Securing MANETs Routing Protocol under Black Hole Attack
نویسندگان
چکیده
Wireless or mobile network is the new generation of wireless network that is different from the wired approach in many aspects like power and energy efficient routing protocols, routing configuration, network infrastructure. There are several protocols proposed for the deployment of MANETs in fields like government, military etc. In this paper we are proposing a technique to identify attack i.e. black hole attack and solution to avoid the black hole attack by discover a safe route for secure transmission. In this paper we focus on improving the security of the one of the popular MANET Routing Protocol namely as AODV.
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملAn Analysis for Black Hole Attack in AODV Protocol and Its Solution
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. MANETs are vulnerable to various attacks; black hole is one of the possible attacks. Black hole is a type of routing attack where a malicious node advertise itself as having the shortest path to all nodes in the environment by sending fake route reply. We attempt to focus on a...
متن کاملSimulation-based Security Analysis of a Reactive Ad hoc Routing Protocol under Black Hole Attacks
Security in Mobile Ad Hoc Networks (MANETs) has received lots of research attention in recent years. With the proliferation of mobile devices and the inherent characteristics of MANETs as self-organized and self-configuring networks, a great need to address security concerns in these networks have arisen. Security in these networks could be looked at from various view points with respect to dif...
متن کاملPerformance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack
There are several routing protocols that have been proposed for the possible deployment of MANETs in many fields like military, government and commercial applications. While the routing aspects of MANETs are already well understood but the research activities about the security in MANETs are still at their beginning. This paper focuses on the performance investigation of reactive and proactive ...
متن کامل