Securing AODV Protocol against BlackholeAttacks
نویسندگان
چکیده
Mobile Ad Hoc Networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network.The nodes can form arbitrary topologies depending on their connectivity with each other in the network. These nodes have the ability to configure themselves and because of their self-configuration ability, they can be deployed urgently without the need of any infrastructure. The MANETS sufferfrom constraints in power, storage and computational resources.In addition, the pervasiveness, ubiquity and the inherentwireless nature, warrant appropriate security provisions inthese networks that becomes difficult to support, amidst the lackof sufficient resource strengths. As a result, the MANETs aremore vulnerable to various communications security relatedattacks.In this paper, therefore, we attempt to focus on analyzing andimproving the security of one of the popular routing protocol forMANET’s viz. the Ad hoc On Demand Distance Vector (AODV)routing protocol. Our focus specifically, is on ensuring thesecurity against the Blackhole Attacks. We proposemodifications to the AODV protocol and justify the solutionwith appropriate implementation and simulation using NS-2.33.Our analysis shows significant improvement in Packet DeliveryRatio (PDR) of AODV in presence of Blackhole attacks, withmarginal rise in average end-to-end
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملSecuring AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) are frequently established in insecure environments, which make them more vulnerable to attacks. These attacks are initiated by sharing malicious nodes against different services of network. The binding force in these...
متن کاملSecuring AODV against wormhole attacks in emergency MANET multimedia communications
The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all rescue teams. We use the term emergency MANETs (eMANETs) in order to describe Next Generation Networks (NGNs) which are deployed in emergency cases such as forest fires and terrorist attacks. Secure routing in MANETs is critical. Due to the absence of a central authori...
متن کاملMultipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...
متن کاملSecure Routing and Data Transmission in Mobile Ad Hoc Networks
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each pair of source-destination nodes of a MANET for securing the end-to-end transmitted dat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012