IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 240- 244

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

A survey of compromised AODV-based mobile ad hoc network due to Blackhole attack and solutions Hemal Patel

Priyang Bhatt

Department of Information Technology G.H.Patel College of Engineering & Technology Vallabh Vidyanagar,Gujarat, India [email protected]

Department of Computer Engineering G.H.Patel College of Engineering & Technology Vallabh Vidyanagar,Gujarat, India [email protected]

Abstract – A mobile ad hoc network (MANET) is an infrastructure less network and dynamic in nature which consists of mobile nodes that communicates with each other without any control of a centralized access point like a base station. Due to its dynamicity and no-infrastructure, MANETs are having ever changing topologies which makes MANET vulnerable to various security attacks. Amongst all attacks the Blackhole attack is one of the severe attacks. Moreover routing is one of the important aspects in MANET and it contains various routing protocol like AODV, DSR, DSDV, OLSR etc. which are vulnerable to Blackhole attack. In this paper, we have surveyed and discussed the existing solutions to Blackhole attacks on AODV. Keywords – MANET, AODV, Security, Blackhole Attack

I. INTRODUCTION Mobile ad hoc network is an autonomous and self-configuring network [1] composed of several mobile nodes i.e. mobile equipments like cell phones, PDAs, tablets etc. These mobile nodes communicate with each other through the wireless links established between nodes. Furthermore the communications between nodes occur without the support of any infrastructure or any centralized access point like a Base Station. Thus MANET never forms any fixed topology as it is dynamic in nature. Due to all these properties of MANTE it is having many open issues like security, reliable data delivery, limited bandwidth, finite energy of nodes and dynamic link establishment. Amongst the issues outlined above the security threats are very well explored and investigated in recent years. There are many security issues which have been studied in past few years. For an instance Black hole attacks, Worm hole attacks, Rushing attacks, Resource Depletion attacks, Distributed Denial of Service (DDoS) attacks Jellyfish attacks etc [13]. Especially the attack which causes the misbehavior in routing is one of the ill-famed security threats such as Black hole attack. Many researchers propose various solutions to overcome this security issue but the security problem is still unable to prevent entirely. In this paper, we focus on impacts of black hole attacks in MANET using AODV protocol and several prevention and detection techniques are proposed and discussed. The rest of the paper is structured as follows. In Section 2, we first briefly describe the AODV routing protocol. In Section 3, we discuss about black hole attack. In Section 4, we discuss the solutions of black hole attacks in AODV protocol. Finally, we conclude this survey in Section 5. II. OVERVIEW OF AODV ROUTING PROTOCOL AODV is perhaps the most know reactive routing protocol for a MANET. It provides a rapid, dynamic network connection, with low processing loads and low memory consumption [2]. Nodes in the network exchange routing information only when they intend to communicate, and keep this information updated only as long as the communication lasts. In AODV, each node only records the information of the next hop only in its routing table and maintains it to sustain a route from source to destination node. If the source node is unable to reach to the destination node then the route discovery process will be executed immediately. In route discovery process, the intended node broadcasts a Route Request message (RREQ) to its neighbours in order to establish a route to the destination node. After receiving the RREQ message neighbouring nodes increment the hop count value and again broadcast the message to their neighbours.

