Author : Kadhum Hameed, Mazin
journal of kerbala university,
2017, Volume 13, Issue 4, Pages 32-41
In the twentieth century at different times and in different places Communication technologies expanded. In the first the telephone invented as a wired technology and then as a wireless technology. In the later of the century computer communication has development. we can define the routing protocols as set of rules by which routers dynamically share their routing information.
Secured ad hoc routing protocols present a challenge, due to inherent characteristics of distributed cooperation, constrained capabilities of the nodes, open medium and dynamic topology. Due to such characteristics, these networks are highly susceptible to malicious attacks that may arise from several causes; non-deliberately when a node is damaged or deliberately when a node may need to save its resources, consume other node's resources, or isolate legitimate nodes from using the network. Most of the current ad hoc routing protocols are disrupted by malicious attacks. The most popular ad hoc routing protocol is the Dynamic Source Routing protocol(DSR) which is protocol finds the route when required dynamically and is on-demand source routing protocol. The DSR protocol contains two phases in its routing structure: route detection and route maintenance. To ensure the correct operations of DSR, provide security against malicious attacks is very important. This paper proposes a secured DSR; SecDSR which is protocol point -to- point certification of routing packets shared key between the two parties and using a Message Authentication Code (MAC) based on Ariadne protocol which relies on symmetric cryptography that is able to authenticate the source who initiated route discovery process to provide authentication. The tools and method that which used is it can used in conjunction with different mechanisms, one of which is TESLA (Timed Efficient Stream Loss tolerant Authentication) that setups shared secret keys beforehand. In this case time stamps are used to validate keysThe impact on performance caused by the use of such secured protocol is evaluated through simulation on NS-2. The DSR without security is first simulated. Then the secured version of the protocol; SecDSR is simulated. The analysis of simulation results revealed that secured ad hoc routing is achievable at the expense of increased