SlideShare a Scribd company logo
International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656
www.ijcat.com 535
VANET Security against Sybil Attack by Using New SRAN
Routing Protocol
Omkar Shete
Department of Computer Engineering
Sinhgad Academy of Engineering,
Pune University,
Maharashtra India
Sachin Godse
Department of Computer Engineering
Sinhgad Academy of Engineering,
Pune University,
Maharashtra India
Abstract: A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Keywords: VANET, ITS, V2V, V2I/V2R, Sybil attack, Routing Protocols.
1. INTRODUCTION
The vehicular ad hoc network (VANET) is a special
communication pattern to provide communication information
within the roadside-to-vehicles and inter-vehicle with the aid
of wireless network and information technology. Road traffic
activities are one of the most daily routines of common men.
The increasing road accidents and traffic congestion are
becoming major problems. VANET, a sub type of Mobile Ad
hoc Networks is developed to solve these problems which
provides scalable and cost-effective solutions for applications
such as safety messaging, dynamic routing. VANETs are used
in many safeties, critical applications; one of the applications
considered in this paper is secure safety routing which is
meant for cooperative driving and avoidance of accidents.
Sybil attack is more dangerous than any other threat. It injects
malicious vehicles on the road.
2. VANET
VANET is considered as a subgroup of Mobile Ad-hoc
Networks (MANETs) in which all nodes are vehicles that
move at various speeds. The main objective of VANET is to
enable communication between vehicle to vehicle and in
between vehicle to infrastructure. Transportation system’s
safety, security and efficiency are improved by using
Intelligent Transportation Systems (ITS). ITS consist of
various technologies like communications, information
processing and control. The integration of ITS technologies
with VANET systems is intended to save time, money and
lives. There are two types of VANET, used for
communication. First, Inter-vehicular communication refers to
the kind of communication in which vehicles communicate
with each other via wireless technology, also referred to as
Vehicle-to-Vehicle communication (V2V) as shown in Fig. 1.
It shows when a vehicle breaks down, immediately, the
vehicle begins the information dissemination process using
the broadcast communication mode. The vehicles that are near
to the vehicle, which has broken down, re-transmit the
message. In this way vehicles are notified and can take
alternative routes, avoiding a possible problem of traffic
congestion. In second type vehicles and fixed infrastructure
exchange information. This communication mode is referred
to as Vehicle-to-Infrastructure (V2I) or Vehicle to Roadside
(V2R) communication. V2R is the direct wireless exchange of
relevant information between vehicles and the communication
units placed on the side of roads and avenues as shown in Fig.
2 [1].
Figure 1: V2V [1]
Figure 2: V2R/V2I [1]
International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656
www.ijcat.com 536
3. SECURITY IN VANET
As VANET is becoming more popular, a serious challenge in
this environment is security. As we mentioned previously,
VANET is sub branch of MANET. Consequently, VANETs
inherit all the security issues associated with MANETs. The
malicious behavior of users, such as the modification of the
messages, could be fatal to the other vehicular users, etc.
Security and privacy in vehicular networks are important for
their acceptance. VANETs’ architectures and communication
schemes provide developers an environment for the
deployment of a wide variety of applications. However, major
concerns of such environments are privacy and security.
Strong security mechanisms are required to protect both
applications and users from possible attacks. Therefore,
powerful schemes are required to protect users’ private
information.
VANETs’ security is of great importance because any
vulnerability could lead to disastrous accidents where
people’s integrity may be put at risk. Security mechanisms
and schemes guarantee the protection of personal data
transmitted through VANET but not to identity, location, and
destination, among others. In VANET, multiple threats or
attacks are possible. One of them is Sybil attack which is
considered as major threat.
The Sybil attack is a well-known harmful attack. In this
attack malicious vehicles are injected into same network. This
attack is very dangerous since a malicious vehicle can present
in different positions at the same time, thereby creating
massive security risks in the network. The Sybil attack harms
the network topologies and connections as well as network
lives. In Fig.3, an attacker ‘A’ sends multiple messages with
different identities to the other vehicles. Thus, other vehicles
understand that there is heavy traffic. In ad hoc networks,
there are three common types of security against sybil attacks
which are registration, radio resource testing, and position
verification. Registration itself is not sufficient to prevent
Sybil attacks, because a fake node has possibility to entry with
multiple identities by non-technical means such as stealing.
However, a strict registration may lead to serious privacy
problem. Radio resource testing is based on the assumption
that all physical entities are limited in resources. In position
verification the position of nodes will be verified. The goal is
to make sure that each physical or original node refers to one
and only one identity [2].
Figure 3: Traffic Congestion [2]
4. EXISTING SYSTEMS
In VANET highly challenging tasks is to transporting
information from one vehicle to another or all vehicles within
specified area. There are several routing protocols defined to
transporting information (2014) [2], (2012) [5]. In VANET,
the routing protocols are classified as:
In VANET, the routing protocols are classified into four
categories. These protocols are characterized on the basis of
area where they are most suitable [3], [4].
