scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Survey of hash security on DSR routing protocol

01 Apr 2016-Vol. 2016, pp 520-524
TL;DR: The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network and previously proposed approaches that plays a major role for enhancing the performance of D SR routing protocol.
Abstract: Mobile Ad-hoc Network is a network in which mobile nodes communicate with each other by the help of wireless links and mobile nodes can move randomly in a network without any centralized management system. As MANET is a wireless network, security is a major concern and different type of attacks can manipulate the data/info that are transmitted from the source node to destination node in the network. This paper presents the literature review of DSR routing protocol and previously proposed approaches that plays a major role for enhancing the performance of DSR routing protocol. The paper introduces a hashing technique that will enhance the security of DSR routing protocol in mobile ad-hoc network.
Citations
More filters
Book ChapterDOI
01 Jan 2018
TL;DR: A model for behavior mapping for Wormhole Attacker considering the unknown and uncertain behavior of a wormhole node is introduced and shows enhanced throughput and minimal overhead-latency with increasing number of wormhole nodes.
Abstract: Wormhole attack has received very less attention in the research community with respect to mobile ad hoc network (MANET). Majority of the security techniques are toward different forms of wireless network and less in MANET. Therefore, we introduce a model for behavior mapping for Wormhole Attacker considering the unknown and uncertain behavior of a wormhole node. The core idea is to find out the malicious node and statistically confirm if their communication behavior is very discrete from the normal node by formulating a novel strategic approach to construct effective decision. Our study outcome shows enhanced throughput and minimal overhead-latency with increasing number of wormhole node.
References
More filters
Proceedings ArticleDOI
Jiwen Cai1, Ping Yi1, Chen Jialin1, Wang Zhiyang1, Ning Liu1 
20 Apr 2010
TL;DR: An adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design with path-based method to overhear the next hop’s action and the adaptive threshold strategy contributes to decreasing the false positive rate.
Abstract: Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrates an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop’s action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decreasing the false positive rate.

95 citations


"Survey of hash security on DSR rout..." refers methods in this paper

  • ...FIFO buffer is used to share with cluster head and every time a node is entered to the cluster, its sequence number is stored in FIFO buffer....

    [...]

Journal ArticleDOI
TL;DR: This paper gives an overview of cryptographic frameworks designed so far and also a comparison of existing schemes is tabled.

62 citations

Proceedings ArticleDOI
06 Apr 2013
TL;DR: This technique for wormhole avoidance addresses the malicious nodes and avoids the routes having wormhole nodes without affecting the overall performance of the network.
Abstract: Security is an essential service for wired and wireless network communication. This work concerned with a particularly sever security attack that affects the ad hoc networks routing protocols, called "wormhole attack". There are many solutions to detect and prevent this attack like packet leashes, cluster base, hop count analysis etc., but none of them is perfect solution. This paper contains a proposal for new technique for wormhole avoidance. Proposed technique has been implemented with NS2 simulator over the DSR protocol. This technique for wormhole avoidance addresses the malicious nodes and avoids the routes having wormhole nodes without affecting the overall performance of the network. The performance metrics used for evaluating network performance are jitter, throughput and end to end delay. The performance of proposed techniques is good.

25 citations


"Survey of hash security on DSR rout..." refers methods in this paper

  • ...This technique consist of symmetric key and public key encryption whereas the symmetric key is used for encryption (i.e. authentication and authorization) and public key is used for key exchange....

    [...]

Journal ArticleDOI
TL;DR: It is observed that A ODV and DSR protocol outperform TORA in terms of throughput and packet delivery ratio whereas in case of Work efficiency AODV outperforms DSR and TORA protocol.

23 citations


"Survey of hash security on DSR rout..." refers background in this paper

  • ...In [4], Mohamed A. Abdelshafy et al. the author examined the effect of different attacks like Blackhole attack, Grayhole attack, Selfish attack and Flooding attack on AODV routing protocol....

    [...]

Proceedings ArticleDOI
20 Mar 2013
TL;DR: The results of this research indicate the performance of DSR-ant has a better performance than standard DSR routing protocol, and DSR optimization using ant algorithm can improved performance with a smaller delay and the number hop to transfer information between node.
Abstract: Mobile Adhoc is a network that does not have the infrastructure and have the ability to manage its network independently, in the future this network predicted to be the key to the development of network applications. Routing protocols have an important role in this network, a lot of research has been done. In this research we use optimized routing protocols in mobile ad hoc network (MANET), the optimization is done on the routing protocol DSR (Dynamic Source Routing) which is reactive routing protocol using ant algorithm. Then we analysis and evaluated the performance of this routing protocol in various scenario and compared the result with standard DSR routing protocol. The results of this research indicate the performance of DSR-ant has a better performance. In all the scenario, DSR-ant has 48% smaller delay, 1.37 times smaller hop count, and throughput up to 3.6 times larger, but DSR-ant has routing overhead 58% larger than standard DSR. The result in velocity, pause time, and traffic connection scenario, show the result consistency, DSR optimization using ant algorithm can improved performance with a smaller delay and the number hop to transfer information between node. DSR-ant gain larger throughput but resulting in higher routing overhead than DSR standard due the effort of DSR-ant to find the best path.

21 citations