Open Access   Article Go Back

Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET

Meenakshi Jamgade1 , Vimal Shukla2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-2 , Page no. 145-150, Feb-2016

Online published on Feb 29, 2016

Copyright © Meenakshi Jamgade , Vimal Shukla . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Meenakshi Jamgade , Vimal Shukla , “Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.145-150, 2016.

MLA Style Citation: Meenakshi Jamgade , Vimal Shukla "Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET." International Journal of Computer Sciences and Engineering 4.2 (2016): 145-150.

APA Style Citation: Meenakshi Jamgade , Vimal Shukla , (2016). Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET. International Journal of Computer Sciences and Engineering, 4(2), 145-150.

BibTex Style Citation:
@article{Jamgade_2016,
author = {Meenakshi Jamgade , Vimal Shukla },
title = {Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2016},
volume = {4},
Issue = {2},
month = {2},
year = {2016},
issn = {2347-2693},
pages = {145-150},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=814},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=814
TI - Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - Meenakshi Jamgade , Vimal Shukla
PY - 2016
DA - 2016/02/29
PB - IJCSE, Indore, INDIA
SP - 145-150
IS - 2
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1548 1388 downloads 1479 downloads
  
  
           

Abstract

Mobile Ad hoc Network (MANET) is a new field of communication operating in an extremely unpredictable and dynamic environment. These networks are gaining increasing popularity in recent years because of their ease of deployment. A MANET consists of collection of wireless mobile nodes that are capable of communicating with each other without the use of any network or any centralized administration. In ad hoc networks, routing protocols are challenged with establishing and maintaining multi-hop routes with security in the face of mobility, bandwidth limitation and power constraints. In particular in MANET, any node may be compromise the routing protocol functionality by disrupting the route discovery process. To achieve broad protection and desirable network performance, routing security is unavoidable. In this research work, a secure routing protocol for MANET is designed with the countermeasures to reduce or eliminate different types of security vulnerabilities and attacks. This paper provides routing security to the Ad hoc on demand Distance Vector (AODV) routing protocol by eliminating the threat of Black Hole attack, Wormhole attack, Rushing attack, and Impersonation attack. The proposed solutions are tested using Network Simulator2 (NS2), a scalable network simulator. The performance is studied for in various routing parameters such as packet delivery ratio, average end - to - end delay and routing overhead and are compared with the AODV and DSR. Hence we have known Cryptographic algorithm such as RSA (Rivest Shamir Adleman) Algorithm is used for providing a secure routing between mobile nodes even in the presence of malicious nodes .In brief, this paper presents a counter measure to overcome Black hole attack.

Key-Words / Index Term

Wireless Ad-Hoc Network, Blackhole Attack, Tunnel, Performance Analysis, Routing Protocol, MANET Security

References

[1] Perkins and Royer,E. “Ad-hoc On-Demand Distance Vector Routing,” Second IEEE Workshop on Mobile Computer Systems and Applications, pp. 90-100, February 1999.
[2] Haas, Pearlman, and Samar. ZRP IEFT-MANET DRAFT, 5 Edition, July 2002.
[3] Razak, A. S., Furnell, M. and Brooke, P. J. "Attacks against Mobile Ad-hoc Networks Routing Protocols," 2004.
[4] Sanzgiri. K., LaFlammey, D., Dahilly,B.(2002). Authenticated Routing for Ad hoc Networks, IEEE, 2002
[5] Abbas, S., Merabti, M., Jones, D.L., Kifayat, K., Lightweight Sybil Attack Detection in MANETs, IEEE Systems Journal, Vol. 7, No. 2, 2013
[6] Guan, Q., Yu, F.R., Jiang, S., Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications, IEEE Transactions on vehicular technology, Vol. 61, No. 6, July 2012
[7] Ming-Yang, S. “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems”, Computer communications, Vol.34, No.1, pp.107-117, 2010.
[8] Gupta, S., Gill, S. and Joshi, A. “Analysis of Black Hole Attack on AODV and OLSR Routing Protocols in MANET”, International journal of Computer application, Issue 1, Vol 1, pp. 11 – 19,October 2011.
[9] Zapata, M.G. “ Secure Ad-hoc On-Demand Distance Vector Routing”, Mobile Computing and Communications Review, Volume 6, Number 3, pp. 106 – 107.(2002).

[10] Khalil, Bagchi,S. andShroff,N.B. “LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks, in: International Conference on Dependable Systems and Networks (DSN), 2005, pp. 612–621.
[11] Kannhavong,B.,Nakayama,H., Nemoto,Y. and Kato, N.“A Survey Of Routing Attacks In Mobile Ad-hoc Networks”, IEEE Wireless Communications , pp. 85- 91,October 2007.
[12] Putra, S. “An overview of mobile ad hoc networks for the existing protocols and applications”, International journal on applications of graph theory in wireless ad hoc networks and sensor networks, Vol.2, No.1, pp.87-110, 2010.
[13] Rakesh kumar Sahu,Narendra S chaudhari “performance evaluation of ad hoc network under black hole attack 978-1-4673-4805- 8/$31.00, IEEE 2012
[14] Prasad lokulwar* and vivek shelkhe, “Security aware routing protocol for MANET using asymmetric cryptography using RSA algorithm”, BIO-INFO Security Informatics ISSN: 2249-9423 &E-ISSN: 2249-9431, Volume 2, Issue 1, pp.-11-14. 2012.
[15] Kameswari Chebrolu “NS2 Tutorial” Dept. of Computer Science and Engineering, IIT Bombay.