Diminution of MANET Attacks by HOOSC Scheme
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

In this paper, an Ad-Hoc On Demand Distance Vector (AODV) protocol along with HOOSC scheme is put forward which encrypts the message to be sent and provides security for consistent routing. HOOSC algorithm allows a sender in the IBC (identity based cryptography) to send a message to a receiver in the PKI (public key infrastructure). Security in Mobile Ad-Hoc Network is an important concern for the proper functionality of network. During routing, MANET often suffers various security attacks because of the absence of clear defense algorithm. But the attacks, which can bring a large damage to MANET is called Black Hole and Grey Hole attacks. These attacks can distract the process of routing because of their direct attack on the router. Hence, several energy efficient routing algorithms and protocols are used in the previous works which are not capable efficiently to face these attacks. So HOOSC scheme is used which is very suitable to provide the security solution. In this work, the comparative analysis has been carried out by using AODV protocol without security, Message Digest algorithm and HOOSC Scheme along with AODV protocol. The simulated results show HOOSC gives better and enhanced results to mitigate the attacks in MANETs when it get modeled with HOOSC Scheme.

Keywords: Mobile Ad-Hoc Network MANET, Ad-Hoc On Demand Distance Vector AODV Protocol, Signcryption, Message Digest MD5, HOOSC Scheme, Black hole Attack, Grey hole Attack

Edition: Volume 3 Issue 10, October 2014

Pages: 177 - 183

Share this Article

How to Cite this Article?

Amanpreet Kaur, Manjot Kaur Sidhu, "Diminution of MANET Attacks by HOOSC Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT1452, Volume 3 Issue 10, October 2014, 177 - 183

67 PDF Views | 57 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile Ad-Hoc Network MANET'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 881 - 885

A Review - Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs

Hansraj Bhakte, Rahul Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 177 - 183

Diminution of MANET Attacks by HOOSC Scheme

Amanpreet Kaur, Manjot Kaur Sidhu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 146 - 148

A Review on Security Issues and Encryption Algorithms in Mobile Ad-hoc Network

Deepti Ranaut, Madal Lal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 273 - 276

Performance Evaluation of Secured Reactive Routing Protocols in MANETs

Shwetha T R, Dr Arun Biradar

Share this Article

Similar Articles with Keyword 'Black hole Attack'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2021 - 2024

An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs

Mohan Babu G, S Balaji

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 787 - 792

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Rozy Rana, Kanwal Preet Singh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 881 - 885

A Review - Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs

Hansraj Bhakte, Rahul Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2184 - 2187

Detection of Distributed Denial of Service Attack

Danveer Singh, Kalicharan Sahu

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article
Top