International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 125

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013


Prevention of Black Hole Attack in Secure Routing Protocol

Mayuri Gajera


Abstract: Mobile Adhoc Network (MANET) consists of a collection of mobile nodes which do not require intervention of any existing infrastructure or centralized access point such as base station. MANET routing protocol are responsible for communication between mobile nodes. But MANET Routing Protocols are highly vulnerable to various attacks on layers of OSI model. Therefore security of routing protocol becomes must. This paper considers a secure routing protocol for Ad hoc on demand distance vector (AODV) routing protocol known as Identity-based key management (IKM) which is a combination of ID-based Cryptography and threshold cryptography and authenticates all routing message. Major concentration in this paper is on black hole attack. We attempt to show how black hole attack is prevented in IKM system. We use NS2 simulator to show the results for same.


Keywords: AODV, IKM, Black hole, NS2


Edition: Volume 2 Issue 6, June 2013,


Pages: 221 - 224


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Mayuri Gajera, "Prevention of Black Hole Attack in Secure Routing Protocol", International Journal of Science and Research (IJSR), Volume 2 Issue 6, June 2013, pp. 221-224, https://www.ijsr.net/get_abstract.php?paper_id=IJSRON20131136

Similar Articles with Keyword 'AODV'

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita [126] | Sunil Makkar

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty | Manimozhi Iyer

Share this Article
Top