A Black hole Detection Algorithm in MANETS Using MAC Scheme
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 1
Abstract
Unattended installation of sensor nodes in the environment causes many security threats in the Ad-hoc networks. The security of the DSR and AODV protocol is threaded bydifferent types of attacks. Mobile Adhoc Networks (MANETs) are dynamic in nature. Any nodes can join and leave the network at any time. Hence any type of intruders can attack the communication at any time, especially the routing mechanism between the nodes. In this study, we study and enhance the security of MANET by encrypting the data using RSA before transmission and performing the key exchange among nodes by Diffie Hellman key exchange algorithm. The proposed work involves these algorithms and improves the security and possibility of attacks on network as any intruder doesn’t have these mechanisms when present in mobile Adhoc network. In our research AODV routing protocol is used to detect which node sends the reply after getting the request packet. This work will lead to minimum delay of packets in simulation results. The results confirm that the introduction concepts adds minimal overhead in time but enhances the security manifolds.With the help of RSA, a scheme is proposed which performs encryption and decryption. The key idea in the algorithm is that the source node calculates KEYfor encryption in RREP and then it matches the calculated KEY with KEY of the node which generates RREQ.
Authors and Affiliations
Manju Taya, Pankaj Gupta
Discovery of Web User Session Clusters Using DBSCAN and Leader Clustering Techniques
The explosive growth of World Wide Web (WWW) has necessitated the development of Web personalization systems in order to understand the user preferences to dynamically serve customized content to individual users. To re...
Bare PCB Inspection and Sorting System
This paper proposes a bare PCB inspection system using image analysis wherein the inspection algorithm mainly focuses on the defect detection and finding the exact location of the defect using the real PCB images. In th...
Prime Numbers and Modular Exponentiation in Encryption and Decryption
The Number theory is one of purest branches of mathematics, but it is also becoming a powerful tool when it comes to computer security. When we shop online, the Number theory helps to protect sensitive data such as cred...
A Review of Various Deconvolution Techniques for License Plate Recognition
A number plate is specific identification of a vehicle used to uncover the one who involves in hit and run accidents. The image capture from the fast moving vehicles will be unrecognizable by human because snapshot prov...
Development of CFD Solver Using FVM Method for the Study of Normal Shock Theory
The primary effort of this research paper is the development of an unstructured, cell-based algorithm to solve the inviscid Euler equations. Since the convective terms contain many non-linear, and since a proper discrit...