CFP last date
20 December 2024
Reseach Article

Secure Approach for Location Aided Routing in Mobile Ad Hoc Network

by Anamika, Kalpana Tyagi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 101 - Number 8
Year of Publication: 2014
Authors: Anamika, Kalpana Tyagi
10.5120/17708-8711

Anamika, Kalpana Tyagi . Secure Approach for Location Aided Routing in Mobile Ad Hoc Network. International Journal of Computer Applications. 101, 8 ( September 2014), 24-27. DOI=10.5120/17708-8711

@article{ 10.5120/17708-8711,
author = { Anamika, Kalpana Tyagi },
title = { Secure Approach for Location Aided Routing in Mobile Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 101 },
number = { 8 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume101/number8/17708-8711/ },
doi = { 10.5120/17708-8711 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:31:09.348691+05:30
%A Anamika
%A Kalpana Tyagi
%T Secure Approach for Location Aided Routing in Mobile Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 101
%N 8
%P 24-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Networks (MANETs) are self-managing network which consists of distributed nodes that communicate with each other through wireless links with no fixed infrastructure and no centralized control. Due to self-configuring and dynamic nature of these networks routing protocol are susceptible to various types of attacks. The black hole attack is one of the noticeable security threats in MANETs. In Black hole attack the packet is redirected to a node that actually does not exist in the network. This paper, presents an approach to overcome black hole in MANETs. In proposed work nodes validate each other by issuing security certificate in digital form to all the other nodes in the network. The proposed method is to be adapted on Location Aided Routing Protocol with Dynamic Adaptation of Request Zone (LARDAR) protocol. This method is capable of detecting and removing black hole nodes in the MANETs. In addition information about angle ? is kept on route request packet to select optimal path for secure transmission of data packets.

References
  1. S. Gangwar, K. Kumar, "Mobile Ad hoc Networks: A detailed survey of QoS Routing Protocols", Vol. 2, International Journal of Distributed and Parallel Systems, 2011.
  2. Dr. P. K. Suri, Dr. M. K. Soni, Parul Tomar, "Routing in Mobile Ad hoc Network: A Review", International Journal of Advances in Computing and Information Technology, 2012.
  3. Atekeh Maghsoudlou, Marc St-Hilaire, Thomas Kunz, "A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks", Carleton University, Systems and Computer Engineering, Technical Report SCE-11-03, October 2011.
  4. Young-Bae Ko, Nitin H. Vaidya, "Location Aided Routing (LAR) in Mobile Ad-Hoc Networks", International Journal of Computer Network and Communication, 2000.
  5. Tzay-Farn Shih, Hsu-Chun Yen, "Location-aware Routing Protocol with Dynamic Adaptation of Request Zone for Mobile Ad Hoc Networks", Wireless Network, 2008.
  6. Sachin Lalar, "Security in MANET: Vulnerabilities, Attacks & Solutions", International Journal of Multidisciplinary and Current Research, Vol. 2, January 2010.
  7. K. Selvavinayaki, K. K. Shyam Shankar, Dr. E. Karthikeyan, "Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANETs", International Journal of Computer Applications, 2010.
  8. Karim El Defrawy, Gene Tsudik, "ALARM: Anonymous Location-Aided Routing in Suspicious MANETs", International Conference on Local Computer Network, IEEE, September 2011.
  9. Karim El Defrawy, Gene Tsudik, "PRISM: Privacy-Friendly Routing In Suspicious MANETs", IEEE International Conference, ICNP, 2008.
  10. Haiying Shen, Lianyu Zhao, "ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs", Transactions On Mobile Computing, IEEE, Vol. 12, June 2013.
  11. Fan-Hsun Tseng, Li-Der Chou, Han-Chieh Chao, "A Survey of Black Hole Attacks in Wireless Mobile Ad hoc Networks", Human Centric Computing And Information Sciences, 2011.
  12. E. A. Mary Anita, V. Vasudevan, "Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining", International Journal of Computer Applications, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs Black hole attack Location based communication Security certificate.