作者
M.Sc. Dhiyab Salman M.Sc. Ali Abdulrahman , Dr. Taha Mohammed
发表日期
2015/7/7
期刊
International Journal of Advanced Research in Computer Science and Software Engineering
卷号
5
期号
7
页码范围
173-178
简介
An ad hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. Designing a foolproof security protocol for ad hoc network is a challenging task due to its unique characteristics such as, lack of central authority, frequent topology changes, rapid node mobility, shared radio channel and limited availability of resources. There are a lot of routing protocol for Ad-hoc network such as OLSR, AODV and ZRP; AODV (Ad Hoc On-Demand Distance Vector) is one of such protocols that helps to create and maintain routes in spite of the dynamic network topology. This protocol is vulnerable to a number of security threats that come from internal malicious nodes which have authorization credentials to participate in the network. Malicious nodes deliberately drop data packets and disrupt the correct operation of the routing protocol. This paper propose a security technique to detect and isolate the malicious node in the AODV routing protocol that cause black hole attack.
引用总数
2016201720182019202011211
学术搜索中的文章
MSAA Mahmood, TM Hasan, MSDS Ibrahim - International Journal of Advanced Research in …, 2015