4.1 Topology Based Routing Protocols
These routing protocols use association information that exists
in the network to perform packet forwarding. This protocol
further divided into three types.
4.1.1. Proactive routing protocols: Proactive routing
protocols continuously try to maintain up-to-date routing
information on every node in the network.
Advantage: Routing information is already available when the
first packet is sent so connection times are fast.
Disadvantage: When there is no traffic, continuously use
resources to communicate routing information.
Types: DSDV, OLSR, CGSR.
4.1.2. Reactive/Ad hoc based routing: Reactive routing
opens the route only when it is necessary for a node to
communicate with other nodes. Reactive routing consists of
route discovery phase so that the query packets are flooded
into the network for the path search and this phase completes
when route is found.
Types: AODV, PGB, DSR, TORA, and JARR.
4.1.3 Hybrid Protocols: It is combination of proactive and
reactive routing protocols. The hybrid protocols are used to
reduce the control overhead of proactive routing protocols and
decrease the initial route discovery delay in reactive routing
protocols.
Types: ZRP, HARP.
4.2 Geographical Routing Protocols
Some routing protocols make use of geographical
information, such as GPS coordinates. Typically, nodes
communicate their location through the network, so that other
nodes can determine shortest path. Select shortest path by
using this geographical information.
Disadvantage: Each node need to know its location.
4.3 Cluster Based Routing Protocols
Cluster based routing is like in clusters. Cluster consists of the
group of nodes that identifies themselves to be a part of
cluster and a node is designated as cluster head will broadcast
the packet to cluster. Good scalability is essential
characteristic that can be provided for large networks but
network delays and overhead are occurred when forming
clusters in highly mobile VANET.
Types: COIN, LORA-CBF, TIBCRPH, and CBDRP.
4.4 Broadcast Based Routing Protocols:
In certain applications, the host has to send packets to many or
all other hosts. Sending a packet to all destinations at a time is
called Broadcasting. This broadcast based routing protocols
used in VANET for sharing weather, traffic, emergency and
road conditions among all the vehicles.
Types: BROADCOMM, UMB, V-TRADE, and DV-CAST.
Also, there are several secure routing protocols are
available and there comparison is shown in Table I [5].
Table 1: Analysis of Secure Routing Protocol
International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656
www.ijcat.com 537
5. PROPOSED WORK
In VANET, Security is most important factor for secure
communication. Sybil attack is one of the major threats in the
network. It injects multiple malicious vehicle nodes in the
network and that harms the networks or loosing life. We are
proposing new secure routing protocol named as Secure
Routing for Ad hoc Network (SRAN) routing protocol. This
SRAN protocol detects as well as prevents Sybil attack.
SRAN is based on AODV. This SRAN protocol does not
allow Sybil node into Route discovery, hence Sybil node is
eliminated from the route. Also using RSU we can remove
this Sybil node from the Network. In SRAN protocol we
consider the following factors.
5.1 Route Request Packet format:
In SRAN routing protocol, if source wants to send message to
destination then it first broadcasts the route request (RREQ) to
its neighbors. Neighboring node receives RREQ, if receiving
node is not destination and does not have route to the
destination then it rebroadcast the RREQ and same time
backward route is created to the source. If the receiving node
is destination node or it has current route to the destination
then Route Reply (RREP) is generated.
1) RREQ ID: A sequence number uniquely identifying
the particular RREQ when taken in association with
the source node's IP address.
2) Source IP Address: The IP address of the Source.
3) Source Sequence Number: The Sequence number of
Source.
4) Source Unique ID: The Unique Identification of
Source.
5) Destination IP Address: The IP address of the
destination for which a route is selected.
6) Destination Sequence Number:The latest sequence
number received in the past by the source for any
route towards the destination.
7) Destination Unique ID: The Unique Identification
of Destination.
8) Hop Count: Number of hops needed to reach
destination.
5.2 Route Reply Packet format:
RREP is unicast and it is hop by hop fashion to source. In
RREP each intermediate node creates the route to the
destination. When source node receives RREP then it records
the forward route to the destination and starts sending
message. If multiple RREP’s is received by source then
depending upon hop count shortest path is selected.
1) Destination IP Address: The IP address of the
destination for which a route is given.
2) Destination Sequence Number: The Destination
sequence number associated to the route.
3) Destination Unique ID: The Unique Identification
of Destination.
4) Source IP Address: The IP address of the Source.
5) Source Unique ID: The Unique Identification of
Source.
6) Lifetime: Time to reach to the next Destination.
7) Hop Count: Number of Hops needed to reach the
Destination.
5.3 Route Error Packet format
When link break down is detected, RERR is generated and
send to the source node in hop by hop fashion. When each
intermediate node invalidates route to an unreachable
destinations or Sybil node is detected then RERR is sent
towards source node. When source node receives RERR then
it starts reinitiates route discovery.
1) Unreachable Destination IP Address: The IP
address of the destination that has become
unreachable due to a link break.
2) Unreachable Destination Sequence Number: The
sequence number in the route table entry for the
destination listed in the previous Unreachable
Destination IP Address field.
3) Sybil Node: The information about sybil node
which detected.
International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656
