches by transmitting packets containing invalid routes in their headers. 5. OVERVIEW OF PREEMPTIVE DSR Assumptions: We assume that all nodes wishing to communicate with other nodes within the ad hoc network are willing to participate fully in the protocols of the network. Each node participating in the network should also be willing to forward packets for other nodes in the network. We refer to the minimum number of hops necessary for a packet to reach from source to destination. We assume that he diameter of an ad-hoc network will be small(5 to 10 hops), but greater than 1. Packets may be lost or corrupted in transmission on the ad-hoc wireless network. A node receiving a corrupted packet can detect the error and discard the packet. < Nodes within the ad hoc network may move at any time without notice, and may even move continuously, but we assume that the speed with which nodes move is moderate with respect to the packet transmission latency and wireless transmission range of that particular network hardware in use. Preemptive DSR can support very rapid rates mobility, but we assume that nodes do not continuously move with high peed, because it may flood data packet in ad-hoc wireless networks. The wireless communications link between each pair of nodes will be bi- directional. But some time the wireless link between two nodes may be uni-directional also.[2] The Algorithm: a) Route Discovery: Step 1: When a source node S wants to send a data, it broadcast the RREQ packet to its neighbor nodes. Step 2: When an intermediate node on the route to the destination receives the RREQ packet, it appends its address to the route record in RREQ and re-broadcast the RREQ.
  • 7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 51 Step 3: When the destination node D receives the first RREQ packet, it starts a timer and collects RREQ packets from its neighbors until quantum q time expires. Step 4: The destination node D finds the two (primary +Backup) best routes from the collected paths (Step 3) within the quantum q time. Step 5: The destination node D sends RREP packet to the source node S by reversing (RREQ) packets which includes the two routes (Primary +Backup) for further communication. b) Route Monitoring: Step 1: Each intermediate node on the route starts monitoring the signal strength. Step 2: If signal strength falls below the specified threshold T, it will send a warning message “Path likely to be disconnected”, to the source node S. c) The Source node S Communicates with destination node D: Step 1:The source node S starts Communicating with destination node D using primary path. Step 2: On receiving the warning message from the intermediate node, it starts communicating destination node D with the backup route also. Step 3: If source node S receives the acknowledgement form the destination node D go to step 4 else step 5. Step 4: Preemption, switch over from Primary to Backup route. Step 5: Initiates Route Discovery Process. Ex: When a source node S want to send message to the destination node D, it initiates route discovery by broadcasting the RREQ packet to its neighbors (A, E, F) as shown in Fig 2. The intermediate nodes (A, E, F) on receive the RREQ packet rebroadcast the packet to its neighbors by appending its id in the route record of the RREQ packet. Similarly other intermediate nodes also forward the RREQ packet to the destination. When the destination node D receives two or more RREQ packets from the same source through different routes, it finds the two best routes based on the no of hopes. The route which has least number of hopes. The route which has least number of hops it becomes primary<S, F, G>, and second least number of hops route becomes backup route<S, A, B, C>. The destination node D sends Route Reply (RREP) packet using the Primary (<S, F, G>) and Backup(<S, A, B, C>) route as shown in Fig. 1. Each RREP packet contains the Primary as well as the Backup route information. When source node S receives first RREP packet form Fig. 2
  • 8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 52 destination, it treats this is the primary route and wireless communication is more error prone compared to wired network. To improve the reliability we are sending route reply (primary + backup routes information) through the primary and the secondary route. If any one packet gets corrupted at the time of transmission, source must be able to use the other packet. 6. SECURED ROUTING PROTOCOL (SRP) SRP works as an extension of basis protocols and ensures secured route discovery in presence of adversarial nodes, which may prevent discovery of new routes by the basis protocols. SRP introduces a set of new features which can be incorporated in Preemptive DSR(PDSR) with very low overhead. The features like, control of the query propagation, the rate of query generation etc. are all retained by PDSR. SRP only extends the basis protocol by enforcing rules on the processing of the Route Request, Route Reply and the Route Error messages, by introducing the required additional functionality for authentication.