An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET. 

Abstract

Mobile ad-hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices. The sensitive information such as mobility behavior should be kept private from adversaries in wireless environments. Privacy-preserving routing is crucial for some ad-hoc networks that require stronger privacy protection say battle field. USOR is an Unobservable Secure On-demand Routing protocol for mobile ad hoc network that achieves unlinkability and unobservability by employing anonymous key establishment based on group signature. Each node only has to obtain a group signature signing key and an ID-based private key from an offline key server or by a key management scheme. Due to dynamic nature and lack of centralized control, the ad hoc networks are vulnerable to attacks. There is no security provision against the wormhole and black hole attacks in existing USOR protocol. In a wormhole attack, attackers tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbours and making them communicate through the wormhole link. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. AODV, USOR and modified USOR are implemented on ns2, and there performances are evaluated. 

Authors and Affiliations

nnie Jesus Suganthi Rani , R. Mathan

Keywords

Related Articles

LICENSE PLATE CHARACTER RECOGNITION USING BACK PROPAGATION ALGORITHM  

License Plate Recognition (LPR) technology is one of the most important parts in Intelligent Transport System (ITS), including License Plate Location, Characters Segmentation and Characters Recognition. The neural networ...

Optimization of Throughput Using Multicast Routing in Wireless Mesh Networks

In the recent years the multicast routing in wireless mesh network has given attention on metrics to improve link quality and to increase the high-throughput.Nodes must have always contact with their neighbouring nodes t...

Reliability Analysis of Nanoscale CMOS Device with HCI Effect

The paper focuses on the reliability due to hot carrier effects of CMOS and the HC effect under high gate voltage stress. How these stress factors vary with operating conditions, the required foundry qualification test d...

 Comparison of Embedded System and FPGA Application for Universal Multi-Resource Bus

This paper presents a survey on embedded systems design and applications. Several platforms for embedded systems, including microcontrollers, microprocessors, field-programmable gate arrays, digital signal processors, Pr...

Model Based Test Case Generation From Natural Language Requirements And Inconsistency, Incompleteness Detection in Natural Language Using Model-Checking Approach

Natural language (NL) is any language that arises in an unpremeditated fashion as the result of the innate facility for language possessed by the human intellect. A natural language is typically used for communication, a...

Download PDF file
  • EP ID EP136104
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

nnie Jesus Suganthi Rani, R. Mathan (2013). An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET. . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(3), 1132-1138. https://europub.co.uk/articles/-A-136104