dc.description.abstract |
The main goal of mobile ad hoc network (MANET) is the networking model to interconnect
communicating devices in single or multi-hop without requiring any prior infrastructure and
administrative support. These communication modalities use wireless technologies in the forms
of radio waves which are used as short as Bluetooth or as long as deep-space radio
communications.
Routing protocols are the backbone of MANET to enable the routing under dynamic
circumstances. Ad hoc on-demand distance vector (AODV) routing protocol is the predominant
reactive routing protocol designed for mobile ad hoc networks (MANETs). MANET is a self configuring network that is composed of several movable devices. Each and every node in the
network range operates by itself during the communication with each other. Also, the ad hoc
network is decentralized, with all mobile nodes functioning as routers and all wireless devices
being interconnected within communication range.
On the security issue describes that MANET is a wireless, autonomous, dynamic topology,
infrastructure-less, multi-hop communication, low cost, and ease of deployment which consists of
movable nodes. These are the main characteristics of MANET that make it vulnerable to various
denials of service attacks such as black-hole, gray-hole, flooding, etc. MANET is suffered by
security problem because of the following reasons: all signals go through bandwidth constrained wireless links in a MANET, which makes it more prone to physical security threats
than fixed wired networks. One of the main problem attacks in the MANET is black-hole attack.
Black-hole attack is a kind of denial of service attack which is active by nature. In AODV, black hole exploits the RREP feature of the AODV routing protocol. This malicious node sends RREP
messages to the source node by falsely claiming the fresh route to the destination. And then
drops all the packets pass through it. The proposed algorithm is evaluated with different
performance metrics to analyze its detecting and isolating performance. NS-2.35 is a simulation
tool used to implement and evaluate the result of the algorithm. The simulation result shows that
our approach has better performance on the packet delivery ratio, end to end delay and
throughput. |
en_US |