[4] Fig 3: SRP SRP is based on SA (Security Association) between the Source (S) and Destination (D), which is instantiated by using public key of the other communicating end and the two nodes can negotiate a shared secret key KS, D. The basic attempt is to ensure that the packet received from a node is actually from the node which it claims to be - meaning the received packet is authenticated against the sender’s id. MAC (Message Authentication Code) is calculated by using a random query identifier, query sequence number, source address, destination address and KS,D as inputs. The source S initiates the Route Discovery and constructs a Route Request packet. The Route Request packet is identified by two identifiers, which are the query sequence number and a random query identifier. The node identities (IP addresses) of the traversed nodes are accumulated in the Route Request packet. For the same example of ad hoc network, as depicted in Figure 2, the query request will be denoted by: {QS,D;S,F,G}, where QS,D denotes the SRP header, which typically contains the query identifier, query sequence number and MAC. The type field of header is set to request. S,F and G are the ids of the intermediate nodes accumulated in the route request packet. The Route Request will traverse through the network and will reach the destination, D. The destination will construct the route
  • 9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 53 replies. It calculates an MAC covering the route reply contents and returns the packet to Source S over the reverse of the route accumulated in the respective request packet. The Route Reply will be denoted by: {RS,D;G,F,S}, where RS,D denotes the SRP header with the type field of the header set to reply. G,F,S is the reversed sequence of the ids of the intermediate nodes used for traversing the path by the Route Reply packet. Since the destination responds to multiple requests for the same query, it provides the source with a diverse topology view. The source node S - the querying node -verifies each of the replies and updates its topology view. The topology view is maintained as per the basis protocol, which in following discussion is going to be PDSR. SMT presumes that there exists a protocol to discover the routes. For our discussion, it is presumed that the responsibility of route discovery is entrusted to SRP, with its integration with DSR as discussed in the following section. 7. SECURE MESSAGE TRANSMISSION The goal of SMT is to ensure secure data forwarding after discovery of the route between the source and the destination, which may or may not be free of malicious nodes. It is important to understand here that SMT is a protocol which tolerates the existence of malicious nodes. SMT combines four important elements; end-to-end secure and robust feedback mechanism, dispersion of the transmitted data, simultaneous usage of multiple paths, and adaptation to the network changing conditions. SMT requires Security Association (SA) between the two communicating nodes, but does not depend on any cryptographic operations at the intermediate nodes. Active Path Set (APS) with disjoint nodes is made available at the source for use by SMT. The source disperses outgoing message into a number of pieces (P packets) at the source .Redundancy is introduced and message is encoded. At the destination, the dispersed message is successfully reconstructed to form original message, provided that sufficient number of pieces are received. Since the fragmentation of the packets is done at the source using a secret sharing technique such that if Q out of P such packets are received, the message can be reconstructed. Each dispersed piece is transmitted through a different route and each piece carries the MAC. MAC is used at the destination to verify the integrity and authenticity of its origin. The destination acknowledges the receipts of the pieces. The feedback mechanism is also made secured and fault tolerant, the acknowledgements are cryptographically protected and are also dispersed. 8. INTEGRATION OF SRP WITH PREEMPTIVE DSR We shall now focus on the integration of SRP with PDSR to get S-PDSR for Secured Route Discovery. There exists no security association in the PDSR protocol and it is presumed that among the nodes participating in the network none are having malicious intent. As has been discussed in the previous section, SRP can work over and above basic protocols, which now in our discussion is limited to PDSR. The source S, trying to find a route to destination D, will trigger a route discovery if there is no route available in the route cache of the source node. SRP needs a SA between the two communicating nodes and it uses two identities, for it, random request identifier and request id. MAC is calculated based on these ids and KS,D where KS,D is shared key between source and destination. It may be noted here that PDSR also needs a random id for its operation and it also accumulates ids of traversed nodes in the route request packet. In S- PDSR it is proposed to integrate the PDSR and SRP functionality into a single protocol. The route request packet format for S-PDSR will be:
