Prevention of Black Hole Attack in Secure Routing Protocol
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 125 | Monthly Hits: ⮙6

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Prevention of Black Hole Attack in Secure Routing Protocol

Mayuri Gajera

Mobile Adhoc Network (MANET) consists of a collection of mobile nodes which do not require intervention of any existing infrastructure or centralized access point such as base station. MANET routing protocol are responsible for communication between mobile nodes. But MANET Routing Protocols are highly vulnerable to various attacks on layers of OSI model. Therefore security of routing protocol becomes must. This paper considers a secure routing protocol for Ad hoc on demand distance vector (AODV) routing protocol known as Identity-based key management (IKM) which is a combination of ID-based Cryptography and threshold cryptography and authenticates all routing message. Major concentration in this paper is on black hole attack. We attempt to show how black hole attack is prevented in IKM system. We use NS2 simulator to show the results for same.

Keywords: AODV, IKM, Black hole, NS2

Edition: Volume 2 Issue 6, June 2013

Pages: 221 - 224

Share this Article

How to Cite this Article?

Mayuri Gajera, "Prevention of Black Hole Attack in Secure Routing Protocol", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131136, Volume 2 Issue 6, June 2013, 221 - 224

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'AODV'

Downloads: 79 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 102 | Monthly Hits: ⮙6

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Downloads: 105 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Downloads: 106 | Weekly Hits: ⮙5

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1262 - 1265

Evaluation of MANET Routing Protocols using OMNeT++

Chand Jain, Jaswinder Singh

Share this Article

Similar Articles with Keyword 'IKM'

Downloads: 110 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2472 - 2475

Mining Interaction Patterns among Brain Regions by Clustering Based Interactive K-Means

Amruta S. Chougule, S. A. Bajpai

Share this Article

Downloads: 125 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 221 - 224

Prevention of Black Hole Attack in Secure Routing Protocol

Mayuri Gajera

Share this Article

Similar Articles with Keyword 'Black hole'

Downloads: 98 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this Article

Downloads: 105 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

A MANET Security Using Routing Methodology

Shirsty Chandel, Prof. Ashish Tiwari

Share this Article

Similar Articles with Keyword 'NS2'

Downloads: 100 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1838 - 1842

Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic

Pawan Kumar, Manoj Challa

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2725 - 2726

A Survey of Location Based Services Caching for Efficient Data Access in DTN

Trupti Gedam, Archana D. Shinde

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha, Dr. Rajendra Singh Kushwah

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1742 - 1748

A MANET Security Using Routing Methodology

Shirsty Chandel, Prof. Ashish Tiwari

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this Article



Top