MODIFIED AODV TO ELIMINATE THE EFFECTS OF BLACK HOLE NODE IN MANET
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 4
Abstract
Mobile Adhoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. So security in MANET is a complex issue. There are many routing protocols that establish the routes between the nodes in the network. The control towards the management of the nodes in the MANET is distributed. This feature does not give assurance towards the security aspects of the network. There are many routing attacks caused due to lack of security. In this paper, therefore, we attempt to focus on analyzing and improving the security of one of the popular routing protocol for MANET viz. the Adhoc On Demand Distance Vector (AODV) routing protocol. Our focus specifically, is on ensuring the security against the Black hole Attack. A black hole is a malicious node that falsely replies for any Route Requests (RREQ) without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. The proposed solution is capable of eliminating the effect of presence of black hole nodes in the MANET. The simulation study is performed using Network Simulator NS-2.34.
Authors and Affiliations
V. Tamizhazhagan , P. Manjamadevy , R. Tamil Nilavu
A Comparative Study on Different Types of Sorting Algorithms (On the Basis of C and Java)
Sorting is used for arranging the data in some sequence like increasing or decreasing order. I have discussed about various sorting algorithm with their comparison to each other in basis of time complexity and space comp...
A Scenario of Brain Computer Interaction with Different types of Face Recognition Techniques
Brain computer interaction technology has been developed to record the brain signal activity through various methods like Digital Electroencephalography, EMG , FMRI and face recognition. These are the advanced technology...
A SURVEY OF DESKTOP GRID SYSTEM SCHEDULING
Grid Computing forms virtual, collaborative organizations that share applications and data in an open heterogeneous server environment in order to work on common problems. Desktop Grid is a named collection of machines i...
Detection of Packet Dropping and Modification in Wireless Sensor Network
Security is crucial for wireless sensor networks deployed in hostile environments. The packet droppers and packet modifiers may be random. Identifying such attacks is very difficult and sometimes impossible. In this pape...
Security Issues In Mobile Cloud Computing
Mobile Cloud Computing (MCC) is a revolution in the field of mobile world. This paper presents the concept of mobile cloud computing which is a current gist in the field of computer. Beside this it acquaint with a new te...