A Simulated Novel Approach for Identifying Black Hole Attack in AODV based MANET
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a powerful, multifeatured security solution that achieves both broad protection and desirable network performance. MANETs are vulnerable to various attacks, blackhole, is one of the possible attacks. Black hole is a type of routing attack where a malicious node advertise itself as having the shortest path to all nodes in the environment by sending fake route reply. By doing this, the malicious node can deprive the traffic from the source node and can be implemented as a denial-of-service attack where the packets can be dropped later on. In this paper, a solution is proposed to identify the malicious node and implanting security against the threats of blackhole by notifying other nodes in the network of the incident. The simulation of the proposed algorithm demonstrates that the solution prevents the nodes in the network from blackhole attack and also improves the overall performance of AODV in the presence of black hole attack.
Authors and Affiliations
Kanika Lakhani
Using 3GPP- A Secure IDS for MANETs
Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directl...
E-government Implementation in Developing Countries: A Literature Review
Recently, due to the numerous benefits of e-government implementation, so it becomes inevitable for both developed and developing countries. However, the benefits of implementing e-government, it faces many challenges in...
Low Power/ High Speed Design in VLSI with the application of Pipelining and Parallel processing
The main objectives of any VLSI design are Power, Delay andArea. Minimizing all the objectives is a challenge in presentsituation but all efforts to achieve one of these can lead to abetter design. This paper proposes an...
A Modified Advanced Encryption Standard Algorithm for Image Encryption
Cryptography algorithms are becoming more necessary to ensure secure data transmission, which can be used in several applications. Increasing use of images in industrial process therefore it is essential to protect the c...
Comparative Study of Different Technique for Medical Image Segmentation: A Survey
Image analysis and processing can be done using image segmentation as one of the most critical aspect. Various subsequent processes of image analysis such as object representation object description ,feature measurement...