www.ijcat.com 538
5.4 Route Maintenance
Once route is defined then route maintenance is also required.
It is to provide information about link of the route as well as
route to be modified due to movement of one or more nodes
in the route. Every time route is used to send packet then its
expiry time is updated by adding current time and Active
Route Timeout (ART). ART is a constant value that defines
how long new route is kept into routing table of node after last
transmission done. ART defines both source and intermediate
node. If route is not used in the predefined period then node
can’t be sure that route is still valid or not and then this route
is removed from routing table. It ensures that no any
unnecessary packet loss.
5.5 MATHEMATICAL MODEL
In our SRAN routing protocol we provide Unique Identity
(UID) field in routing table of each node. When source node
broadcasts then all nodes in the network will be verified
original node or Sybil node by using UID. From Eq. 1 we can
identify the original node and get unique identity of node.
A = {x | x=1 then it is original node}
B = {x | x=2 then it is malicious node}
Where, x = Unique Identity of node.
If ‘A’ condition is true then original route is follow and if ‘B’
condition is true then route is automatically eliminated.
5.6 Flow chart of Sybil attack Algorithm
Figure 4: Flow of Sybil attack algorithm.
Considering analysis of secure routing protocols use different
techniques to detect as well as prevent attacks. Sybil attack
gets all the properties of original node. When Sybil attack is
performed into this network then it first identifies the node as
source node, if yes then no attack is performed on that node. If
node is not source node then perform Sybil attack on that
node. In this attack one or more Sybil nodes are injected into
the network. This Sybil node can get all the properties of
original node but automatically increase the value of Unique
Identity as shown in Fig. 4. So when performing route
discovery each node can check UID value when it is one then
this node become a part of route. When UID value is not one
then this node is Sybil node that means it detects the Sybil
node and not gets into the route. So this Sybil node is
automatically prevented from the route.
Figure 5: Execution of SRAN Protocol
6. EXPECTED RESULTS
In SRAN protocol separate mechanisms are not used to detect
as well as to prevent sybil attack. So it improves the
performance of all route activities. It prevents those Sybil
nodes to come into that route. It shows total number of
packets have been successfully received from source to
destination and it also increases the throughputs. In Table II
shows RREQ in which UID field consider to identify original
node and fake node. Also it has very less delay because of on
demand route selection.
Table 2: RREQ
Source
ID
Dest.
ID
Source IP Dest. IP
UID
2 4 168.192.10.10 168.192.10.16 1
4 3 168.192.10.16 121.11.10.15 2
4 1 168.192.10.16 121.11.10.17 1
International Journal of Computer Applications Technology and Research
Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656
www.ijcat.com 539
7. CONCLUSIONS
Secure communication is one of the important challenges in
VANET. If communication is not secure then it can cause
fake messages delivery by malicious nodes, misguiding nodes
in the network. This may cause accidents or traffic jam on
road. Most of the routing protocols are not providing security
for data transmission. Instead of providing separate techniques
for attack detection and prevention we can provide in routing
protocols. It improves performance of VANET. This SRAN
protocol is designed for Sybil attack. SRAN routing protocol
provides unique identity to each node in its route table. Then
this SRAN routing protocol can easily identify fake node and
original node. Also it detects and prevents Sybil attack and
gives high performance.
8. REFERENCES
[1] J.A. Guerrero-Ibáñez, C. Flores-Cortés, and
SheraliZeadally, “Vehicular Ad-hoc Networks
(VANETs): Architecture, Protocols and Applications”,
Computer Communications and Networks © Springer-
Verlag London 2013.
[2] VinhHoa LA, Ana CAVALLI, “Securityattacks and
solutions in vehicular ad hoc networks: A survey”,
International Journal on AdHoc Networking Systems
(IJANS) Vol. 4, No. 2, April 2014.
[3] Mushtak Y. Gadkari, Nitin B. Sambre, “VANET:
Routing Protocols, Security Issues and Simulation
Tools”, IOSR Journal of Computer Engineering
(IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 3 (July-
Aug. 2012), PP 28-38.
[4] M. Raya and JP. Hubaux, “Securing Vehicular Ad Hoc
Networks", Journal of Computer Security 15 (2007), PP
39–68.
[5] Omkar Shete ,SachinGodse “VANET: A Survey on
Secure Routing” ,International Journal of Science and
Research (IJSR) ISSN (Online): 2319-7064, Paper ID:
SUB1565, PP 123.
[6] Wei-Shen Lai, Chu-Hsing Lin, Jung-Chun Liu, Yen-Lin
Huang, Mei-Chun Chou, “I-SEAD: A Secure Routing
Protocol for Mobile Ad Hoc Networks”, International
Journal of Multimedia Ubiquitous Engineering, Vol. 3,
No. 4, October, 2008,PP 45-54.
[7] Panagiotis Papadimitratos and Zygmunt J. Haas, “Secure
Routing for Mobile Ad hoc Networks”, In Proceedings
of the SCS Communication Networks and Distributed
Systems Modeling and Simulation Conference (CNDS
2002), San Antonio, TX, January 27-31, 2002.
[8] yih-chunhu and adrianperrig, “Ariadne: A Secure On-
Demand Routing Protocol for Ad Hoc”, Wireless
Networks 11, 21–38, 2005,@2005 Springer Science +
Business Media, Inc. Manufactured in The Netherlands,
PP 21-38.
[9] Seema Mehla, SeemaMehla and PreetiNagrath,
“Analyzing security of Authenticated Routing Protocol
(ARAN)”, (IJCSE) International Journal on Computer
Science and Engineering Vol. 02, No. 03, 2010, 664-
668,PP 664-668.
[10] Alekha Kumar Mishra and BibhuDuttaSahoo, “A
Modified Adaptive-Saodv Prototype For Performance
Enhancement In Manet”, International Journal Of
Computer Applications In Engineering, Technology And
Sciences (Ij-Ca-Ets), ISSN: 0974-3596 | April ’09-
September ’09 | Volume 1: Issue 2, PP 443-447.

