Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Empowered AODV Protocol in Wireless Sensor Network using Three Variable RSA Cryptosystem

Author(s): Amit K. Agarwal, Munesh Chandra* and S.S. Sarangdevot

Volume 13, Issue 4, 2020

Page: [718 - 724] Pages: 7

DOI: 10.2174/2213275912666190705162233

Price: $65

Abstract

Background: The Wireless Sensor Network (WSN) is a type of networks which primarily designed for the purpose of monitoring in remote areas. It consists of communicating nodes (called sensor's) which communicate each other to share their data and passing the information to the central node. In many applications like defence requires the secure communication of information. However, due to the numerous characteristics of WSN such as open shared communication channel, limited memory, and processing power of sensors, etc. these networks are vulnerable to various attacks such as black hole, gray hole, etc.

Objective: The objective of the paper is to secure the AODV routing protocol in WSN using cryptography techniques.

Methods: In this paper, the Ad hoc On-demand Distance Vector (AODV) routing protocol has been chosen for information routing because of their lightweight processing capability. To provide secure communication in WSN, the AODV routing protocol is secured by utilizing the RSA key generation algorithm. Here, RSA with three variables (three prime numbers) is employed instead of two variables.

Results: The effectiveness of the proposed approach in handling black hole attack is being verified through the simulation results obtained from the experiments conducted using Network Simulator tool (NS2). The three popular performance metrics namely Average End-to-End Delay, Packet Delivery Ratio, and Average Throughput are used for evaluation purpose. These results are observed under different pose time and varying number of malicious nodes.

Conclusion: In this paper, a new three variable RSA cryptosystem-based security model is proposed to protect the communication against the Black Hole (BH) attack in wireless sensor networks. The use of three variables instead of two variables allows our model to provide more security as compared to other methods. Simulation results obtained from the experiments carried out using NS2 tool evident the performance of the proposed model over original AODV and other previous models.

Keywords: AODV routing protocol, Wireless sensor network, Network simulator, RSA, Black Hole attack, Ad hoc Ondemand Distance Vector (AODV).