Hemal Patel, IJRIT

240

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 240- 244

This process continues until the destination node is found. The RREQ message eventually will reach to the destination node, which generates Route Reply (RREP) message and unicast to the source node along the reverse route established during the RREQ broadcast [11]. Similarly RREP message allows the intermediate nodes to learn the forward route the destination node. Thus at the end of the process, data packets can be send to the destination and vice versa. Whenever the link between any nodes break due to movement of previous node moved out to new location and no longer reachable, a Route Error (RERR) message is generate to notify the node about the link breakage. Moreover each node periodically sends HELLO messages and hence, each node knows which are its neighbouring nodes i.e. the nodes which are one hop away. Thus routing messages are either route discovery (RREQ and RREP) or route maintenance (RERR and HELLO) messages. These are also known as control packets. In case of inactive route, all routing information is removed from the routing table. The RREQ message does not necessarily need to be reach to the destination node always during the route discovery process [14]. That is, an intermediate node having a route to the destination node simply generates the RREP message without forwarding the RREQ message further. This results in faster route discovery and eliminates further flooding of RREQs. To identify the freshest route in the network AODV uses sequence numbers. The sequence numbers, are 32-bit unsigned integer, included in routing messages and recorded in routing tables. AODV favours newer information, thus nodes update their routing table whenever they receive a message with a higher sequence number, a larger the number refers to newer the information, or a smaller hop count, smaller the hop count refers to shorter the path, than what exists in the routing table for a given destination [14]. However, a sequence number is given a higher priority than a hop count. That is, a route with newer information is favoured even if it is longer. Being a reactive routing protocol, AODV does not give nodes a complete view of network topology. That is, each node only knows its neighbours, and for the non-neighbours, it only knows the next hop to reach them and the distance in hops. However, AODV is having no inherent security mechanism so it is vulnerable to various security attacks so apparently is cannot withstand against black hole attacks because during the route discovery phase a malicious node may counterfeit the sequence number and/or hop count value in the routing message; thereby AODV is compromised by the Blackhole nodes. III. BLACK HOLE ATTACK The Blackhole attack is a kind of Denial of Service (DoS) attack in MANET in which the malicious node waits for the RREQ message from the neighboring nodes. Once it receives the RREQ message it immediately sends RREP message with very high sequence number to the source node. Thus a malicious node forges the sequence number (and hop count) of a routing message to forcibly acquire the route [14]. Hence the source node assumes that it is now having the freshest route and starts to send data packets to the destination node via this route but the malicious node does not relay the packets and drops it. A Black Hole node has two properties: (1) the node exploits the ad hoc routing protocol and advertises itself as having a valid route to a destination, even though the route is spurious, with the intention of intercepting packets, and (2) the node consumes the intercepted packets. In AODV routing protocol [14], a source node would broadcast a RREQ packet to establish a route to a destination; with the normal intermediate nodes receiving and continuously broadcasting the RREQ, except the Black Hole node. Everything works well if the RREP from a normal node reaches the source node first; but the RREP from Black Hole could reach the source node first, if it is nearer to the source node. Moreover, a Black Hole node does not need to check its routing table when sending false RREP message [11]; its response is likely to reach the source node first. This makes the source node to conclude that the route discovery process is complete, ignoring all other RREPs and beginning to send data packets. The Black Hole node would directly send a route reply (RREP) to the source node S, with an extremely large sequence number and hop count of 1, as shown in Fig. 1(a). The destination node D would also select a route with a minimum hop count upon receiving RREQs from normal nodes, and send a RREP packet as illustrated in Fig. 1(b). Based on the AODV protocol, a source node S would select the latest and shortest (i.e., largest sequence number and minimum hop count) route to send the data packets from the RREPs packets received. It implies that a route via the Black Hole node would be selected by node S. The received data packets by the Black Hole node will then be eavesdropped or dropped as in Fig. 1(c). The malicious node always sends RREP as soon as it receives RREQ without performing standard AODV operations, while keeping the Destination Sequence number very high. Since AODV considers RREP having higher value of destination sequence number to be fresh, the RREP sent by the malicious node is treated fresh. Thus, malicious nodes succeed in injecting Black Hole attacks. IV. SOLUTIONS TO BLACK HOLE PROBLEM In this section, we will discuss the different solutions that are proposed to counter against black hole attacks in AODV based mobile ad-hoc networks.