More Related Content

PDF
Security attacks and solutions in vehicular ad hoc networks a survey
pijans
 
PDF
F0332838
iosrjournals
 
PDF
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
Editor IJCATR
 
PPT
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Dr.Irshad Ahmed Sumra
 
PDF
Master Thesis on Vehicular Ad-hoc Network (VANET)
Prof Ansari
 
PDF
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
IJERA Editor
 
PDF
Security Requirements for IVC Network
IRJET Journal
 
Security attacks and solutions in vehicular ad hoc networks a survey
pijans
 
F0332838
iosrjournals
 
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...
Editor IJCATR
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Dr.Irshad Ahmed Sumra
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Prof Ansari
 
Survey on VSPN: VANET-Based Secure and Privacy-Preserving Navigation
IJERA Editor
 
Security Requirements for IVC Network
IRJET Journal
 

What's hot (19)

PDF
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET Journal
 
PDF
VANET for Security using Cryptography
Pallavi Agarwal
 
PPT
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
Dr.Irshad Ahmed Sumra
 
PDF
Ktr an efficient key management scheme for secure data access control in wire...
ambitlick
 
PDF
Master thesis on Vehicular Ad hoc Networks (VANET)
Prof Ansari
 
PDF
VANET: Trust and Hashing
Pallavi Agarwal
 
PPT
[Ppt] Survey Of Vehicular Network Security
Lim Jung
 
PDF
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
Journal For Research
 
PDF
A comparitive study of efficient anonymous routing protocols in manet
eSAT Publishing House
 
PDF
A review on various security attacks in vehicular ad hoc networks
journalBEEI
 
PDF
Review Paper on VANET
Pallavi Agarwal
 
PDF
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
csandit
 
PDF
A Survey on Vehicle to Infrastructure Communication System
IOSR Journals
 
PDF
Technical Review on Different Applications, Challenges and Security in VANET
Pallavi Agarwal
 
PDF
Routing protocols in Vanet
Thesis Scientist Private Limited
 
PPT
Using Computing Methods to Secure VANET
Dr.Irshad Ahmed Sumra
 
PPT
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Dr.Irshad Ahmed Sumra
 
PPT
Using the grades mechanism to differentiate the users in VANET
Dr.Irshad Ahmed Sumra
 
PDF
Jh2516461655
IJERA Editor
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET Journal
 
VANET for Security using Cryptography
Pallavi Agarwal
 
An Integrated Multi-level Security Model for Malicious Attacks Resiliency in ...
Dr.Irshad Ahmed Sumra
 
Ktr an efficient key management scheme for secure data access control in wire...
ambitlick
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Prof Ansari
 
VANET: Trust and Hashing
Pallavi Agarwal
 
[Ppt] Survey Of Vehicular Network Security
Lim Jung
 
A REVIEW ON SYBIL ATTACK DETECTION TECHNIQUES
Journal For Research
 
A comparitive study of efficient anonymous routing protocols in manet
eSAT Publishing House
 
A review on various security attacks in vehicular ad hoc networks
journalBEEI
 
Review Paper on VANET
Pallavi Agarwal
 
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networks
csandit
 
A Survey on Vehicle to Infrastructure Communication System
IOSR Journals
 
Technical Review on Different Applications, Challenges and Security in VANET
Pallavi Agarwal
 
Routing protocols in Vanet
Thesis Scientist Private Limited
 
Using Computing Methods to Secure VANET
Dr.Irshad Ahmed Sumra
 
Towards Improving Security in VANET: Some New Possible Attacks and their Poss...
Dr.Irshad Ahmed Sumra
 
