Downloads: 118 | Views: 275
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.3 / 10
Survey on Security in Wireless Ad-hoc Network
Shahuraj Patil, Jyoti Raghatwan
Abstract: A wireless ad hoc network is a self-configuring network that is formed automatically by a collection of mobile nodes. In the wireless ad hoc network there is no centralized management. The malicious nodes can access the network, so there are many possible attacks in wireless ad hoc network. In the wireless adhoc network there a is high security risk. The adhoc networks are vulnerable to Dos attacks on the network layer. Black hole, Gray hole and worm hole attacks are the widespread attacks on adhoc networks. In a black hole attack the malicious node attracts traffic towards it and drops all packets without forwarding to the target or destination. The security of the AODV (Adhoc On-demand Distance Vector) protocol is compromised by a particular type of attack called black hole attack. . The malicious nodes disturb the data transmission in the network by transmitting false routing information. In this paper we are going to present an efficient Adhoc On-demand Distance Vector (AODV) protocol that removes the malicious node by isolating it and ensure the safe communication. In wireless adhoc network the new nodes can join or leave at any time. So, an efficient security mechanism is needed to detect malicious node. So, these nodes are to be arranged in spanning tree fashion. RSA key exchange and two encryption techniques are used among authenticated neighbors in the adhoc network to provide more security and thus avoid group rekeying problems.
Keywords: Adhoc network, AODV, Gray hole attack, Black hole attack, RSA key exchange
Edition: Volume 3 Issue 12, December 2014
Pages: 2041 - 2044
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 80
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Downloads: 102
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 895 - 900Secured Greedy Geographical Reliable Reactive Routing for WSN
Bhramitha B Shetty, Manimozhi Iyer
Downloads: 105
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1448 - 1453Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator
Anil, Dr. Sudesh Kumar
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1823 - 1826Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2
Manju Ojha, Dr. Rajendra Singh Kushwah