Hemal Patel, IJRIT

241

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 240- 244

M.A. Shurman [3] in his work proposed for source node to verify the authenticity of the node that initiates the RREP messages by finding more than one route to the destination, so that it can recognize the safe route to destination. This method can cause routing delay, since a node has to wait for a RREP packet to arrive from more than two nodes. Due to this, Dokurer [5] has proposed a solution based on ignoring the first established route to reduce adverse effects of Black hole attack. His assumption is based on the fact that the first RREP message that arrives at a node would normally come from a malicious node. Unfortunately, this method has some limitations. For instance, the second RREP message received at a source node may also come from malicious node if the real destination node is nearer to the source node than the malicious node. This method also does not address how to detect and isolate malicious node from the network. Asad Amir Pirzada et al. [4] has proposed the solution based on Cryptographic mechanism using point-to-point & end-to-end encryption using symmetric key. The secure AODV protocol provides requisite measures for protection of route discovery and transfer of data. These measures can be exercised independently without a central trust authority with nodes negotiating session keys independently. Nodes are, however, required to register themselves once with a Certification Authority, prior to joining a network. The scheme is based upon point-to-point and end-to-end encryption using symmetric key-based mechanisms. Nodes desiring secure communication, execute any standard authentication and key exchange protocol to acquire session keys. These keys are subsequently used in point-to-point encryption for route discovery and end-to-end encryption for data packets. Malicious nodes trying to launch passive or active attacks against the network are thwarted through efficient key verification mechanisms and a multilayered enciphering scheme. Liu Jinghua et al. [6] have proposed a solution based on the neighbour monitoring mechanism. An attempt to address the survivability problem of the routing service when selective dropping attacks were launched, using trusted nodes to monitor neighbours. However, the method could not work well in a sparse network where there were no enough neighbours to act as the monitoring nodes. A proposal that each node overhears all traffic of its neighbours and then compares the values observed with some metric to detect abnormal behaviours in the network. The approach requires nodes to be in promiscuous mode and process all overheard packets, which can be energy consuming, impacting negatively on energy constrained mobile nodes. Furthermore, nodes might not overhear neighbours‟ transmissions in a sparse network due to insufficient transmission power, which limits transmission ranges. In this mechanism the mutual neighboring node continuously listen to its neighbour so it is having all the information available about its neighbour. So whenever any malicious activity is occurred it can simply notice it and thus prevents the network from the Blackhole attack. The common neighbor listening mechanism reduces delay about 50%. The maximum of delivery ratio is 64% increased when there have attack behaviours in the network. The delivery ratio of AODV with defence mechanism is almost the same as that of the AODV without attacks. Menaka Pushpa [7] has proposed a solution based on Trust Based Secure Routing. TAODV protocol proposed modified AODV routing protocol with node trust value. It required the following modification in the existing AODV protocol; (1) two new control packets TREQ (Trust Request), TREP (Trust Reply), (2) Modified extended routing table with four new fields; positive events, negative events, route status, opinion. Using this approach, secure route can be established by calculating trust value of each node who all are participating the route establishment process from source to destination. It is completely rely only on trust value of nodes. But in few situations, this method of route establishment is not sufficient to create a secure route. Also we have to equally concentrate the route trust value. All types of Routing Protocols in MANET use shortest path (or) minimum hop count to destination as their route selection criteria. This selection criterion always not acts like a best one. Sometimes, the selected shortest path may be congested by heavy traffic or affected by malicious or selfish nodes or affected by other physical or network conditions in that route. After successful route establishment, source node may not aware of the current route conditions. AODV RREP packet contains only the information like hop count, freshness of the route, Destination sequence number, source and destination IP addresses. Using the information in RREP message, we cannot detect the above mentioned various status of route. For resolving such problem, this method gives equal weight for both route trust and node trust for the route selection process. It requires acceptable level of changes in the existing functionality of AODV protocol to obtain secure and reliable routes. This process operates only in the network layer. No additional overhead in other layers. In [8] Suman Deswal et al. has proposed a solution by disabling the intermediate nodes to send route replies and thereby allowing the generation of route reply only by the destination node. After receiving route reply from an intermediate node, the originator sends an enquiry to check whether a route from that intermediate node to the destination node exists or not. If it exists, the originator trusts the intermediate node and sends out the data packets via this intermediate node. If not, the originator simply discards the reply message from the intermediate node, sends out alarm message to the network, isolates that intermediate node from the network and starts a new route discovery process. No malicious node can read the data in the data packet due to the encryption of the message. Every node checks password before forwarding the RREQ. All nodes on the route from source to destination are secure and fulfil security requirements of the sender. The proposed modified AODV can secure the ad hoc network from the routing attacks of black hole, routing table overflow and external and passive attacks and also keeps only the latest and correct information in the routing table. Since this protocol enforces that no intermediate node can originate RREP

