Detection and Prevention of Black Hole Attack In Ad Hoc Network Using Cryptographic (Key Exchange) Techniques
- Gursharan S Sidhu
- Rekha Garg
MANET, AODV, RREQ (Route Request), RREP (Route Reply), DH (Diffie-Hellman Technique)
Mobile ad hoc networks (MANET) are accumulations of self arranging portable nodes with different topologies and have no altered foundation or infrastructure. MANETs do not have central organization; in this technology every node performs both host like a router and forward each packet among the network in multi-hop way. Because of the focal qualities like lack of centralized monitoring, dynamic network topology, the open medium and management of all networks are not fully secure. All are venerable to various types of attacks. Ad hoc on demand vector (AODV) is one of the routing protocol being used for MANET or wireless network. Black hole attack is one example of similar attacks that is launched on AODV. In black hole attack, the malicious node draws in all packets by erroneously guaranteeing a fresh route to the destination node and ingests them without sending them to destination. AODV is applicable of both unicast and multicast routing. It builds routes between nodes only desired by source nodes. It will maintain these routes as long as needed by the sources. Furthermore AODV protocol uses the sequence numbers to make ensure of freshness of routes. It is a loop-free, self-starting, and scales of large numbers of mobile nodes. In this paper, a new solution against the Black Hole attack is projected. So in this study, we use the AODV protocol for establishing the connections and for detection we use the Diffie-Hellman Technique (with 64 bit DES key exchanges Cryptography Scheme) for key exchange.
Gursharan S Sidhu, Rekha Garg. "Detection and Prevention of Black Hole Attack In Ad Hoc Network Using Cryptographic (Key Exchange) Techniques".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.3, Issue 4, pp.1-9, URL :https://rjwave.org/ijedr/papers/IJEDR1504009.pdf
Volume 3 Issue 4
Pages. 1-9