Detecting Sequence Number Collector Problem in Black Hole Attacks in AODV Based Mobile Adhoc Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Mobile Ad-hoc Network (MANET) is an autonomous system, where nodes/stations are connected with each other through wireless links. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing topology, lack of centralized monitoring and management point. The possible and the commonest attack in ad hoc networks is the black hole attack. In the black hole attack, a malicious node advertises itself as having the shortest path to the destination node. In the existing method a detection method based on checking the sequence number in the Route Reply message by making use of a new message originated by the destination node was developed but the drawback here is that a malicious node can play a role of sequence number collector in order to get the sequence number of as many other nodes as possible. In this Research Paper, a system is being proposed via which the sequence number collector problem is overcome by classifying the nodes into three categories based on the behavior. The malicious node is isolated from the active data forwarding and routing. The association between the nodes is used for the route selection. The scheme which is proposed in this research paper not only increases the routing security but also make the nodes cooperate among each other in the adhoc network.
Authors and Affiliations
Anand Nayyar,
Implementation Of Fully-Pipelined 16-Point DHT Architectures Using 8-Point And 4-Point DHTs for FPGA Realization
Fully–pipelined simple modular structures are presented in this project for efficient hardware realization of Discrete Hadamard transform (DHT).From the kernel matrix of HT three different pipelined modular designs...
A Comparative Analysis of Feed-Forward and Elman Neural Networks for Face Recognition Using Principal Component Analysis
Abstract—In this paper we give a comparative analysis of performance of feed forward neural network and elman neural network based face recognition. We use different inner epoch for different input pattern according to t...
On Fault Tolerance of Resources in Grid Environment
Abstract—Grid computing, most simply stated, is distributed computing taken to the next evolutionary level. The goal is to create the illusion of a simple yet large and powerful self managing virtual computer out of a...
An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks
Concerns about privacy and security have received greater attention with the rapid growth and public acceptance of the Internet and the pervasive deployment of various network technologies. Anonymous network servic...
Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks
Privacy is one of the critical issues in multi-hop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network...