Downloads: 123 | Views: 260 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016 | Popularity: 6.9 / 10
A Simulation Scheme for Improving the Data Security in Mobile Ad-hoc Network
Najiya Sultana, S. S. Sarangdevat
Abstract: With the modernization of the wireless communication system, mobile ad-hoc network (MANET) has gain a pace in the area of communication system. Conceptualized with infrastructureless networking system, every mobile nodes in MANET participate in the process of network behave both as host as well as router and therefore, it is guided by the communication principles to forward the packet to other nodes and hence formulate networking phenomenon. The area of MANET has already found its scope in Military Battlefield, Sensor Networks, Commercial Sector, Medical Service, and Personal Area Network. MANET possesses some inherent characteristics e. g. self-organizing capabilities, maximum degree of freedom, dynamic topology etc. Although, the research attempts in MANET is more than a decade old, but still commercialization of the technology are yet to be seen and therefore, due to novelty nature of the technology, MANET is also shrouded by various issues. Although, there are wide ranges of issues in MANET (Routing, power, bandwidth, Quality of Services), but the proposed study focuses on more critical issue e. g. security issues. Mobile ad-hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad-hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad- hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad- hoc networks. There is no any security provision against a Black Hole and Wormhole attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provides a new route to this node.
Keywords: MAC, AODV, Black Hole, MANET, RREP, RREQ
Edition: Volume 5 Issue 8, August 2016
Pages: 525 - 528
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 80
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Downloads: 102
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 895 - 900Secured Greedy Geographical Reliable Reactive Routing for WSN
Bhramitha B Shetty, Manimozhi Iyer
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016
Pages: 1769 - 1774Ontology Driven Information Base Facts Retrieval
Vishal Patil
Downloads: 105
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1448 - 1453Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator
Anil, Dr. Sudesh Kumar