Hemal Patel, IJRIT

242

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 240- 244

therefore after receiving route request, only the destination will initiate RREP. No malicious node can read the data in the data packet due to the encryption of the message. Every node checks password before forwarding the RREQ. Hence all nodes on the route from source to destination are secure and fulfil security requirements of the sender. Kamarularifin Abd Jalil et al. In [9] proposed the solution to limits the updates in routing table. This solution is based upon receiving multiple RREP messages rather than a single RREP message. This method efficient to identify a Blackhole node in the network by making the comparison of sequence numbers of multiple RREPs. By applying heuristics the node which is having oddly higher sequence number is listed out as a malicious node and will be thrown away from the network. This scheme works well to identify the malicious node and incurs no extra overheads in terms of Normalized Routing Load (NRL) and Delays. Mohammad Abu Obaida et al. [10] have proposed AODVR with several modules such as Packet Classifier, Extractor, Blacklist Tester, RREP sequence number Tester, Threshold Tester and ALARM broadcaster. As the packet arrives in the system Packet Classifier classifies it to be RREQ, RREP secure, RERR, ALARM and HELLO packet. AODVR assumes format of RREQ, RERR and HELLO Packets are as same as the AODV. However, it modifies the content and format of RREP and includes a new type of packet ALARM. Extractor extracts required contents of all types of packets other than HELLO. As a node is identified as black hole, ALARM Broadcaster broadcasts alert to neighboring nodes with the BLACK_LIST node as parameter. Any router receiving the ALARM packet forwards the message to its neighboring nodes thereby discovering the BLACK_LIST to the whole network. However the procedure of formulating the threshold is a bit overwhelming. Formulations of correct threshold range keep black holes from intrude; while a wrong formulation may restrict an authentic node thereby disgrace it to be a black hole. The simulation results show that the packet delivery ratio (PDR) of AODVR exhibits almost same capability as the PDR of normal AODV. AODVR has delay efficient and sometimes it is better than AODV and a small increase in normalized routing overhead (NRO) that is insignificant. Rajesh Yerneni et al. [12] has proposed a solution to detect the Blackhole attack by calculating the ratio of total RREQ messages and total RREP messages. This algorithm is based on how the malicious node behaves in order to perform the black hole attacks. To attract traffic towards it, malicious node send false RREP packet as a response RREQ packet. It sends RRE P even if it does not have the path towards the destination as requested by the source of RREQ. It does not broadcast RREQ, instead sends RREP without checking its routing table. So for the malicious node the ratio of number of RREQs transmitted to the number of RREPs transmitted is very less. Modified algorithm makes use of this fact to detect the black hole attack. Two extra fields are used in the proposed algorithm OAODV (opinion AODV) - request weight and reply weight. Request weight in routing table indicates the number of RREQs that are forwarded by the corresponding node. Similarly Reply weight indicates the number of RREPs forwarded. Proposed method has two modules-updating request/reply weights and collecting feedback. It has been observed that the Blackhole nodes never send any RREQ message because it never intends to do communication. On contrary the number of RREP messages send is far much higher than that of RREQs. Hence the ratio of RREQ/RREP weight is very close to zero then it is apparently a malicious node and it can be removed from a network CONLUSION A Black Hole attack is one of the most serious security problems in MANET. It is an attack where a malicious node impersonates a destination node by sending forged RREP to a source node that initiates route discovery, and consequently deprives data traffic from the source node. In this paper a survey on AODV-based routing in MANET against Black Hole attack is presented with some proposed solutions. The existing solutions affect the AODV performance negatively in terms of throughput, delay and overheads. Although these may not be avoided in totality, there is a need for trade-offs to achieve a secure optimal performances. One of the suggested approaches for improvement is to determine optimal threshold values for accurate anomaly detections. Solution approaches that result in further traffic congestion should be least considered. Based on the above performance comparisons, it can be concluded that Black Hole attacks affect the AODV routing protocol negatively. Hence, there is need for perfect detection and elimination mechanisms. The detection of Black Holes in ad hoc networks is still considered to be a challenging task. Future work is intended to an efficient Black Hole attack detection and elimination algorithm with trade-offs in delay and overheads that can be adapted for ad hoc networks susceptible to Black Hole attacks. ACKNOWLEDGMENT My Sincere thanks to my guide Prof. Priyang Bhatt, for providing me an opportunity to do my research work. I express my thanks to my Institution namely G. H. Patel College of Engineering and Technology for providing me with a good environment and facilities like Internet, books, computers and all that as my source to complete this research work. My heart-felt thanks to my family, friends and colleagues who have helped me for the completion of this work.

