MODIFIED AODV TO ELIMINATE THE EFFECTS OF BLACK HOLE NODE IN MANET
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 4
Abstract
Mobile Adhoc Network (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. So security in MANET is a complex issue. There are many routing protocols that establish the routes between the nodes in the network. The control towards the management of the nodes in the MANET is distributed. This feature does not give assurance towards the security aspects of the network. There are many routing attacks caused due to lack of security. In this paper, therefore, we attempt to focus on analyzing and improving the security of one of the popular routing protocol for MANET viz. the Adhoc On Demand Distance Vector (AODV) routing protocol. Our focus specifically, is on ensuring the security against the Black hole Attack. A black hole is a malicious node that falsely replies for any Route Requests (RREQ) without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. The proposed solution is capable of eliminating the effect of presence of black hole nodes in the MANET. The simulation study is performed using Network Simulator NS-2.34.
Authors and Affiliations
V. Tamizhazhagan , P. Manjamadevy , R. Tamil Nilavu
A HYBRID FRAGILE HIGH CAPACITY WATERMARKING TECHNIQUE WITH TEMPLATE MATCHING DETECTION SCHEME.
With the rapid growth in the development of digital content, the terms security and privacy are very challenging issues. Watermarking is a broad interesting field which provides way in hiding an informal or formal data i...
A Specialized Approach for Video Web- Apps without Using Plug-Ins for Smart TVs
Internet is necessity of every client and services of internet applications. It becomes an important part of daily life. Suppose end-user wants to see any movie content on the internet if it is low acceleration then no n...
EFS: Enhanced FACES Protocol for Secure Routing In MANET
Mobile Ad-hoc Network (MANET) is an autonomous system of mobile hosts equipped with wireless communication devices. These mobile nodes can form a network anywhere and at anytime. But the topology of the network thereby f...
Enhancement of Image Quality in MATLAB Environment – Super-Resolution
The Super-Resolution is one of main topics in image processing many applications in past, recent today’s and future. This paper focuses on super resolution of images using difreent type of Enhancment of Image Quality in...
A Taxonomy of High Level Software Clones
The idea of software clones is linked with similarity, which can occur at various levels of abstraction. Simple clones i.e. clones at lower levels of abstraction are classified in literature, however; high level clones a...