MODIFIED AODV TO ELIMINATE THE EFFECTS OF BLACK HOLE NODE IN MANET
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 4
Abstract
Mobile Adhoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. So security in MANET is a complex issue. There are many routing protocols that establish the routes between the nodes in the network. The control towards the management of the nodes in the MANET is distributed. This feature does not give assurance towards the security aspects of the network. There are many routing attacks caused due to lack of security. In this paper, therefore, we attempt to focus on analyzing and improving the security of one of the popular routing protocol for MANET viz. the Adhoc On Demand Distance Vector (AODV) routing protocol. Our focus specifically, is on ensuring the security against the Black hole Attack. A black hole is a malicious node that falsely replies for any Route Requests (RREQ) without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. The proposed solution is capable of eliminating the effect of presence of black hole nodes in the MANET. The simulation study is performed using Network Simulator NS-2.34.
Authors and Affiliations
V. Tamizhazhagan , P. Manjamadevy , R. Tamil Nilavu
An improved load balancing adaptive QoS buffer scheduler (I-LABS) for streaming services over MANET
Large variations in network Quality of Service (QoS) in terms of bandwidth, latency, jitter may occur during media transfer over Mobile Ad-hoc Networks (MANETs). Researchers have identified that complex computing applica...
Handwritten Character Recognition with Feedback Neural Network
The ability of a machine to interpret handwritten characters from sources like paper document, photograph, etc. to some editable computerized form is the first and foremost aim of handwritten character recognition system...
The Design and Implementation of Land Management Information System (LMIS), Bauchi State Ministry of Lands and Survey
The need to collection, store, process and disseminate information about land availability, ownership and titles is a fundamental task that should be performed by any responsible agency in charge of land administration....
Human Computer Interface Through Biometric Iris Recognition System
Biometric recognition system is better reliable, roubst technique than traditional recognition system. Biometric iris recognition system is most secure and reliable than other biometric recognition system. Hence, we use...
Named Entity Recognition in Indian Languages Using Gazetteer Method and Hidden Markov Model: A Hybrid Approach
Named Entity Recognition (NER) is the task of processing text to identify and classify names, which is an important component in many Natural Language Processing (NLP) applications, enabling the extraction of useful info...