Skip to main content
Top

2021 | OriginalPaper | Chapter

Impact Analysis of Black Hole, Flooding Attacks and Enhancements in MANET Using SHA-3 Keccak Algorithm

Authors : T. Sairam Vamsi, T. Sudheer Kumar, M. Vamsi Krishna

Published in: Microelectronics, Electromagnetics and Telecommunications

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In present-day wireless communication scenario, Mobile ad hoc network (MANET) plays a very important role, as it consists of many autonomous nodes which communicate together to form a proper communication network. Each node in a network will move in random path, so that nodes direction will change frequently. But, some of the nodes may misbehave which leads to many problems in that network. These nodes are called as malicious nodes which create severe data loss by dropping data packets, and network may loss its privacy due to these intruders. So, providing security is the major challenge, because the networks are more vulnerable to many attacks. Some major attacks like flooding and black hole affect the E2E delay, packet delivery ratio (PDR), and throughput of the network. So, this paper mainly explains on enhancements in security in AODV using efficient techniques called SHA-3 Keccak and dynamic threshold routing algorithm.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International conference on electrical and information technologies (ICEIT), tangiers, pp 536–542 Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International conference on electrical and information technologies (ICEIT), tangiers, pp 536–542
2.
go back to reference Ramya P, SairamVamsi T (2018) Impact analysis of blackhole, flooding, and grayhole attacks and security enhancements in mobile ad hoc networks using SHA3 algorithm. In: Anguera J, Satapathy S, Bhateja V, Sunitha K (eds) Microelectronics, electromagnetics and telecommunications. Lecture notes in electrical engineering, vol 471. Springer, Singapore; Fahmy AHH, Bahaa-Eldin A (2015) Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. Wirel Netw 21(2):467–483 Ramya P, SairamVamsi T (2018) Impact analysis of blackhole, flooding, and grayhole attacks and security enhancements in mobile ad hoc networks using SHA3 algorithm. In: Anguera J, Satapathy S, Bhateja V, Sunitha K (eds) Microelectronics, electromagnetics and telecommunications. Lecture notes in electrical engineering, vol 471. Springer, Singapore; Fahmy AHH, Bahaa-Eldin A (2015) Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. Wirel Netw 21(2):467–483
3.
go back to reference Mane Dadaso, Gothwal Deepali (2013) Improved security for attacks in MANET using AODV. Int J Innov Eng Technol (IJIET) 2(3):37–44 Mane Dadaso, Gothwal Deepali (2013) Improved security for attacks in MANET using AODV. Int J Innov Eng Technol (IJIET) 2(3):37–44
4.
go back to reference Mahmoud MMEA, Shen XS (2014) Secure routing protocols. Security for multi-hop wireless networks. Springer, New York, pp 63–93CrossRef Mahmoud MMEA, Shen XS (2014) Secure routing protocols. Security for multi-hop wireless networks. Springer, New York, pp 63–93CrossRef
5.
go back to reference Zhao Z, Hu H, Ahn GJ, Wu R (2010) Risk aware mitigation for MANET routing attacks. IEEE Trans Dependable Secur Comput 9(2):250–260CrossRef Zhao Z, Hu H, Ahn GJ, Wu R (2010) Risk aware mitigation for MANET routing attacks. IEEE Trans Dependable Secur Comput 9(2):250–260CrossRef
6.
go back to reference Tseng F-H, Chou L-D, Chao H-C (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Hum-Centric Comput Inf Sci 1(1):1–16CrossRef Tseng F-H, Chou L-D, Chao H-C (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Hum-Centric Comput Inf Sci 1(1):1–16CrossRef
7.
go back to reference Yi P et al (2005) A new routing attack in mobile ad hoc networks. Int’l J Info Tech 11(2) Yi P et al (2005) A new routing attack in mobile ad hoc networks. Int’l J Info Tech 11(2)
8.
go back to reference Palanisamy V, Annadurai P (2009) Impact of rushing attack on multicast in mobile ad hoc network. Int J Comput Sci Inf Secur 4(1–2) Palanisamy V, Annadurai P (2009) Impact of rushing attack on multicast in mobile ad hoc network. Int J Comput Sci Inf Secur 4(1–2)
9.
go back to reference Shanmuganathan V, Anand T (2012) A survey on gray hole attack in MANET. IRACST–Int J Comput Netw Wirel Commun (IJCNWC) 2250–3501 Shanmuganathan V, Anand T (2012) A survey on gray hole attack in MANET. IRACST–Int J Comput Netw Wirel Commun (IJCNWC) 2250–3501
10.
go back to reference Mahajan V, Natu M, Sethi A (2008) Analysis of wormhole intrusion attacks in MANETs. In: IEEE military communications conference, pp 1–7 Mahajan V, Natu M, Sethi A (2008) Analysis of wormhole intrusion attacks in MANETs. In: IEEE military communications conference, pp 1–7
Metadata
Title
Impact Analysis of Black Hole, Flooding Attacks and Enhancements in MANET Using SHA-3 Keccak Algorithm
Authors
T. Sairam Vamsi
T. Sudheer Kumar
M. Vamsi Krishna
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-3828-5_12