Using the grades mechanism to differentiate the users in VANET
Dr.Irshad Ahmed Sumra
 
Jh2516461655
IJERA Editor
 
Ad

Similar to VANET Security against Sybil Attack by Using New SRAN Routing Protocol (20)

PDF
VANET: Routing Protocols, Security Issues and Simulation Tools
IOSR Journals
 
PDF
Security and Trust Management in VANET
Pallavi Agarwal
 
PDF
SURVEY ON SECURE ROUTING IN VANETS
IJNSA Journal
 
PDF
SURVEY ON SECURE ROUTING IN VANETS
IJNSA Journal
 
PDF
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET Journal
 
PDF
Differential Evolution Based Secured Routing Protocols for VANETs
IJCSIS Research Publications
 
PDF
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
ijasuc
 
PDF
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
nooriasukmaningtyas
 
PDF
Jh2516461655
IJERA Editor
 
PDF
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Dr. Amarjeet Singh
 
PPT
Security issues and challenges in MANET,VANET and FANET: A Survey
Dr.Irshad Ahmed Sumra
 
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
PDF
Research paper
Rutvij shah
 
PDF
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
rifat1tasnim
 
PDF
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Dr. Amarjeet Singh
 
PDF
Cyber DoS attack-based security simulator for VANET
IJECEIAES
 
PDF
Cp3210151018
IJMER
 
VANET: Routing Protocols, Security Issues and Simulation Tools
IOSR Journals
 
Security and Trust Management in VANET
Pallavi Agarwal
 
SURVEY ON SECURE ROUTING IN VANETS
IJNSA Journal
 
SURVEY ON SECURE ROUTING IN VANETS
IJNSA Journal
 
IRJET- Secure Framework for Isolating Smurf and Blackhole Attack in VANET
IRJET Journal
 
Differential Evolution Based Secured Routing Protocols for VANETs
IJCSIS Research Publications
 
MALICIOUS NODE DETECTION THROUGH AODV IN VANET
ijasuc
 
Security schemes based on conditional privacy-preserving vehicular ad hoc net...
nooriasukmaningtyas
 
Jh2516461655
IJERA Editor
 
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Dr. Amarjeet Singh
 
Security issues and challenges in MANET,VANET and FANET: A Survey
Dr.Irshad Ahmed Sumra
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
VANET SECURITY AND PRIVACY – AN OVERVIEW
IJNSA Journal
 
Research paper
Rutvij shah
 
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...
rifat1tasnim
 
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...
Dr. Amarjeet Singh
 
Cyber DoS attack-based security simulator for VANET
IJECEIAES
 
Cp3210151018
IJMER
 
Ad

More from Editor IJCATR (20)

PDF
Advancements in Structural Integrity: Enhancing Frame Strength and Compressio...
Editor IJCATR
 
PDF
Maritime Cybersecurity: Protecting Critical Infrastructure in The Digital Age
Editor IJCATR
 
PDF
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
Editor IJCATR
 
PDF
Leveraging Topological Data Analysis and AI for Advanced Manufacturing: Integ...
Editor IJCATR
 
PDF
Leveraging AI and Principal Component Analysis (PCA) For In-Depth Analysis in...
Editor IJCATR
 
PDF
The Intersection of Artificial Intelligence and Cybersecurity: Safeguarding D...
Editor IJCATR
 
PDF
Leveraging AI and Deep Learning in Predictive Genomics for MPOX Virus Researc...
Editor IJCATR
 
PDF
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
PDF
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
PDF
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
PDF
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
PDF
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
PDF
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
PDF
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
PDF
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
PDF
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
PDF
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
PDF
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
PDF
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
PDF
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Advancements in Structural Integrity: Enhancing Frame Strength and Compressio...
Editor IJCATR
 
Maritime Cybersecurity: Protecting Critical Infrastructure in The Digital Age
Editor IJCATR
 
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
Editor IJCATR
 
Leveraging Topological Data Analysis and AI for Advanced Manufacturing: Integ...
Editor IJCATR
 
Leveraging AI and Principal Component Analysis (PCA) For In-Depth Analysis in...
Editor IJCATR
 
The Intersection of Artificial Intelligence and Cybersecurity: Safeguarding D...
Editor IJCATR
 
Leveraging AI and Deep Learning in Predictive Genomics for MPOX Virus Researc...
Editor IJCATR
 
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 

Recently uploaded (20)

PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Doc9.....................................
SofiaCollazos
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
The Future of AI & Machine Learning.pptx
pritsen4700
 