  • 10. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 54 {S,D,requestid, randomrequestidentifier, MAC,NodeList : S}, only the relevant components, which are applicable for the S-PDSR are listed in the above format. As the Route Request packet will flow, ids of the intermediate nodes will get accumulated in the “Node List” of the request packet. At the end typically, it will look like the following for the example schematic of Figure 2: {S,D,requestid, randomrequestidentifier, MAC,NodeList : S,S,F,G}. When destination node D will receive this packet, it will first verify the authenticity of the packet, by calculating the MAC using KS,D, the secret shared key. The reply packet will flow back to the source from the destination and it will be re-verified at the source first by the SRP methodology and then by the PDSR protocol. Successful verification will cache the discovered routes in the route cache. In this process multiple routes will be discovered, since PDSR and SRP do not prevent discovery of multiple routes. Thus S-PDSR retains the basic route discovery functionality of PDSR and integrates the security aspects based on SRP proposals into its basic functioning. The secured route discovery of multiple routes between two communicating nodes is achieved in S-PDSR with minimum modifications in the methodology of PDSR and SRP. 9. INTEGRATION OF SMT WITH PREEMPTIVE DSR PDSR, by its design, suggests to use alternate cached routes only when the ‘in use’ link is broken. An alternate link from the route cache is used for continuing the data transmission. As an enhancement to the ad hoc network operations, it is now proposed to use multiple routes concurrently for data transmission, as per the methodology suggested in SMT. It may be noted here that PDSR is only for route discovery and not for data transmission, although route maintenance is a part of the PDSR operation. The data transmission phase of the ad hoc routing protocol uses the links discovered by the route discovery phase of the protocol. SMT is one such secured protocol suggested for data transmission phase of the MANET operations. SMT strongly relies on usage of multiple routes between the communicating nodes. Data packets to be transmitted from the source to the destination are dispersed into multiple packets (P) and are routed through multiple routes simultaneously. At the destination, receipt of Q out of P packets can ensure reconstruction of the original packet.[3] Feature DSR Preemptive S-PDSR Discovery of multiple paths Yes Yes Secured Route Discovery No Yes Advanced recovery from link breakdowns No Yes Table 1: Parameter comparison of on demand routing
  • 11. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 55 Fig 4: Example of SMT Figure 3 depicts how dispersed packets and acknowledgement flow takes place in SMT. Let us say for example, the data packet is dispersed into four parts (P =4) and each dispersed piece is transmitted through different routes and carries a Message Authentication Code (MAC), based on which the destination can verify the integrity of the packet and authenticity of its origin. Three out of four packets are enough to reconstruct the original message. Each packet received at the destination is acknowledged through a feedback. The feedback mechanism is also fault tolerant, secure, dispersed and cryptographically protected. In the example of Figure 4, two packets are received at the destination and two are either lost or compromised. The destination extracts information from first received packet and waits for remaining packets while setting a reception timer. On expiry of the timer, the receiver generates acknowledgement for the two successfully received packets. The sender rejects the two failing routes, on receipt of the acknowledgement packets and retransmits the two packets. One of the retransmitted packet is again compromised. Since only three out of four packets are enough to reconstruct the message at the destination, the receiver acknowledges successful reception, even before expiration of timer. This paper strongly suggests another aspect of multiple route usage. In addition to security, as dealt in SMT, S-PDSR proposes to use multiple paths for improved throughput. This multiple path usage is another feature for improved QoS for MANET operations. Integration of SMT into PDSR, giving one of the proposed extensions of PDSR results in S-PDSR that can be summarized in Table 1. 10. PERFORMANCE IMPLICATIONS FOR S-PDSR Since the nodes in ad hoc network are operating under constrained conditions owing to limited battery life, limited transmission range, limited bandwidth and limited computing resource, it is essential that any protocol change/enhancement must be verified and validated for their influence/implications on the performance of the protocol. This section discusses the various related over heads, based on the enhancements suggested in the previous sections of this paper[1]. 8.1 Proactive Route Discovery Overhead By design, proactive protocols are not aimed at initiating route discovery unless there is a need for a route between two nodes. However in S-PDSR, it is proposed to include proactive route discovery in case number of standby routes fall below a threshold level. The associated overhead
