An Approach for Secure Path Establishment in MANET using Diffie-Hellman Algorithm after Isolating Black Hole Attack

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-23 Number-1
Year of Publication : 2015
Authors : ManishaRaj, Vishal Shrivastava
  10.14445/22312803/IJCTT-V23P109

MLA

ManishaRaj, Vishal Shrivastava "An Approach for Secure Path Establishment in MANET using Diffie-Hellman Algorithm after Isolating Black Hole Attack". International Journal of Computer Trends and Technology (IJCTT) V23(1):39-45, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Wireless networks are becoming very prevalent now a day as the users need wireless connectivity regardless of their geographical location. Mobile ad-hoc network is decentralized, self-configurable and autonomous wireless network in which mobile nodes can join or leave the network any time. The term ad-hoc means no fixed infrastructure i.e. Dynamic Topology. Apart from these features, MANET suffers from many security issues viz. external and internal attacks. Providing a secure communication between source and destination is one of the major problem in Manet. This paper describes a novel technique for establishing a secure path from source to destination by using Diffie- Hellman algorithm. This is done after isolation of black hole attack. Simulation results are shown for packet delay and packet loss for different number of nodes. The technique provides improvement over the previously defined methods in terms of delay and packet loss. The simulation is done on Network Simulator-2.

References
[1] Satoshi Kurosawa1, Hidehisa Nakayama1, Nei Kato1, Abbas Jamalipour2, and Yoshiaki Nemoto1 “Detecting Black hole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method” International Journal of Network Security, Vol.5, No.3, Nov. 2007 pp: 338-346
[2] Nitesh A. Funde, P. R. Pardhi, ” Detection & Prevention Techniques to Black & Gray Hole Attacks In MANET”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 10, October 2013, ISSN (Print) : 2319-5940, pp. 4132-4136
[3] Giovanni VignaSumitGwalaniKavitha Srinivasan Elizabeth M. Belding-Royer Richard A. Kemmerer, “An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks”, Computer Security Applications Conference,IEEE 2004, ISSN- 1063-9527, pp. 16-27
[4] JeroenHoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges”, Journal of The Communication Network 2004, Volume 3, ISSN 1477-4739, pp. 60-66
[5] Suparna Biswas, Tanumoy Nag, SarmisthaNeogy, “Trust Based Energy Efficient Detection and Avoidance of Black Hole Attack to Ensure Secure Routing in MANET”, Applications and innovations in mobile computing, 2014, (AIMoC), pp.157-164
[6] Himani Yadav, Rakesh Kumar, “ A Review on Black Hole Attack in MANETs”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 3, May-Jun 2012, pp.1126-1131
[7] Gagandeep, Aashima, Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack AReview”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012, pp. 269-275
[8] Anjaly Joy, Sijo Cherian, “BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR”, International Journal of Computer Science & Engineering Technology (IJCSET), ISSN: 2229-3345 Vol. 4 No. 06 Jun 2013, pp. 740-745
[9] ChanderDiwaker, ChanchalAghi, Kulvinder Singh, “Detection and Prevention of Black hole Attack in MANET: A Review”, International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), ISSN (Print): 2279-0047, 2013, pp. 294-297
[10] Mehdi Medadian, Ahmad Mebadi, ElhamShahri, “Combat with Black Hole Attack in AODV Routing Protocol”. Proceedings of the 2009 IEEE 9th Malaysia International Conference on Communications, 15 -17 December 2009 Kuala Lumpur Malaysia, pp. 530-535

Keywords
Dynamic Topology, Autonomous, AODV, flooding, black hole, Ad-Hoc.