VANET Security against Sybil Attack by Using New SRAN Routing Protocol

  • 1. International Journal of Computer Applications Technology and Research Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656 www.ijcat.com 535 VANET Security against Sybil Attack by Using New SRAN Routing Protocol Omkar Shete Department of Computer Engineering Sinhgad Academy of Engineering, Pune University, Maharashtra India Sachin Godse Department of Computer Engineering Sinhgad Academy of Engineering, Pune University, Maharashtra India Abstract: A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker. The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol. SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from the routing table for those invalid routes. Keywords: VANET, ITS, V2V, V2I/V2R, Sybil attack, Routing Protocols. 1. INTRODUCTION The vehicular ad hoc network (VANET) is a special communication pattern to provide communication information within the roadside-to-vehicles and inter-vehicle with the aid of wireless network and information technology. Road traffic activities are one of the most daily routines of common men. The increasing road accidents and traffic congestion are becoming major problems. VANET, a sub type of Mobile Ad hoc Networks is developed to solve these problems which provides scalable and cost-effective solutions for applications such as safety messaging, dynamic routing. VANETs are used in many safeties, critical applications; one of the applications considered in this paper is secure safety routing which is meant for cooperative driving and avoidance of accidents. Sybil attack is more dangerous than any other threat. It injects malicious vehicles on the road. 2. VANET VANET is considered as a subgroup of Mobile Ad-hoc Networks (MANETs) in which all nodes are vehicles that move at various speeds. The main objective of VANET is to enable communication between vehicle to vehicle and in between vehicle to infrastructure. Transportation system’s safety, security and efficiency are improved by using Intelligent Transportation Systems (ITS). ITS consist of various technologies like communications, information processing and control. The integration of ITS technologies with VANET systems is intended to save time, money and lives. There are two types of VANET, used for communication. First, Inter-vehicular communication refers to the kind of communication in which vehicles communicate with each other via wireless technology, also referred to as Vehicle-to-Vehicle communication (V2V) as shown in Fig. 1. It shows when a vehicle breaks down, immediately, the vehicle begins the information dissemination process using the broadcast communication mode. The vehicles that are near to the vehicle, which has broken down, re-transmit the message. In this way vehicles are notified and can take alternative routes, avoiding a possible problem of traffic congestion. In second type vehicles and fixed infrastructure exchange information. This communication mode is referred to as Vehicle-to-Infrastructure (V2I) or Vehicle to Roadside (V2R) communication. V2R is the direct wireless exchange of relevant information between vehicles and the communication units placed on the side of roads and avenues as shown in Fig. 2 [1]. Figure 1: V2V [1] Figure 2: V2R/V2I [1]
  • 2. International Journal of Computer Applications Technology and Research Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656 www.ijcat.com 536 3. SECURITY IN VANET As VANET is becoming more popular, a serious challenge in this environment is security. As we mentioned previously, VANET is sub branch of MANET. Consequently, VANETs inherit all the security issues associated with MANETs. The malicious behavior of users, such as the modification of the messages, could be fatal to the other vehicular users, etc. Security and privacy in vehicular networks are important for their acceptance. VANETs’ architectures and communication schemes provide developers an environment for the deployment of a wide variety of applications. However, major concerns of such environments are privacy and security. Strong security mechanisms are required to protect both applications and users from possible attacks. Therefore, powerful schemes are required to protect users’ private information. VANETs’ security is of great importance because any vulnerability could lead to disastrous accidents where people’s integrity may be put at risk. Security mechanisms and schemes guarantee the protection of personal data transmitted through VANET but not to identity, location, and destination, among others. In VANET, multiple threats or attacks are possible. One of them is Sybil attack which is considered as major threat. The Sybil attack is a well-known harmful attack. In this attack malicious vehicles are injected into same network. This attack is very dangerous since a malicious vehicle can present in different positions at the same time, thereby creating massive security risks in the network. The Sybil attack harms the network topologies and connections as well as network lives. In Fig.3, an attacker ‘A’ sends multiple messages with different identities to the other vehicles. Thus, other vehicles understand that there is heavy traffic. In ad hoc networks, there are three common types of security against sybil attacks which are registration, radio resource testing, and position verification. Registration itself is not sufficient to prevent Sybil attacks, because a fake node has possibility to entry with multiple identities by non-technical means such as stealing. However, a strict registration may lead to serious privacy problem. Radio resource testing is based on the assumption that all physical entities are limited in resources. In position verification the position of nodes will be verified. The goal is to make sure that each physical or original node refers to one and only one identity [2]. Figure 3: Traffic Congestion [2] 4. EXISTING SYSTEMS In VANET highly challenging tasks is to transporting information from one vehicle to another or all vehicles within specified area. There are several routing protocols defined to transporting information (2014) [2], (2012) [5]. In VANET, the routing protocols are classified as: In VANET, the routing protocols are classified into four categories. These protocols are characterized on the basis of area where they are most suitable [3], [4]. 