  • 12. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 56 is justified, in view of the QoS factor to support continued service for applications like voice over IP, video conferencing etc. 8.2 Overhead of Checking Route up Status Periodically The route status in S-PDSR is proposed to be checked periodically. Since the stand by routes are likely to be used whenever needed, their availability must be ascertained by the protocol. S-PDSR proposes to have a light weight heart beat algorithm built into the protocol. This should be triggered whenever the source is actively using the cached routes for a particular destination. S- PDSR is also proposed to have an algorithm for arranging the cached routes for efficient selection. A suitable data structure is proposed to be worked out for organizing the cached routes at the nodes and operate using an efficient search criteria. 8.3 Packet Dispersion and Reconstruction Overhead The proposed inclusion of SMT functionality in S-PDSR will disperse data into multiple packets and reconstruct the packets at the destination. This will increase the processing overheads, but will provide secured data transmission. In addition, use of multiple routes concurrently will provide enhanced throughput. For bandwidth hungry applications, use of multiple routes will improve QoS for data transmission. 8.4 Overhead for Basic DSR Functioning with SRP Enhancement in S-PDSR By definition PDSR has a large route request packet and inclusion of another id and MAC will further increase the packet size in S-PDSR. This overhead due to extended packet size is marginal as compared to the size of the PDSR packet. To further compensate for this increased size, it is proposed to have a single header, instead of two (PDSR+ SRP) and achieve the required functionality of secured route discovery. Although, the processing time for the packet at each node will increase, as the computing power is increasing, it is likely to become null and void in future. 11. CONCLUSION PDSR is a very matured protocol and a lot of research work has verified its functioning and effectiveness. The latest IETF draft on DSR does not include the security aspects and it has been left as future work for possible enhancements. In this paper, possible enhancements to PDSR to provide security features have been proposed. Further, proposals are also made for better route cache maintenance and management. By incorporating the functioning of SRP into PDSR, new secured protocol, which has been named as S-PDSR is proposed. Concurrent use of multiple paths, as per the functioning guidelines of SMT, has further enhanced the capabilities of PDSR for secured delivery of data packets, even in presence of malicious nodes. REFERENCES 1. Anil Rawat, Prakash Dttatraya and Ashwani kumar Ramani “ Enhanced DSR For MANET With improved QoS”, International journal of network security, Vol 5, No.2, PP.158-166, Sept 2007. 2. Mr. V.Ramesh, Dr.P. Subbaiah “ Preemptive DSR for MANET” in International Conference Proceedings (ICETCSE-2008), VR Siddartha Engg. College, Vijayawada. 3. P. Papadimitratos and Z. J. Haas, “Secure message transmission in mobile Ad hocNetworks”, Elsevier Ad Hoc Networks Journal, vol. 1, no. 1, pp. 193-209, July 2003. 4. Y. C. Hu and D. B. Johnson, “Securing quality-of-service route discovery in on-demand routing for Ad hoc networks”, in Security of Ad Hoc and Sensor Networks 2004(SASN 2004), Washington, USA, Oct.2004. 5. Y. C. Hu and A. Perrig, “A survey of secure wireless Ad hoc routing”, IEEE Security & Privacy, vol. 2, no. 3, IEEE Computer Society, pp. 28-39, May-June 2004.
  • 13. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010 57 6. M. F. Juwad, and H. S. Al-Raweshidy, “Experimental Performance Comparisons between SAODV & AODV”, IEEE Second Asia International Conference on Modelling & Simulation, 2008. 7. Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. Routing Protocols for Mobile Ad-hoc Networks—A Comparative Performance Analysis. In Proceedings of the Fifth International Conference on Mobile Computing and Networking (MobiCom’99). ACM, August 1999. 8. David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153–181. Kluwer Academic Publishers, 1996. ABOUT AUTHORS 1. Mr.V. Ramesh received his B.Tech from N.B.K.R.I.S.T, Vidyanagar, AP in Computer Science & Engineering and M.Tech in IT from Sathyabama University, Chennai. Presently he is working as Associate Professor at Atmakur Engineering College, Atmakur, Nellore- Dt, AP, India. He has published several papers in various International & National Conferences and Journals. Presently he is pursuing his Ph. D in the field of Ad-hoc networks at Sathyabama University. His research interests include Operating Systems, Computer Networks and Data Mining. 2. Dr P. Subbaiah received M.Tech(D.S.C) from JNTU and Ph. D from S.K University, Ananthapur in the area of fault tolerant systems. He has published several papers in international, national conferences and journals. He guided 6 research scholars. Presently he is working as Principal, Veerabrahmendra Institute of Tech & Science, Badvel, Kadapa, AP, India. His research interests include Mobile ad-hoc networks, Digital image processing and VLSI design. 3. N.Sandeep Chaitanya, received his B.Tech from DVRCET, Hyd, AP in Computer Science & Information Technology and M.Tech in Information Technology from Sathyabama University, Chennai. Presently he is working as Associate Professor at SreeKavitha Engineering College,Khammam,AP.. He has published several papers in various International & National Conferences and Journals.. His research interests include Mobile Networking, Computer Networks and Data Mining. 4. Mr Bakthavachalam, working as In-Charge Principal at Govt. Polytechnic College, Badvel, Kadapa,AP,India.