Hemal Patel, IJRIT

243

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014,Pg: 240- 244

REFERENCES C. E. Perkins, “Ad Hoc Networking”, Addison -Wesley, Pearsonedu. Jan. 2001. Ochola EO, “A Review of Black Hole Attack on AODV Routing in MANET”. [3] M. A. Shurman, S. M. Yoo, and S. Park, “Black hole attack in wireless ad hoc networks,” in ACM 42nd Southeast Conference (ACMSE‟04), pp. 96-97, Apr. 2004. [4] Asad Amir Pirzada, “Secure Routing with the AODV Protocol”, IEEE 2005. [5] Dokurer, Semih.”Simulation of Black hole attack in wireless Ad-hoc networks”. Master's thesis, AtılımUniversity, September 2006. [6] Liu Jinghua, Geng Peng, “A SECURE ROUTING MECHANISM IN AODV FOR AD HOC NETWORKS”, IEEE 2007. [7] A.Menaka Pushpa, “Trust Based Secure Routing in AODV Routing Protocol”, IEEE 2009. [8] Suman Deswal and Sukhbir Singh, “Implementation of Routing Security Aspects in AODV”, IEEE 2010. [9] Kamarularifin Abd Jalil, “Securing Routing Table Update in AODV Routing Protocol”, IEEE 2011. [10] Mohammad Abu Obaida, Shahnewaz Ahmed Faisal, Md. Abu Horaira, Tanay Kumar Roy, “AODV Robust (AODVR): An Analytic Approach to Shield Ad-hoc Networks from Black Holes”, International Journal of Advanced Computer Sciences and Applications, 2011. [11] Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao,” A survey of black hole attacks in wireless mobile ad hoc networks”, human centric computing and information science, a Springer open journal.2011. [12] Rajesh Yerneni, Anil K. Sarje, “Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc Networks”, IEEE 2012. [13] Jan vonMulert, IanWelch, WinstonK.G.Seah, “Security threats and solutions in MANETs: A case study using AODV and SAODV”, Journal of Network and Computer Applications – ELSEVIER, February 2012. [14] Ei Ei Khin, Thandar Phy, “Comparative Analysis of Black Hole Attack Solutions in AODV Protocol”, International Journal of Computer & Communication Engineering Research (IJCCER), 2013. [1] [2]

Hemal Patel, IJRIT

244

A survey of compromised AODV-based mobile ad hoc network due to ...

network due to Blackhole attack and solutions. Hemal Patel. Priyang Bhatt. Department of Information Technology. Department of Computer Engineering.

88KB Sizes 0 Downloads 187 Views

Recommend Documents

A survey of compromised AODV-based mobile ad hoc network due to ...
Abstract – A mobile ad hoc network (MANET) is an infrastructure less network and dynamic in nature which consists of mobile nodes that communicates with each other without any control of a centralized access point like a base station. Due to its dy

Survey on Internet Connectivity for Mobile Ad Hoc Network
node leaves the subnet from which its address is assigned, the node cannot be located using IP routing. Its. IP address no longer accurately reflects its point of attachment to the network. In view of the increasing demand for wireless information an

Survey on Internet Connectivity for Mobile Ad Hoc Network
(Wi-Fi) network adapters enable the spontaneous creation of city-wide MANETs. These networks could then constitute the infrastructure of numerous applications such as emergency and health-care systems, groupware, gaming, advertisements, etc. As users

Adaptive Quality of Service for a Mobile Ad Hoc Network
Adaptive Quality of Service for a Mobile Ad Hoc Network. Antonis Dimakis ... routing system that can provide different classes of service in ... typical applications.

Mobile Ad hoc Network Security Issues - International Journal of ...
IJRIT International Journal of Research in Information Technology, Volume 3, ... Among all network threats, Distributed Denial of Service (DDoS) attacks are the ...

