International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 123 | Views: 260 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016 | Popularity: 6.9 / 10


     

A Simulation Scheme for Improving the Data Security in Mobile Ad-hoc Network

Najiya Sultana, S. S. Sarangdevat


Abstract: With the modernization of the wireless communication system, mobile ad-hoc network (MANET) has gain a pace in the area of communication system. Conceptualized with infrastructureless networking system, every mobile nodes in MANET participate in the process of network behave both as host as well as router and therefore, it is guided by the communication principles to forward the packet to other nodes and hence formulate networking phenomenon. The area of MANET has already found its scope in Military Battlefield, Sensor Networks, Commercial Sector, Medical Service, and Personal Area Network. MANET possesses some inherent characteristics e. g. self-organizing capabilities, maximum degree of freedom, dynamic topology etc. Although, the research attempts in MANET is more than a decade old, but still commercialization of the technology are yet to be seen and therefore, due to novelty nature of the technology, MANET is also shrouded by various issues. Although, there are wide ranges of issues in MANET (Routing, power, bandwidth, Quality of Services), but the proposed study focuses on more critical issue e. g. security issues. Mobile ad-hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad-hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad- hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad- hoc networks. There is no any security provision against a Black Hole and Wormhole attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provides a new route to this node.


Keywords: MAC, AODV, Black Hole, MANET, RREP, RREQ


Edition: Volume 5 Issue 8, August 2016


Pages: 525 - 528



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Najiya Sultana, S. S. Sarangdevat, "A Simulation Scheme for Improving the Data Security in Mobile Ad-hoc Network", International Journal of Science and Research (IJSR), Volume 5 Issue 8, August 2016, pp. 525-528, https://www.ijsr.net/getabstract.php?paperid=ART2016721, DOI: https://www.doi.org/10.21275/ART2016721



Similar Articles

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1769 - 1774

Ontology Driven Information Base Facts Retrieval

Vishal Patil

Share this Article

Downloads: 105

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article
Top