International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 118 | Views: 175

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Survey on Security in Wireless Ad-hoc Network

Shahuraj Patil [2] | Jyoti Raghatwan [3]

Abstract: A wireless ad hoc network is a self-configuring network that is formed automatically by a collection of mobile nodes. In the wireless ad hoc network there is no centralized management. The malicious nodes can access the network, so there are many possible attacks in wireless ad hoc network. In the wireless adhoc network there a is high security risk. The adhoc networks are vulnerable to Dos attacks on the network layer. Black hole, Gray hole and worm hole attacks are the widespread attacks on adhoc networks. In a black hole attack the malicious node attracts traffic towards it and drops all packets without forwarding to the target or destination. The security of the AODV (Adhoc On-demand Distance Vector) protocol is compromised by a particular type of attack called black hole attack. . The malicious nodes disturb the data transmission in the network by transmitting false routing information. In this paper we are going to present an efficient Adhoc On-demand Distance Vector (AODV) protocol that removes the malicious node by isolating it and ensure the safe communication. In wireless adhoc network the new nodes can join or leave at any time. So, an efficient security mechanism is needed to detect malicious node. So, these nodes are to be arranged in spanning tree fashion. RSA key exchange and two encryption techniques are used among authenticated neighbors in the adhoc network to provide more security and thus avoid group rekeying problems.

Keywords: Adhoc network, AODV, Gray hole attack, Black hole attack, RSA key exchange

Edition: Volume 3 Issue 12, December 2014,

Pages: 2041 - 2044

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait