A Securing Data Packets in MANET using R-AODV and ECC and justifying it using MATLAB

Main Article Content

Article Sidebar

Published Sep 20, 2021
Fahmina Taranum

Abstract

Securing Data Packets in MANET using R-AODV
and ECC and justifying it using MATLAB

How to Cite

Taranum, F. (2021). A Securing Data Packets in MANET using R-AODV and ECC and justifying it using MATLAB. SPAST Abstracts, 1(01). Retrieved from https://spast.org/techrep/article/view/220
Abstract 23 |

Article Details

Keywords

MANET, Blackhole Attack, R-AODV, ECC, NS-2.35

References
REFERENCES
[1] Raza, N., Aftab, M.U., Akbar, M.Q., Ashraf, O. and Irfan, M.
“Mobile Ad-Hoc Networks Applications and Its Challenges”,
Communications and Network, August 2016, Vol. 8, No. 3, pp. 131-
136.
[2] Fahmina Taranum, Ayesha Sarvat, Nooria Ali and Shamekh Siddiqui,
“Detection and Prevention of Blackhole node”, 2020, 4 th International
Conference on Electronics, Materials Engineering & Nan0-
Technology (IEMENTech), Kolkata, India, pp. 1-7.
[3] S. Geetha Uma N.Dulhare, and Siva S.Sivatha Sindhu, “Intrusion
Detection using NBHoeffding Rule based Decision Tree for Wireless
Sensor Networks”, 2018 Second International Conference on
Advances in Electronics, Computer and Communications (ICAECC-
2018).
[4] Taranum F., Khan K.U.R, “Maneuvering Black-Hole Attack Using
Different Traffic Generators in MANETs.” Intelligent Systems,
Technologies and Applications, 2020, Vol. 910. ISBN: 978-981-13-
6094-7.
[5] Chonggun Kim, Elmurod Talipov, and Byoungchul Ahn, “A Reverse
AODV Routing Protocol in Ad Hoc Mobile Networks”, EUC
Workshops 2006, 2006, LNCS 4097, pp. 522- 531.
[6] Konagala Pavani, “Routing Attacks in Mobile Ad Hoc Networks”,
International journal of network security, 2014, Vol. 6.
[7] Syeda Hajra Mahin, Fahmina Taranum, Lubna Naaz and Khalil ur
Rahman “Detection and Interception of Black Hole Attack with
Justification using Anomaly based Intrusion Detection System in
MANETs”, International Journal of Recent Technology and
Engineering, September 2019, Vol. 8, Issue:2S11, ISSN: 2277-3878.
[8] Jeenat Sultana and Tasnuva Ahmed, “Securing AOMDV Protocol in
Mobile Adhoc Network with Elliptic Curve Cryptography”,
International Conference on Electrical, Computer and
Communication Engineering (ECCE), February 16-18, 2017.
[9] Jeenat Sultana and Tasnuva Ahmed, “Elliptic Curve Cryptography
Based Data Transmission against Blackhole Attack in MANET”,
International Journal of Electrical and Computer Engineering
(IJECE), December 2018, Vol. 8, No. 6, pp. 4412- 4422.

[10] N.D. Sukirtha Priya and Mr. T. Parameswaran, “Secure Data
Transfer For MANET Using Elliptic Curve Cryptography”,
International Journal of Advanced Science and Engineering
Research, June 2017, Vol. 2, No. 1.
[11] GayatriBendale and SameekshaShrivastava, “An Improved
Blackhole Attack Detection and Prevention Method for Wireless
Ad-hoc Network”, International Conference of ICT in Business
Industry & Government (ICTBIG), 2016.
[12] Veenita and Shamsher Singh Malik, “Detection and Prevention of
Black Hole Attack in MANET”, International Journal of Scientific
Research and Management (IJSRM), 2016, Vol. 4, No. 9, pp.
4487-4493.
[13] Muhammad Imran, Farrukh Aslam Khan, Haider Abbas and
Mohsin Iftikhar, “Detection and Prevention of Black Hole Attacks
in Mobile Ad hoc Networks”, ADHOC-NOW Workshops 2014,
2015, LNCS 8629, pp. 111–122.
[14] Ashish Kumar Jain and Vrinda Tokekar, “Mitigating the effects of
Blackhole attacks on AODV routing protocol in mobile ad hoc
networks”, International Conference on Pervasive Computing
(ICPC), 2015.
[15] Ningrinla Marchang, Raja Datta, and Sajal K. Das, “A Novel
Approach for Efficient Usage of Intrusion Detection System in
Mobile Ad Hoc Networks”, IEEE Transactions on Vehicular
Technology, February 2017, Vol. 66, No. 2, pp. 1684-1695.
[16] Sunil Kumar and Kamlesh Dutta, “Intrusion detection technique
for black hole attack in mobile ad hoc networks”, International
Journal Information Privacy Security Integrity, 2015, Vol.2, pp.
81-100.
Section
GE3- Computers & Information Technology