Detecting Sequence Number Collector Problem in Black Hole Attacks in AODV Based Mobile Adhoc Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Mobile Ad-hoc Network (MANET) is an autonomous system, where nodes/stations are connected with each other through wireless links. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing topology, lack of centralized monitoring and management point. The possible and the commonest attack in ad hoc networks is the black hole attack. In the black hole attack, a malicious node advertises itself as having the shortest path to the destination node. In the existing method a detection method based on checking the sequence number in the Route Reply message by making use of a new message originated by the destination node was developed but the drawback here is that a malicious node can play a role of sequence number collector in order to get the sequence number of as many other nodes as possible. In this Research Paper, a system is being proposed via which the sequence number collector problem is overcome by classifying the nodes into three categories based on the behavior. The malicious node is isolated from the active data forwarding and routing. The association between the nodes is used for the route selection. The scheme which is proposed in this research paper not only increases the routing security but also make the nodes cooperate among each other in the adhoc network.
Authors and Affiliations
Anand Nayyar,
Cloud Data Security using Authentication and Encryption Technique
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centres. This mechanism brings...
DATA SHARING IN THE CLOUD USING DISTRIBUTED ACCOUNTABILITY
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users’ data are usually processed remotely in unknown...
CLASSIFICATION BY K-MEANS CLUSTERING
Improvement on Multi Group-LEACH Protocol of Wireless Sensor Network
Communication is the major cause of energy depletion in the wireless sensor network, so designing of energy efficient routing algorithm is one of the key challenges that need to be addressed for extending life time of ne...
A Novel BIST based Diagnosis Technique to Detect Faults in FPGA
Testing is considered as the major factor for many applications because of the high level fault detection and the fast hardware and software implementations, many of which are power and resource constrained and req...