Skip to main content

2018 | OriginalPaper | Buchkapitel

Impact Analysis of Blackhole, Flooding, and Grayhole Attacks and Security Enhancements in Mobile Ad Hoc Networks Using SHA3 Algorithm

verfasst von : P. Ramya, T. SairamVamsi

Erschienen in: Microelectronics, Electromagnetics and Telecommunications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is the major concern in mobile ad hoc network (MANET) as it is prone to attacks due to the absence of a centralized authority, dynamic nature, limited resources, scalability, etc. This paper mainly focuses on the effects of various attacks like blackhole, grayhole, and flooding in a MANET. This paper describes the simulation study of various attacks using Ad hoc On-demand Distance Vector (AODV) routing protocol, i.e., how the attacks affect throughput and Packet Delivery Ratio (PDR) using Network Simulator (NS2). The impact of various attacks is also analyzed by increasing the number of attackers. Comparison of various attacks is also presented. The paper also focuses on security enhancements in AODV using SHA3 algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A. Bala, M. Bansal and J. Singh, “Performance Analysis of MANET under Blackhole Attack,” 2009 First International Conference on Networks & Communications, Chennai, pp. 141–145, 2009. A. Bala, M. Bansal and J. Singh, “Performance Analysis of MANET under Blackhole Attack,” 2009 First International Conference on Networks & Communications, Chennai, pp. 141–145, 2009.
2.
Zurück zum Zitat Habib, S., Saleem, S., & Saqib, K. M., “Review on MANET routing protocols and challenges”, IEEE Student Conference on Research and Development SCOReD, pp. 529–533, 2013. Habib, S., Saleem, S., & Saqib, K. M., “Review on MANET routing protocols and challenges”, IEEE Student Conference on Research and Development SCOReD, pp. 529–533, 2013.
3.
Zurück zum Zitat D. Patel and K. Chawda, “Blackhole and grayhole attacks in MANET”, International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, pp. 1–6, 2014. D. Patel and K. Chawda, “Blackhole and grayhole attacks in MANET”, International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, pp. 1–6, 2014.
4.
Zurück zum Zitat M.G. Zapata, N. Asokan, “Securing ad hoc routing protocols”, in Proceedings of ACM Workshop on Wireless Security (WiSe), Atlanta, September 2002. M.G. Zapata, N. Asokan, “Securing ad hoc routing protocols”, in Proceedings of ACM Workshop on Wireless Security (WiSe), Atlanta, September 2002.
5.
Zurück zum Zitat P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks”, in Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation (CNDS), January 2002. P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks”, in Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation (CNDS), January 2002.
6.
Zurück zum Zitat lDadaso Mane and DeepaliGothwal, “Improved Security for Attacks in MANET using AODV”, International Journal of Innovations in Engineering and Technology (IJIET), vol. 2, Issue 3, pp. 37–44, 2013. lDadaso Mane and DeepaliGothwal, “Improved Security for Attacks in MANET using AODV”, International Journal of Innovations in Engineering and Technology (IJIET), vol. 2, Issue 3, pp. 37–44, 2013.
7.
Zurück zum Zitat Erciyes, K. “Distributed Graph Algorithms for Computer Networks”, Computer Communications and Networks, London: Springer, pp. 259– 275, 2013. Erciyes, K. “Distributed Graph Algorithms for Computer Networks”, Computer Communications and Networks, London: Springer, pp. 259– 275, 2013.
8.
Zurück zum Zitat Mahmoud, Mohamed MEA, and Xuemin Sherman Shen. “Secure routing protocols”, Security for Multi-hop Wireless Networks. Springer International Publishing, pp. 63–93, 2014. Mahmoud, Mohamed MEA, and Xuemin Sherman Shen. “Secure routing protocols”, Security for Multi-hop Wireless Networks. Springer International Publishing, pp. 63–93, 2014.
9.
Zurück zum Zitat Ahmed, K. Abu Bakar, M. Channa, K. Haseeb and A. Khan, “A survey on trust based detection and isolation of malicious nodes in adhoc and sensor networks”, Frontiers of Computer Science, vol. 9, no. 2, pp. 280–296, 2015. Ahmed, K. Abu Bakar, M. Channa, K. Haseeb and A. Khan, “A survey on trust based detection and isolation of malicious nodes in adhoc and sensor networks”, Frontiers of Computer Science, vol. 9, no. 2, pp. 280–296, 2015.
10.
Zurück zum Zitat S. Abdel Hamid, H. Hassanein and G. Takahara, “Routing for Wireless Multi-Hop Networks: Unifying Features”, SpringerBriefs in Computer Science, pp. 11–23, 2013. S. Abdel Hamid, H. Hassanein and G. Takahara, “Routing for Wireless Multi-Hop Networks: Unifying Features”, SpringerBriefs in Computer Science, pp. 11–23, 2013.
11.
Zurück zum Zitat Nuha A.S. Alwan, Alaaa S. Mahmood, “Distributed Gradient Descent Localization in Wireless Sensor Networks”, Arabian Journal for Science and Engineering (Arab J Sci Eng), Technical note on Electrical Engineering, March 2015, Volume 40, Issue 3, pp 893–899. Nuha A.S. Alwan, Alaaa S. Mahmood, “Distributed Gradient Descent Localization in Wireless Sensor Networks”, Arabian Journal for Science and Engineering (Arab J Sci Eng), Technical note on Electrical Engineering, March 2015, Volume 40, Issue 3, pp 893–899.
Metadaten
Titel
Impact Analysis of Blackhole, Flooding, and Grayhole Attacks and Security Enhancements in Mobile Ad Hoc Networks Using SHA3 Algorithm
verfasst von
P. Ramya
T. SairamVamsi
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7329-8_65

Neuer Inhalt