A Black hole Detection Algorithm in MANETS Using MAC Scheme
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 1
Abstract
Unattended installation of sensor nodes in the environment causes many security threats in the Ad-hoc networks. The security of the DSR and AODV protocol is threaded bydifferent types of attacks. Mobile Adhoc Networks (MANETs) are dynamic in nature. Any nodes can join and leave the network at any time. Hence any type of intruders can attack the communication at any time, especially the routing mechanism between the nodes. In this study, we study and enhance the security of MANET by encrypting the data using RSA before transmission and performing the key exchange among nodes by Diffie Hellman key exchange algorithm. The proposed work involves these algorithms and improves the security and possibility of attacks on network as any intruder doesn’t have these mechanisms when present in mobile Adhoc network. In our research AODV routing protocol is used to detect which node sends the reply after getting the request packet. This work will lead to minimum delay of packets in simulation results. The results confirm that the introduction concepts adds minimal overhead in time but enhances the security manifolds.With the help of RSA, a scheme is proposed which performs encryption and decryption. The key idea in the algorithm is that the source node calculates KEYfor encryption in RREP and then it matches the calculated KEY with KEY of the node which generates RREQ.
Authors and Affiliations
Manju Taya, Pankaj Gupta
Key Issuing Scheme For Communication In Peer To Peer Networks
Identity based cryptography (IBC) was introduced into peer-to-peer (P2P) networks. In this paper we propose a secure key issuing scheme for P2P networks using IBC. We are present an IBC infrastructure, which consists of...
Review paper of enhance the efficiency of the network by enhancing the error recovery by using the backup path in MPLS network
When data is transmitted at high speed through a cabled network, from any noise over the network or channel interference is introduce which causes heavy data loss. When data is transferring through a topology like bus o...
Design and Implementation of a Single Stage AC-DC Energy Harvesting Converter for Microgenerator
In this project, a direct ac-dc power electronic convertor topology is proposed for efficient and optimum energy harvesting from low – voltage micro generators. The convertor utilizes the bidirectional current - conduct...
Phytoremediation of Contaminated Soil
This dissertation presents the status of phytoremediation technologies. Due to their immutable nature, metal are a group of pollutants of much concern. A result of human activities such as mining and smelting of metalli...
Data Mining of Web Access Logs Using Classification Techniques
This paper focus on classification, technological advancement, business have gone online. Because of the growing popularity of the World Wide Web. Many website typically experience Lac of visitors every day. Data mining...