Detecting Sequence Number Collector Problem in Black Hole Attacks in AODV Based Mobile Adhoc Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Mobile Ad-hoc Network (MANET) is an autonomous system, where nodes/stations are connected with each other through wireless links. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing topology, lack of centralized monitoring and management point. The possible and the commonest attack in ad hoc networks is the black hole attack. In the black hole attack, a malicious node advertises itself as having the shortest path to the destination node. In the existing method a detection method based on checking the sequence number in the Route Reply message by making use of a new message originated by the destination node was developed but the drawback here is that a malicious node can play a role of sequence number collector in order to get the sequence number of as many other nodes as possible. In this Research Paper, a system is being proposed via which the sequence number collector problem is overcome by classifying the nodes into three categories based on the behavior. The malicious node is isolated from the active data forwarding and routing. The association between the nodes is used for the route selection. The scheme which is proposed in this research paper not only increases the routing security but also make the nodes cooperate among each other in the adhoc network.
Authors and Affiliations
Anand Nayyar,
A 5 level, 3 phase H-bridge PWM method for I.M. Controlling with field oriented techniques
This paper presents a micro controller based field oriented control 5-level inverter for three phase Induction motor. IGBT is used as power element. Pulse width modulation techniques (PWM), introduced three decad...
Mixed Pixels: A Challenge in Remote Sensing Data Classification for Improving Performance
Remote Sensing (RS) refers to the science of identification of earth surface features and estimation of their geo-biophysical properties using electromagnetic radiation as a medium of interaction. Spectral, spatial...
Scaling of Dimensions & Gate Capacitances of MOSFET
The scaling of complementary metal oxide semiconductor (CMOS) transistors has led to the silicon dioxide layer used as a gate dielectric becoming so thin (1.4 nm) that its leakage current is too large. It is necess...
Review of Cloud Computing and Its Application
Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. The practical application of Virtualization through various Cloud Computing Services is growing....
Edge Preserving MAP Estimation of Images Using Filtering Approach and Wavelet Based Mehods
This paper presents an effective approach for image restoration in the presence of both blur and noise.Here the image is divided into independent regions. Each region is modelled with a WSS Gaussian prior. This algor...