Diminution of MANET Attacks by HOOSC Scheme
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

In this paper, an Ad-Hoc On Demand Distance Vector (AODV) protocol along with HOOSC scheme is put forward which encrypts the message to be sent and provides security for consistent routing. HOOSC algorithm allows a sender in the IBC (identity based cryptography) to send a message to a receiver in the PKI (public key infrastructure). Security in Mobile Ad-Hoc Network is an important concern for the proper functionality of network. During routing, MANET often suffers various security attacks because of the absence of clear defense algorithm. But the attacks, which can bring a large damage to MANET is called Black Hole and Grey Hole attacks. These attacks can distract the process of routing because of their direct attack on the router. Hence, several energy efficient routing algorithms and protocols are used in the previous works which are not capable efficiently to face these attacks. So HOOSC scheme is used which is very suitable to provide the security solution. In this work, the comparative analysis has been carried out by using AODV protocol without security, Message Digest algorithm and HOOSC Scheme along with AODV protocol. The simulated results show HOOSC gives better and enhanced results to mitigate the attacks in MANETs when it get modeled with HOOSC Scheme.

Keywords: Mobile Ad-Hoc Network MANET, Ad-Hoc On Demand Distance Vector AODV Protocol, Signcryption, Message Digest MD5, HOOSC Scheme, Black hole Attack, Grey hole Attack

Edition: Volume 3 Issue 10, October 2014

Pages: 177 - 183

Share this Article

How to Cite this Article?

Amanpreet Kaur, Manjot Kaur Sidhu, "Diminution of MANET Attacks by HOOSC Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT1452, Volume 3 Issue 10, October 2014, 177 - 183

144 PDF Views | 122 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile Ad-Hoc Network MANET'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 881 - 885

A Review - Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs

Hansraj Bhakte, Rahul Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 273 - 276

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R, Dr Arun Biradar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 146 - 148

A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network

Deepti Ranaut, Madal Lal

Share this Article

Similar Articles with Keyword 'Black hole Attack'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1815 - 1819

Survey on Secure and Reliable Data Routing in WSN

Trupti Anil Bomble, M. D. Ingle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

A MANET Security Using Routing Methodology

Shirsty Chandel, Prof. Ashish Tiwari

Share this Article
Top