MODIFIED AODV TO ELIMINATE THE EFFECTS OF BLACK HOLE NODE IN MANET
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 4
Abstract
Mobile Adhoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. So security in MANET is a complex issue. There are many routing protocols that establish the routes between the nodes in the network. The control towards the management of the nodes in the MANET is distributed. This feature does not give assurance towards the security aspects of the network. There are many routing attacks caused due to lack of security. In this paper, therefore, we attempt to focus on analyzing and improving the security of one of the popular routing protocol for MANET viz. the Adhoc On Demand Distance Vector (AODV) routing protocol. Our focus specifically, is on ensuring the security against the Black hole Attack. A black hole is a malicious node that falsely replies for any Route Requests (RREQ) without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. The proposed solution is capable of eliminating the effect of presence of black hole nodes in the MANET. The simulation study is performed using Network Simulator NS-2.34.
Authors and Affiliations
V. Tamizhazhagan , P. Manjamadevy , R. Tamil Nilavu
Improvement of performance of web crawlers for efficient web searching and crawling
The effectiveness of a crawler directly affects the efficiency of the searching quality of the web search engines. As the crawler interacts with billions of hosts or servers over a period of weeks or months, the issues o...
PEER TO PEER ASSOCIATION IN CONTENT DISTRIBUTION NETWORK
The troublesome issue of method associated implementing an economical law for load reconciliation in Content Delivery Networks (CDNs). We have a tendency to tend to base our proposal on a correct study of a CDN system, d...
Power-Time Efficient Algorithm for Computing Reconfigurable FFT in Wireless Sensor Network
Wireless sensor network have several constraints, such as a short transmission range, poor processing capabilities, limited available power and slow execution time. The design of algorithms for fast processing of informa...
Movement Evaluation Algorithm for video coding in Video Compression
The increase demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital video technology a necessity. A problem, however, i...
Design and Comparative Analysis of CMOS Full Adder Cells Using Tanner EDA Tool
The binary adders are the fundamental and key component in digital signal processors, general purpose microprocessors and data-processing application specific integrated circuits. Therefore, binary adders are crucial bui...