Mobile Ad hoc Network Security Issues - International Journal of ...
IJRIT International Journal of Research in Information Technology, Volume 3, ... A Mobile Ad-hoc Network (MANET) is a dynamic multi hop wireless network ...

Capacity Scaling in Mobile Wireless Ad Hoc Network with ...
... tends to infinity. This is the best perfor- ...... The next theorem reveals a good property of uniformly ..... 005); National High tech grant of China (2009AA01Z248,.

Capacity Scaling in Mobile Wireless Ad Hoc Network with ...
less ad hoc networks with infrastructure support. Mobility and ..... different complete proof of the upper bound is also available in [3]. But our approach is simpler.

Wireless, mobile ad-hoc network routing Mario Gerla ...
In a wireless environment, a radio link between mobile nodes may experience frequent disconnects and reconnects. The L S protocol releases a link state update for each such change, which floods the network and causes excessive overhead. F S R avoids

Capacity Scaling in Mobile Wireless Ad Hoc Network ...
Keywords-Ad hoc wireless networks; hybrid wireless net- work; mobility; capacity .... A smaller m represents a more severe degree of clustering and vice versa.

Capacity Scaling in Mobile Wireless Ad Hoc Network ...
Jun 24, 2010 - Uniformly Dense Networks. Non-uniformly Dense Networks. Capacity Scaling in Mobile Wireless Ad Hoc. Network with Infrastructure Support.

a survey of integrating ip mobility protocols and mobile ad hoc networks
integrating the Cellular IP access network and MANETs is introduced. This ...... degree in computer science from Baghdad University, Iraq, in. 1997 and avMaster ...

a survey of integrating ip mobility protocols and mobile ad hoc networks
Internet connectivity to mobile ad hoc networks based on. Mobile IP and IP micro-mobility protocols. A comparison of the solutions for integrating MANETs with ...

A Survey of QoS Routing Solutions for Mobile Ad hoc Networks
provision of Quality of Service (QoS) guarantees is much ... networks (MANETs) [1] has been recognised as an area of research in ..... 1) Network Layer Metrics:.

Multi-Tier Mobile Ad Hoc Routing - CiteSeerX
Cross-Tier MAC Protocol .... black and is searching for the best neighbor to use as its black ... COM, send a Connection Relay Message (CRM) to G3 telling.

Multi-Tier Mobile Ad Hoc Routing - CiteSeerX
enable assured delivery of large volumes of critical data within a battlefield by ground nodes and airborne communication nodes (ACNs) at various altitudes.

Adaptive Quality of Service for a Mobile Ad Hoc Network - CiteSeerX
... of the ad hoc network is mobile and has one or more wireless network interfaces. ... Another advantage is when a link fails in a transit cluster, local rerouting of ...

A Review on Prevention of Wormhole Attack in Mobile Ad-hoc Network
3.4 Interference and Jamming: Radio signals can be blocked or interfered with, which causes the message to be corrupted or lost. If the attacker has a powerful transmitter, a signal can be generated that will be strong enough to overwhelm the targete

A Review on Prevention of Wormhole Attack in Mobile Ad-hoc Network
Abstract: Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructure- less network with dynamic topology pose a number of challenges to security design and makes it vulnerable for diff

Secure Mobile Ad hoc Routing - IEEE Xplore
In mobile ad hoc networks (MANETs), multi-hop mes- sage relay is the common way for nodes to communicate and participate in network operations, making ...

Adaptive Quality of Service for a Mobile Ad Hoc Network - CiteSeerX
routing system that can provide different classes of service in a mobile ad hoc ... mobile and has one or more wireless network interfaces. Each interface can ...

Modelling cooperation in mobile ad hoc networks: a ...
one. However, the general approach followed was proposing a mechanism or a protocol ... network with probability one. ... nodes from all the network services.

Modelling cooperation in mobile ad hoc networks: a ...
bile wireless nodes. It has no authority and is dy- namic in nature. Energy conservation issue is es- sential for each node and leads to potential selfish behavior.

Route Optimization To Make The Ad-Hoc Network ...
1M.tech Student, Computer Science and Engineering , Manav Rachna ... In year 2008, Alfredo Garcia performed a work," Rational Swarm Routing Protocol ... free protocol, but it uses a new routing metric termed degree of involvement ... 1. Define N Numb