Dr Securing Data Packets in MANET using R-AODV and ECC and justifying it using MATLAB

Main Article Content

Article Sidebar

Published Oct 21, 2021
Fahmina Taranum

Abstract

Abstract—MANET is a wireless communication network with a set of mobile nodes that are temporarily connected without any infrastructure. Nodes in MANETs can either serve as a host or as a router and can travel independently in any direction because of their dynamic topology. The clex nature of MANETs makes the network vulnerable i.e., unstableness and accessibility to attacks, thereby making it insecure at node and transmission level. Thus, seeking a safe and trustworthy end-to-end path in a MANET is a real challenge for secure and successful transmission. The R-AODV routing protocol along with the Elliptic Curve Cryptography algorithm is implemented to detect and to prevent the blackhole attack by securing the data packet transmission against the Blackhole attack in MANET using encryption and decryption techniques. The purpose of the proposal is to increase the security of the data transmitted over the network through this encryption approach. The performance of this proposed system is simulated by using the NS-2.35 network simulator.  As AODV is the most widely used protocol for routing in Adhoc networks, providing security to this insecure protocol becomes objective of this proposal. The Simulation results show that the proposed protocol provides good experimental results on various metrics. Most of the recent research is on making AODV secure by using cryptographic techniques. The proposal in this paper is to use the reverse AODV technique for data transmission and ECC for secured data delivery. The generated results are then tested and trained in MATLAB for justification using machine learning classifiers to check the appropriateness of the results.

 

 

How to Cite

Taranum, F. (2021). Dr Securing Data Packets in MANET using R-AODV and ECC and justifying it using MATLAB. SPAST Abstracts, 1(01). Retrieved from https://spast.org/techrep/article/view/2875
Abstract 63 |

Article Details

Keywords

Index — MANET, Blackhole Attack, A-ODV, R-AODV, ECC, NS-2.35, MATLAB.

References
1. Raza, N., Aftab, M.U., Akbar, M.Q., Ashraf, O. and Irfan, M. “Mobile Ad-Hoc Networks Applications and Its Challenges”, Communications and Network, , Vol. 8, No. 3, pp. 131-136. (August 2016).

2. Fahmina Taranum, Ayesha Sarvat, Nooria Ali and Shamekh Siddiqui, “Detection and Prevention of Blackhole node”, 4th International Conference on Electronics, Materials Engineering & Nan0-Technology (IEMENTech), Kolkata, India, pp. 1-7.(2020)

3. S. Geetha Uma N.Dulhare, and Siva S.Sivatha Sindhu, “Intrusion Detection using NBHoeffding Rule based Decision Tree for Wireless Sensor Networks”, Second International Conference on Advances in Electronics, Computer and Communications (ICAECC-2018).

4. Taranum F., Khan K.U.R, “Maneuvering Black-Hole Attack Using Different Traffic Generators in MANETs.” Intelligent Systems, Technologies and Applications, Vol. 910. ISBN: 978-981-13-6094-7, (2020)

5. Chonggun Kim, Elmurod Talipov, and Byoungchul Ahn, “A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks”, EUC Workshops, LNCS 4097, pp. 522- 531, (2006)

6. Konagala Pavani, “Routing Attacks in Mobile Ad Hoc Networks”, International journal of Network Security, Vol. 6.,(2014).

7. Syeda Hajra Mahin, Fahmina Taranum, Lubna Naaz and Khalil ur Rahman “Detection and Interception of Black Hole Attack with Justification using Anomaly based Intrusion Detection System in MANETs”, International Journal of Recent Technology and Engineering, Vol. 8, Issue:2S11, ISSN: 2277-3878, September (2019)

8. Jeenat Sultana and Tasnuva Ahmed, “Securing AOMDV Protocol in Mobile Adhoc Network with Elliptic Curve Cryptography”, International Conference on Electrical, Computer and Communication Engineering (ECCE), February 16-18, (2017).

9. Jeenat Sultana and Tasnuva Ahmed, “Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET”, International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, No. 6, pp. 4412- 4422, (December 2018).

10. N.D. Sukirtha Priya and Mr. T. Parameswaran, “Secure Data Transfer For MANET Using Elliptic Curve Cryptography”, International Journal of Advanced Science and Engineering Research, , Vol. 2, No. 1, (June 2017).

11. GayatriBendale and SameekshaShrivastava, “An Improved Blackhole Attack Detection and Prevention Method for Wireless Ad-hoc Network”, International Conference of ICT in Business Industry & Government (ICTBIG), (2016).

12. Veenita and Shamsher Singh Malik, “Detection and Prevention of Black Hole Attack in MANET”, International Journal of Scientific Research and Management (IJSRM), Vol. 4, No. 9, pp. 4487-4493,(2016).

13. Muhammad Imran, Farrukh Aslam Khan, Haider Abbas and Mohsin Iftikhar, “Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks”, ADHOC-NOW Workshops, LNCS 8629, pp. 111–122, (2014).

14. Ashish Kumar Jain and Vrinda Tokekar, “Mitigating the effects of Blackhole attacks on AODV routing protocol in mobile ad hoc networks”, International Conference on Pervasive Computing (ICPC), (2015).

15. Ningrinla Marchang, Raja Datta, and Sajal K. Das, “A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, Vol. 66, No. 2, pp. 1684-1695, February( 2017).

16. Sunil Kumar and Kamlesh Dutta, “Intrusion detection technique for black hole attack in mobile ad hoc networks”, International Journal Information Privacy Security Integrity, Vol.2, pp. 81-100,(2015).

17. Shahram Zandiyan, Reza Fotohi and Marzieh Koravand, “P-Method: Improving AODV Routing Protocol for Against Network Layer Attacks in Mobile Ad-Hoc Networks”, International Journal of Computer Science and Information Security, Vol. 14, No.6, June (2016).

18. Sijan Shrestha, Ranjal Baidya, Bivek Giri and Anup Thapa, “Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol,” 8th International Electrical Engineering Congress (iEECON), pp. 1-4,(2020).

19. N. B. Noor, M. S. Anwar and M. Dey, "Comparative Study Between Decision Tree, SVM and KNN to Predict Anaemic Condition," 2019 IEEE International Conference on Biomedical Engineering, Computer and Information Technology for Health (BECITHCON), pp. 24-28, (2019).
Section
GE3- Computers & Information Technology