slugSec.AODV for MANETs using MD5 with Cryptography
Journal Title: International Journal of Management, IT and Engineering - Year 2011, Vol 1, Issue 6
Abstract
Mobile Ad hoc Networks (MANETs) characteristics present major vulnerabilities in security. The threats which thought-out in MANETs are due to maliciousness that intentionally disrupts the network by using variety of attacks and due to insecure routing protocols (e.g. AODV), which were developed without considering security in mind. Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Ad-hoc Networks) are frequently established in insecure environments, which make them more vulnerable to attacks. These attacks are initiated by sharing malicious nodes against different services of network. Ad-hoc On-Demand Distance Vector (AODV) is one such widely used routing protocol that is at present undergo extensive research and development. AODV is based on distance vector routing, but here the updates are shared not on a periodic basis but on an as per demand basis. The control packets contain a hopcount and sequence number field which recognizes the freshness of routing. These fields are editable, so it creates a possible susceptibility that is frequently abused by malicious nodes to advertise false better routes. As well as, transmission of routing updates in form of clear text also reveals crucial information about the network topology, which is again a probable security danger. In this paper we are presenting a novel and practical security mechanism for securing the AODV routing protocol that protects against a number of attacks carried out in MANETs. We will present message digest with secret key mechanism to secure AODV messages which is very effective and less power consuming security solution for MANETs.
Authors and Affiliations
Mr. Suketu D. Nayak and Mr. Ravindra K. Gupta
UNDERSTANDING BIG DATA IMPLICATION IN A COMPETITIVE DOMAIN
The extensive impact of the upheaval caused by Big Data and the push for Advanced Analytics worldwide is well acknowledged. There is no doubt that the industries are going on fire with the huge outbreak of data. No sec...
Performance Evaluation of Regional Rural Banks (RRBs) in India
"The future of India lies in its villages" Mahatma Ghandhi In order to stay alive in the present cutthroat atmosphere, banks should be strengthened adequately and would attain competitiveness through the use of its ob...
A Relative Study of factors and approaches for Hindi Anaphora Resolution
A literature survey on theoretical approaches of anaphora resolution system and various factors among which these approaches are based is presented in this paper. From last two decades, the significant amount of work...
slugSTRATEGIC ANALYSIS OF an MFI (Microfinance Institution): A Case Study
This case is about YVU Microfin, an MFI (Micro Finance Institution) which has been engaged in Micro Finance activities for the last 15 years. Manipur is an industrially backward state having more than 70% people living...
Evaluative Study on Consequences of Cognitive and Sensory Overload : A Socio - Psychological Perspective
We are becoming negligent or neglect per se on heavy cognitive load, due to unawareness of unconciously on the fast move towards our goals, without realising that we are closing in a mental hygiene problem, which if un...