4.1 Topology Based Routing Protocols These routing protocols use association information that exists in the network to perform packet forwarding. This protocol further divided into three types. 4.1.1. Proactive routing protocols: Proactive routing protocols continuously try to maintain up-to-date routing information on every node in the network. Advantage: Routing information is already available when the first packet is sent so connection times are fast. Disadvantage: When there is no traffic, continuously use resources to communicate routing information. Types: DSDV, OLSR, CGSR. 4.1.2. Reactive/Ad hoc based routing: Reactive routing opens the route only when it is necessary for a node to communicate with other nodes. Reactive routing consists of route discovery phase so that the query packets are flooded into the network for the path search and this phase completes when route is found. Types: AODV, PGB, DSR, TORA, and JARR. 4.1.3 Hybrid Protocols: It is combination of proactive and reactive routing protocols. The hybrid protocols are used to reduce the control overhead of proactive routing protocols and decrease the initial route discovery delay in reactive routing protocols. Types: ZRP, HARP. 4.2 Geographical Routing Protocols Some routing protocols make use of geographical information, such as GPS coordinates. Typically, nodes communicate their location through the network, so that other nodes can determine shortest path. Select shortest path by using this geographical information. Disadvantage: Each node need to know its location. 4.3 Cluster Based Routing Protocols Cluster based routing is like in clusters. Cluster consists of the group of nodes that identifies themselves to be a part of cluster and a node is designated as cluster head will broadcast the packet to cluster. Good scalability is essential characteristic that can be provided for large networks but network delays and overhead are occurred when forming clusters in highly mobile VANET. Types: COIN, LORA-CBF, TIBCRPH, and CBDRP. 4.4 Broadcast Based Routing Protocols: In certain applications, the host has to send packets to many or all other hosts. Sending a packet to all destinations at a time is called Broadcasting. This broadcast based routing protocols used in VANET for sharing weather, traffic, emergency and road conditions among all the vehicles. Types: BROADCOMM, UMB, V-TRADE, and DV-CAST. Also, there are several secure routing protocols are available and there comparison is shown in Table I [5]. Table 1: Analysis of Secure Routing Protocol
  • 3. International Journal of Computer Applications Technology and Research Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656 www.ijcat.com 537 5. PROPOSED WORK In VANET, Security is most important factor for secure communication. Sybil attack is one of the major threats in the network. It injects multiple malicious vehicle nodes in the network and that harms the networks or loosing life. We are proposing new secure routing protocol named as Secure Routing for Ad hoc Network (SRAN) routing protocol. This SRAN protocol detects as well as prevents Sybil attack. SRAN is based on AODV. This SRAN protocol does not allow Sybil node into Route discovery, hence Sybil node is eliminated from the route. Also using RSU we can remove this Sybil node from the Network. In SRAN protocol we consider the following factors. 5.1 Route Request Packet format: In SRAN routing protocol, if source wants to send message to destination then it first broadcasts the route request (RREQ) to its neighbors. Neighboring node receives RREQ, if receiving node is not destination and does not have route to the destination then it rebroadcast the RREQ and same time backward route is created to the source. If the receiving node is destination node or it has current route to the destination then Route Reply (RREP) is generated. 1) RREQ ID: A sequence number uniquely identifying the particular RREQ when taken in association with the source node's IP address. 2) Source IP Address: The IP address of the Source. 3) Source Sequence Number: The Sequence number of Source. 4) Source Unique ID: The Unique Identification of Source. 5) Destination IP Address: The IP address of the destination for which a route is selected. 6) Destination Sequence Number:The latest sequence number received in the past by the source for any route towards the destination. 7) Destination Unique ID: The Unique Identification of Destination. 8) Hop Count: Number of hops needed to reach destination. 5.2 Route Reply Packet format: RREP is unicast and it is hop by hop fashion to source. In RREP each intermediate node creates the route to the destination. When source node receives RREP then it records the forward route to the destination and starts sending message. If multiple RREP’s is received by source then depending upon hop count shortest path is selected. 1) Destination IP Address: The IP address of the destination for which a route is given. 2) Destination Sequence Number: The Destination sequence number associated to the route. 3) Destination Unique ID: The Unique Identification of Destination. 4) Source IP Address: The IP address of the Source. 5) Source Unique ID: The Unique Identification of Source. 6) Lifetime: Time to reach to the next Destination. 7) Hop Count: Number of Hops needed to reach the Destination. 5.3 Route Error Packet format When link break down is detected, RERR is generated and send to the source node in hop by hop fashion. When each intermediate node invalidates route to an unreachable destinations or Sybil node is detected then RERR is sent towards source node. When source node receives RERR then it starts reinitiates route discovery. 1) Unreachable Destination IP Address: The IP address of the destination that has become unreachable due to a link break. 2) Unreachable Destination Sequence Number: The sequence number in the route table entry for the destination listed in the previous Unreachable Destination IP Address field. 3) Sybil Node: The information about sybil node which detected.
