<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Signal and Data Processing</title>
<title_fa>پردازش علائم و داده‌ها</title_fa>
<short_title>JSDP</short_title>
<subject>Engineering &amp; Technology</subject>
<web_url>http://jsdp.rcisp.ac.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2538-4201</journal_id_issn>
<journal_id_issn_online>2538-421X</journal_id_issn_online>
<journal_id_pii></journal_id_pii>
<journal_id_doi>10.61882/jsdp</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>1</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science></journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1395</year>
	<month>12</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2017</year>
	<month>3</month>
	<day>1</day>
</pubdate>
<volume>13</volume>
<number>4</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی </title_fa>
	<title>Modified AODV Routing Protocol in Order to Defend Wormhole Attacks</title>
	<subject_fa>مقالات گروه امنیت اطلاعات</subject_fa>
	<subject>Paper</subject>
	<content_type_fa>پژوهشي</content_type_fa>
	<content_type>Research</content_type>
	<abstract_fa>&lt;p&gt;چکیده &amp;ndash; حمله کرم چاله یک نوع حمله فعال می&#8204;باشد که در لایه سوم شبکه از شبکه&#8204;های اقتضایی رخ می&#8204;دهد. در این حمله مهاجمین با متقاعد کردن گره فرستنده برای ارسال اطلاعات از یک مسیر جعلی که کوتاه&#8204;تر و سریع&#8204;تر از مسیر عادی به نظر می&#8204;رسد، سعی دارند ارسال بسته&#8204;ها از تونل ایجاد شده انجام شود تا بتوانند، حملات آنالیز ترافیک، انکار سرویس، رها کردن بسته&#8204;ها و یا جلورانی انتخابی را انجام دهند. هر پروتکلی که از مقیاس کم&#8204;ترین تاخیر و کم-ترین تعداد گام برای مسیریابی استفاده کند، در برابر این حمله آسیب پذیر است.در این مقاله یک راه&#8204;کار جدید برای مقابله با حملات کرم چاله ارائه می-دهیم. در راه&#8204;حل پیشنهادی هر گره دارای یک وزن است و مجموع وزن&#8204;ها در شبکه برابر صد خواهد بود. هرگاه گره&#8204;ای قصد ارسال ترافیک به گره دیگر را داشته باشد، در بسته RREQ حداقل وزن درخواستی برای ایجاد ارتباط را بیان می&#8204;کند. گره فرستنده با توجه به اهمیت داده&#8204;هایی که ارسال خواهد کرد مشخص می&#8204;کند که مجموع وزن گره&#8204;های شرکت کننده، در فرایند کشف مسیر باید چقدر باشد. روش پیشنهادی را MAODV نامگذاری می&#8204;کنیم. روش فوق به صورت نرم&#8204;افزاری بوده و با توجه به این&#8204;که از تکنیک رمزنگاری استفاده نخواهیم کرد،پیش&#8204;بینی می&#8204;کنیم سربار کمتری نسبت به سایر تکنیک&#8204;ها داشته باشیم، و همچنین به علت عدم استفاده از الگوریتم&#8204;های سخت، توان گره&#8204;ها که اتفاقا محدود است، کمتر صرف محاسبات خواهد شد.کارایی الگوریتم پیشنهادی را در محیط ns-2 نشان خواهیم داد.&lt;/p&gt;
</abstract_fa>
	<abstract>&lt;p&gt;&lt;strong&gt;Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.&amp;nbsp; In Wormhole attacks, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer. If the source chooses this fake route, malicious nodes have the option of sniff, modify, selectively forward packets or them. Existing solution defends wormhole attacks, such as SECTOR, Packet Leashes, DelPHI, directional antenna. These solutions require special hardware or strict synchronized clocks or cause message overhead, or generate false-positive alarms. A novel approach MAODV: Modified AODV is proposed to defend wormhole attacks, launched in AODV. The proposed approach is based on weight per hop. Each node in network has its own weight, given by administration due to trusty power capability. Sum of weight will not be exceeded from 100. Whenever a source node wants to send a traffic to destination, puts its minimum weight in RREQ packet to constitute the route. The destination node is selected in the route that its weight is close to destination announcement weight. Since no special hardware and no encryption techniques are used, it is likely to have less overhead and delay, compared to other techniques. &lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;The proposed wormhole defend mechanism is discussed in detail. Our proposed system does not require any synchronized clocks or special hardware to defend wormhole attacks. In our proposed system some parameters will be added to AODV routing protocol and make it more secure against wormhole attacks. We will name this new protocol as MAODV. In the first place, there is a master node in network, which&amp;nbsp; weighs 100 (weighs of whole network). Whenever a node attends to enter the network, sends a join message