Downloads: 125 | Views: 263
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013 | Popularity: 6.6 / 10
Prevention of Black Hole Attack in Secure Routing Protocol
Mayuri Gajera
Abstract: Mobile Adhoc Network (MANET) consists of a collection of mobile nodes which do not require intervention of any existing infrastructure or centralized access point such as base station. MANET routing protocol are responsible for communication between mobile nodes. But MANET Routing Protocols are highly vulnerable to various attacks on layers of OSI model. Therefore security of routing protocol becomes must. This paper considers a secure routing protocol for Ad hoc on demand distance vector (AODV) routing protocol known as Identity-based key management (IKM) which is a combination of ID-based Cryptography and threshold cryptography and authenticates all routing message. Major concentration in this paper is on black hole attack. We attempt to show how black hole attack is prevented in IKM system. We use NS2 simulator to show the results for same.
Keywords: AODV, IKM, Black hole, NS2
Edition: Volume 2 Issue 6, June 2013
Pages: 221 - 224
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 99
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2176 - 2178Detection & Removal of Co-operative Blackhole Attack in MANETs
Mayuri Ghorpade, Prof. S. P. Medhane
Downloads: 100
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1838 - 1842Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic
Pawan Kumar, Manoj Challa
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2725 - 2726A Survey of Location Based Services Caching for Efficient Data Access in DTN
Trupti Gedam, Archana D. Shinde
Downloads: 105
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1448 - 1453Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator
Anil, Dr. Sudesh Kumar