  • 4. International Journal of Computer Applications Technology and Research Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656 www.ijcat.com 538 5.4 Route Maintenance Once route is defined then route maintenance is also required. It is to provide information about link of the route as well as route to be modified due to movement of one or more nodes in the route. Every time route is used to send packet then its expiry time is updated by adding current time and Active Route Timeout (ART). ART is a constant value that defines how long new route is kept into routing table of node after last transmission done. ART defines both source and intermediate node. If route is not used in the predefined period then node can’t be sure that route is still valid or not and then this route is removed from routing table. It ensures that no any unnecessary packet loss. 5.5 MATHEMATICAL MODEL In our SRAN routing protocol we provide Unique Identity (UID) field in routing table of each node. When source node broadcasts then all nodes in the network will be verified original node or Sybil node by using UID. From Eq. 1 we can identify the original node and get unique identity of node. A = {x | x=1 then it is original node} B = {x | x=2 then it is malicious node} Where, x = Unique Identity of node. If ‘A’ condition is true then original route is follow and if ‘B’ condition is true then route is automatically eliminated. 5.6 Flow chart of Sybil attack Algorithm Figure 4: Flow of Sybil attack algorithm. Considering analysis of secure routing protocols use different techniques to detect as well as prevent attacks. Sybil attack gets all the properties of original node. When Sybil attack is performed into this network then it first identifies the node as source node, if yes then no attack is performed on that node. If node is not source node then perform Sybil attack on that node. In this attack one or more Sybil nodes are injected into the network. This Sybil node can get all the properties of original node but automatically increase the value of Unique Identity as shown in Fig. 4. So when performing route discovery each node can check UID value when it is one then this node become a part of route. When UID value is not one then this node is Sybil node that means it detects the Sybil node and not gets into the route. So this Sybil node is automatically prevented from the route. Figure 5: Execution of SRAN Protocol 6. EXPECTED RESULTS In SRAN protocol separate mechanisms are not used to detect as well as to prevent sybil attack. So it improves the performance of all route activities. It prevents those Sybil nodes to come into that route. It shows total number of packets have been successfully received from source to destination and it also increases the throughputs. In Table II shows RREQ in which UID field consider to identify original node and fake node. Also it has very less delay because of on demand route selection. Table 2: RREQ Source ID Dest. ID Source IP Dest. IP UID 2 4 168.192.10.10 168.192.10.16 1 4 3 168.192.10.16 121.11.10.15 2 4 1 168.192.10.16 121.11.10.17 1
  • 5. International Journal of Computer Applications Technology and Research Volume 4– Issue 7, 535 - 539, 2015, ISSN:- 2319–8656 www.ijcat.com 539 7. CONCLUSIONS Secure communication is one of the important challenges in VANET. If communication is not secure then it can cause fake messages delivery by malicious nodes, misguiding nodes in the network. This may cause accidents or traffic jam on road. Most of the routing protocols are not providing security for data transmission. Instead of providing separate techniques for attack detection and prevention we can provide in routing protocols. It improves performance of VANET. This SRAN protocol is designed for Sybil attack. SRAN routing protocol provides unique identity to each node in its route table. Then this SRAN routing protocol can easily identify fake node and original node. Also it detects and prevents Sybil attack and gives high performance. 8. REFERENCES [1] J.A. Guerrero-Ibáñez, C. Flores-Cortés, and SheraliZeadally, “Vehicular Ad-hoc Networks (VANETs): Architecture, Protocols and Applications”, Computer Communications and Networks © Springer- Verlag London 2013. [2] VinhHoa LA, Ana CAVALLI, “Securityattacks and solutions in vehicular ad hoc networks: A survey”, International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 2, April 2014. [3] Mushtak Y. Gadkari, Nitin B. Sambre, “VANET: Routing Protocols, Security Issues and Simulation Tools”, IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 3 (July- Aug. 2012), PP 28-38. [4] M. Raya and JP. Hubaux, “Securing Vehicular Ad Hoc Networks", Journal of Computer Security 15 (2007), PP 39–68. [5] Omkar Shete ,SachinGodse “VANET: A Survey on Secure Routing” ,International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064, Paper ID: SUB1565, PP 123. [6] Wei-Shen Lai, Chu-Hsing Lin, Jung-Chun Liu, Yen-Lin Huang, Mei-Chun Chou, “I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Multimedia Ubiquitous Engineering, Vol. 3, No. 4, October, 2008,PP 45-54. [7] Panagiotis Papadimitratos and Zygmunt J. Haas, “Secure Routing for Mobile Ad hoc Networks”, In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2002. [8] yih-chunhu and adrianperrig, “Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc”, Wireless Networks 11, 21–38, 2005,@2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands, PP 21-38. [9] Seema Mehla, SeemaMehla and PreetiNagrath, “Analyzing security of Authenticated Routing Protocol (ARAN)”, (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, 664- 668,PP 664-668. [10] Alekha Kumar Mishra and BibhuDuttaSahoo, “A Modified Adaptive-Saodv Prototype For Performance Enhancement In Manet”, International Journal Of Computer Applications In Engineering, Technology And Sciences (Ij-Ca-Ets), ISSN: 0974-3596 | April ’09- September ’09 | Volume 1: Issue 2, PP 443-447.