to nearest neighbor. After receiving the message, master node will share its weights with the node requester, and sends the weight to this node requester. This process and weight sharing will be repeated after any requests to join a network, and total weight of network is not exceeded from 100. In our proposed method, each path which is created between source and destination, has a particular weight and this weight equals to intermediate node weights being added to each other. In MAODV whenever a source node wants to send RREQ packet, it adds the minimum weight to constitute route. After receiving RREQ packets, each intermediate node increases its weight beside increasing hop count. Each intermediate node does the same action, as far as destination node receives, RREQ packet among the received RREQ, one of them will be selected which its weight is the same as minimum requested weight by source, or slightly more than that. For instance, consider fig 1 which has 14 nodes. Assuming the node weights are equal for each node and its 7. As mentioned, the weight of whole network is tantamount to 100. Example 1: consider fig. 1 in which node A sends RREQ to node B. At first, node A checks its cache table to see whether there is a route between A and B, or not. If the answer is positive, it starts to send data. If the answer is negative, it sets up RREQ as follow: &lt;A,B,1,7.25,[]&gt; which means: A: source, B: destination, 1: hop count, 7: constitute path weight, 25: request weight, []: intermediate nodes. Each node which receives RREQ will check if it is the destination or not. If it wasn&amp;rsquo;t: 1. Increase hop count, 2. puts its weight to constitute path weight, 3. Adds its address as an intermediate node. And then broadcasts RREQ packet to the neighbors. In this example node A sends RREQ to X and C, which are legitimate neighbor of A. When X receives the packet, modifies it as: &lt;A,B, 2,(4,25,[X]&gt; and forwards it to its neighbors on the other hand node. C modifies packet as: &lt;A,B,2,(4,25,[C]&gt; and forwards it to its neighbor D. This action will be repeated until B gets two RREQ - &lt;A,B,4,28,25,[C,D,E]&gt; and &lt;A,B,7,25,48,[X,U,V,W, Z,Y&gt; - among the received RREQ, B will be selected which its weight is the same as minimum requested weight by A, or slightly more than that, so the first route will be chosen by B. node B setup RREP packet as &lt;A,B,1,4,25,7, [E,D,C]&gt; which means: A: source, B: destination, 1: back path weight, 4: hop count, 25: request weight, 7: constitute path weight, [E,D,C]: intermediate nodes. &lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;The effectiveness of the propose mechanism is evaluated using ns2 network simulator. The simulator&amp;#39;s outcome demonstrates that PDR in MAODV rose by 5% up to 8% in presence of two malicious nodes, compared to PDR in AODV routing protocol. The average delay point to point in MAODV is more than AODV, but on the other hand, it is less than SAODV due to not using encryption.&lt;/strong&gt;&lt;/p&gt;
</abstract>
	<keyword_fa>شبکه MANET, حمله کرم چاله, پروتکل مسیریابی AODV, ns-2</keyword_fa>
	<keyword>MANET, Wormhole attacks , AODV, NS2   </keyword>
	<start_page>109</start_page>
	<end_page>120</end_page>
	<web_url>http://jsdp.rcisp.ac.ir/browse.php?a_code=A-10-96-3&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>hossein</first_name>
	<middle_name></middle_name>
	<last_name>gharaee</last_name>
	<suffix></suffix>
	<first_name_fa>حسین</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>قرائی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>gharaee@itrc.ac.ir</email>
	<code>10031947532846004966</code>
	<orcid>10031947532846004966</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>itrc</affiliation>
	<affiliation_fa>مرکز تحقیقات مخابرات</affiliation_fa>
	 </author>


	<author>
	<first_name>farid</first_name>
	<middle_name></middle_name>
	<last_name>mohammadi</last_name>
	<suffix></suffix>
	<first_name_fa>فرید</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>محمدی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>farid.mohammadi@ut.ac.ir</email>
	<code>10031947532846004967</code>
	<orcid>10031947532846004967</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>tehran university</affiliation>
	<affiliation_fa>دانشگاه تهران</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
