A Key Distribution and Monitoring Technique to Detect and Isolate Selective Packet Drop Attack in Ad-hoc Network

Jaspreet Kaur, Satish Arora

Abstract


Wireless Networking is getting extremely dominant now a day as the user need wireless connectivity irrespective of their geographical location. Ad-hoc Network is decentralized, self-organizing and autonomous wireless network in which nodes can join or leave the network whenever they require. The term Ad-hoc means no fixed infrastructure i.e. Dynamic Topology. Aside from these features, Ad-hoc Networks endures from many security issues i.e. active and passive attacks. To develop a mechanism that provides firm security and perceives the malicious node activity in the network. Allowing a secure communication between source and destination is one of major problem in ad-hoc network. This paper describes Key Distribution and Monitoring (KDAM) technique used to detect and isolate malicious node on selective path in AODV routing protocol and secure the channel. The technique provides enhancement over the previously defined methods in terms of delay, packet loss and throughput. The simulation is acted on Network Simulator-2.

Keywords


Wireless Ad hoc Networks; Dynamic Topology; Attacks; Selective Packet Drop Attack

Full Text:

PDF




Copyright (c) 2015 Jaspreet Kaur, Satish Arora

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org