ADAPTIVE ROUTING IN DELAY TOLARANT NETWORK

Authors

  • MR. NILESH B. PARGHI -
  • MR. TIRATH B. PATEL -

Keywords:

Wireless Computer Network, Routing Mechanisms

Abstract

WITH THE PROGRESSION OF COMPUTER NETWORKS EXTENDING BOUNDARIES, MOBILE AD HOC NETWORK (MANET)
HAS EMERGED AS A NEW FRONTIER OF TECHNOLOGY TO PROVIDE ANYWHERE, ANYTIME COMMUNICATION. DUE TO ITS
DEPLOYMENT NATURE, MANETS ARE MORE VULNERABLE TO MALICIOUS ATTACK. THE ABSOLUTE SECURITY IN THE MOBILE AD
HOC NETWORK IS VERY HARD TO ACHIEVE BECAUSE OF ITS FUNDAMENTAL CHARACTERISTICS, SUCH AS DYNAMIC TOPOLOGY, OPEN
MEDIUM, LIMITED POWER AND LIMITED BANDWIDTH. IF THERE ARE NO ATTACKS, THERE IS NO NEED FOR SECURITY. MAJOR
ATTACKS ON MOBILE AD HOC NETWORKS ARE FLOODING, SELECTIVE FORWARDING, SINKHOLE, WORMHOLE ETC. IN A BLACK HOLE
ATTACK, A MALICIOUS NODE ATTRACTS TRAFFIC TOWARDS IT AND DROPS ALL PACKETS WITHOUT FORWARDING TO THE
DESTINATION. THE SECURITY OF THE AODV PROTOCOL IS COMPROMISED BY A PARTICULAR TYPE OF ATTACK CALLED BLACK HOLE
ATTACK. WE HAVE PRESENTED SEVERAL EXISTING METHODS TO DETECT BLACK HOLE ATTACK IN MOBILE AD HOC NETWORK. IN
OUR PROPOSED METHOD EVERY NEIGHBOUR NODE MONITORS THE FORWARDING NODE. SO IN A DENSE NETWORK THE DETECTION
RATIO BECOMES HIGH. BECAUSE IN A DENSE NETWORK THERE ARE MANY NODES TO MONITOR THE FORWARDING NODE. OUR
PROPOSED METHOD CAN EFFECTIVELY DETECT MALICIOUS NODE IN A MOBILE AD HOC NETWORK

Published

2016-05-25

How to Cite

MR. NILESH B. PARGHI, & MR. TIRATH B. PATEL. (2016). ADAPTIVE ROUTING IN DELAY TOLARANT NETWORK. International Journal of Advance Engineering and Research Development (IJAERD), 3(5), 151–156. Retrieved from https://ijaerd.org/index.php/IJAERD/article/view/1451