Detecting Sequence Number Collector Problem in Black Hole Attacks in AODV Based Mobile Adhoc Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Mobile Ad-hoc Network (MANET) is an autonomous system, where nodes/stations are connected with each other through wireless links. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing topology, lack of centralized monitoring and management point. The possible and the commonest attack in ad hoc networks is the black hole attack. In the black hole attack, a malicious node advertises itself as having the shortest path to the destination node. In the existing method a detection method based on checking the sequence number in the Route Reply message by making use of a new message originated by the destination node was developed but the drawback here is that a malicious node can play a role of sequence number collector in order to get the sequence number of as many other nodes as possible. In this Research Paper, a system is being proposed via which the sequence number collector problem is overcome by classifying the nodes into three categories based on the behavior. The malicious node is isolated from the active data forwarding and routing. The association between the nodes is used for the route selection. The scheme which is proposed in this research paper not only increases the routing security but also make the nodes cooperate among each other in the adhoc network.
Authors and Affiliations
Anand Nayyar,
Real Time Static Hand Gesture Recognition System in Complex Background that uses Number system of Indian Sign Language
Hand gestures are powerful means of communication among humans and sign language is the most natural and expressive way of communication for deaf and mute people. Communication between computers (or robot) and humans, ju...
The Efficient load balancing in the parallel computer
Recently Cpu workload hardware Technology and multiprocessor Service are developing rapidly. Mathematically computation must be completed within a certain time period .Through the mathematical Analysis our Study Iden...
Cloud Computing: Migration from Traditional Systems to the Cloud
Over the past few decades Business organizations have tried hard to keep up with the changes encountered in the market. Various factors like increased load, security, availability, fail safe mechanisms etc. have...
Secured Intersection based Geographical Routing Protocol for VANET
Abstract—To achieve efficient routing protocol for vehicular ad hoc networks (VANETs) existing system employs intersectionbased Geographical Routing Protocol (IGRP) in city environments. IGRP is based on an effective...
Comparison between different Compression and Decompression Techniques on MRI Scan Images
The main objective of this paper is to distribute the medical images to different hospitals and among the staff of the same medical centre within short span of time and efficiently. A lot of hospitals handle their...