Detection and Prevention of Black Hole Attack In Ad Hoc Network Using Cryptographic (Key Exchange) Techniques
نویسندگان
چکیده
Mobile ad hoc networks (MANET) are accumulations of self arranging portable nodes with different topologies and have no altered foundation or infrastructure. MANETs do not have central organization; in this technology every node performs both host like a router and forward each packet among the network in multi-hop way. Because of the focal qualities like lack of centralized monitoring, dynamic network topology, the open medium and management of all networks are not fully secure. All are venerable to various types of attacks. Ad hoc on demand vector (AODV) is one of the routing protocol being used for MANET or wireless network. Black hole attack is one example of similar attacks that is launched on AODV. In black hole attack, the malicious node draws in all packets by erroneously guaranteeing a fresh route to the destination node and ingests them without sending them to destination. AODV is applicable of both unicast and multicast routing. It builds routes between nodes only desired by source nodes. It will maintain these routes as long as needed by the sources. Furthermore AODV protocol uses the sequence numbers to make ensure of freshness of routes. It is a loop-free, self-starting, and scales of large numbers of mobile nodes. In this paper, a new solution against the Black Hole attack is projected. So in this study, we use the AODV protocol for establishing the connections and for detection we use the Diffie-Hellman Technique (with 64 bit DES key exchanges Cryptography Scheme) for key exchange. Index Terms – MANET, AODV, RREQ (Route Request), RREP (Route Reply), DH (Diffie-Hellman Technique). ________________________________________________________________________________________________________
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملSurvey on Black Hole Detection and Prevention in MANET
Mobile ad hoc network (MANET) is a self-implemented network of mobile nodes formed anytime and anywhere without the help of a centralized management. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared to wired network or infrastructure-based wi...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015