Survey on Security in Wireless Ad-hoc Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 118 | Views: 275

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.3 / 10


     

Survey on Security in Wireless Ad-hoc Network

Shahuraj Patil, Jyoti Raghatwan


Abstract: A wireless ad hoc network is a self-configuring network that is formed automatically by a collection of mobile nodes. In the wireless ad hoc network there is no centralized management. The malicious nodes can access the network, so there are many possible attacks in wireless ad hoc network. In the wireless adhoc network there a is high security risk. The adhoc networks are vulnerable to Dos attacks on the network layer. Black hole, Gray hole and worm hole attacks are the widespread attacks on adhoc networks. In a black hole attack the malicious node attracts traffic towards it and drops all packets without forwarding to the target or destination. The security of the AODV (Adhoc On-demand Distance Vector) protocol is compromised by a particular type of attack called black hole attack. . The malicious nodes disturb the data transmission in the network by transmitting false routing information. In this paper we are going to present an efficient Adhoc On-demand Distance Vector (AODV) protocol that removes the malicious node by isolating it and ensure the safe communication. In wireless adhoc network the new nodes can join or leave at any time. So, an efficient security mechanism is needed to detect malicious node. So, these nodes are to be arranged in spanning tree fashion. RSA key exchange and two encryption techniques are used among authenticated neighbors in the adhoc network to provide more security and thus avoid group rekeying problems.


Keywords: Adhoc network, AODV, Gray hole attack, Black hole attack, RSA key exchange


Edition: Volume 3 Issue 12, December 2014


Pages: 2041 - 2044



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Shahuraj Patil, Jyoti Raghatwan, "Survey on Security in Wireless Ad-hoc Network", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 2041-2044, https://www.ijsr.net/getabstract.php?paperid=SUB14918, DOI: https://www.doi.org/10.21275/SUB14918

Similar Articles

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Downloads: 105

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this Article
Top