A Key Distribution and Monitoring Technique to Detect and Isolate Selective Packet Drop Attack in Ad-hoc Network
Abstract
Wireless Networking is getting extremely dominant now a day as the user need wireless connectivity irrespective of their geographical location. Ad-hoc Network is decentralized, self-organizing and autonomous wireless network in which nodes can join or leave the network whenever they require. The term Ad-hoc means no fixed infrastructure i.e. Dynamic Topology. Aside from these features, Ad-hoc Networks endures from many security issues i.e. active and passive attacks. To develop a mechanism that provides firm security and perceives the malicious node activity in the network. Allowing a secure communication between source and destination is one of major problem in ad-hoc network. This paper describes Key Distribution and Monitoring (KDAM) technique used to detect and isolate malicious node on selective path in AODV routing protocol and secure the channel. The technique provides enhancement over the previously defined methods in terms of delay, packet loss and throughput. The simulation is acted on Network Simulator-2.
Keywords
Wireless Ad hoc Networks; Dynamic Topology; Attacks; Selective Packet Drop Attack
Full Text:
PDFCopyright (c) 2015 Jaspreet Kaur, Satish Arora
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All published Articles are Open Access at https://journals.pen2print.org/index.php/ijr/
Paper submission: ijr@pen2print.org