Graphical Abstract
[1]
W. Gu, N. Dutta, S. Chellappan, and X. Bai, ""Providing end-to-end secure communications in wireless sensor networks"", IEEE eTrans. Netw. Serv. Manag., vol. 8, no. 3, pp. 205-218, 2011.
[http://dx.doi.org/10.1109/TNSM.2011.072611.100080]
[2]
F. Li, and P. Xiong, "Practical secure communication for integrating wireless sensor networks into the internet of things", IEEE Sens. J., vol. 13, no. 10, pp. 3677-3684, 2013.
[http://dx.doi.org/10.1109/JSEN.2013.2262271]
[3]
H.K. Al-Hassani, "A survey in wireless sensor network for explosives detection" Comput. Electr. Eng., vol. 72, no. 2018, pp. 682-701, 2017.
[http://dx.doi.org/10.1016/j.compeleceng.2017.11.01]
[4]
K.V. Arya, and S.S. Rajput, ""Securing AODV routing protocol in MANET using NMAC with HBKS technique"", In 2014 International Conference on Signal Processing and Integrated Networks (SPIN).Noida, India 2014, pp. 281-285.,
[5]
S.S. Rajput, V. Kumar, and K. Dubey, ""Comparative analysis of original AODV and AODV-DOR routing protocols in mobile ad-hoc networks."", Int. J. Comput. Appl., vol. 63, no. 22, 2013.
[6]
O. Bello, and S. Zeadally, ""Intelligent device-to-device communication in the internet of things."", IEEE Syst. J., vol. 10, no. 3, pp. 1172-1182, 2016.
[http://dx.doi.org/10.1109/JSYST.2014.2298837]
[7]
L. Eschenauer, and V.D. Gligor, ""A key-management scheme for distributed sensor networks"", In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47.2002,
[http://dx.doi.org/10.1145/586110.586117]
[8]
B. Dutertre, S. Cheung, and J. Levy, “Lightweight key management in wireless sensor networks by leveraging initial trust”, SRI International, SDL Technical Report SRI-SDL-04-02,2004.
[9]
Z. Sencun, S. Sanjeev, and J. Sushi, ""LEAP: Efficient security mechanisms for large-scale distributed sensor networks"", In Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington D.C., USA, 2003, pp. 62-72.
[10]
W. Gu, N. Dutta, S. Chellappan, and X. Bai, “Providing end-to-end secure communications in wireless sensor networks”, IEEE Trans. Netw. Service Manage., vol. 8, no. 3, pp-205-218, 2011.
[http://dx.doi.org/10.1109/TNSM.2011.072611.100080]
[11]
A. Gaur, S. Toshniwal, and A. Prakash, ""Enhanced location based key pre-distribution scheme for secure communication in Wireless Sensor Network (WSN"", In Proceedings of 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010), San Francisco, CA, USA, 2010, pp. 552-557.
[http://dx.doi.org//10.1109/MASS.2010.5663897]
[12]
S. Nagar, S.S. Rajput, A. Gupta, and M.C. Trivedi, ""Secure routing against DDoS attack in wireless sensor network"", In Proceedings of the 3rd IEEE International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 2017, pp-1-6.
[http://dx.doi.org/10.1109/CIACT.2017.7977375]
[13]
A. Hussein, A. Hamami, and I.A. Aldariseh, ""Enhanced method for RSA cryptosystem algorithm"", In Proceedings of the International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, 2012, pp. 402-408.
[14]
A. Boukerche, ""Performance evaluation of routing protocols for ad hoc wireless networks."", IEEE Mobile Netw. Appl., vol. 9, no. 4, pp. 333-342, 2013.
[15]
P. Patel, R. Bhonsle, and B. Nemade, “Performance evaluation of MANET network parameters using AODV protocol for HEAACK enhancement”, In International Conference on Communication, Computing and Virtualization (ICCCV), Science Direct, vol. 79, pp. 932-939, 2016,
[http://dx.doi.org//10.1016/j.procs.2016.03.118]
[16]
A.K. Mohapatra, and N. Prakash, "Step-wise calculation of performance and complexity analysis of safer with RSA algorithm"., University School of Information Technology: New Delhi, India, 2016.
[17]
B. Schneier, "Applied cryptography, protocols, algorthms and source code in C (cloth)"., 2nd ed John Wiley & Sons, Inc.: New York, 2007.
[18]
A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, ""Secure routing and intrusion detection in Ad hoc networks"", In Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, vol. 38, pp. 191-199, 2005.
[http://dx.doi.org/10.1109/PERCOM.2005.38]
[19]
P. Saveetha, and S. Arumugam, ""Study on improvement in RSA algorithm and its implementation."", Int. J. Comp. Comm. Technol, vol. 3, no. 6-8, p. 78, 2012.
[20]
S.S. Rajput, and M.C. Trivedi, ""Securing zone routing protocol in MANET using authentication technique"", In 2014 International Conference on Computational Intelligence and Communication Networks Bhopal, India 2014, pp. 872-877.
[http://dx.doi.org/10.1109/CICN.2014.184]]
[21]
N. Sharma, S.S. Rajput, A.K. Dwivedi, and M. Shrimali, ""P-RED: Probability based random early detection algorithm for queue management in MANET."", In: Advances in Computer and Computational Sciences., Springer: Singapore, 2018, pp. 637-643.
[http://dx.doi.org/10.1007/978-981-10-3773-3_62]
[22]
N. Sharma, A. Gupta, S.S. Rajput, and V.K. Yadav, ""Congwsition control techniques in MANET: A survey"", In Second International Conference on Computational Intelligence & Communication Technology (CICT) Ghaziabad, India, 2016, pp. 280-282..
[http://dx.doi.org//10.1109/CICT.2016.62]
[23]
S. Yadav, ""Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme"", In 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON).Mathura, India 2017
[http://dx.doi.org/10.1109/UPCON.2017.8251012]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy