28-03-2017, 09:59 AM
An ad hoc mobile network (MANET) is a less dynamic infrastructure network consisting of a collection of wireless mobile nodes that communicate with each other without the use of any centralized network. Security in MANET is the most important concern for the basic functionality of the network. The dynamic topology of the MANET allows the nodes to join and leave the network at any point. The safety of the AODV protocol is compromised. For a particular type of attack called a black hole attack. A malicious node is advertised as having the shortest path to the node whose packets it wants to intercept. In this article we are trying to find the safe way for the transmission through the digital signature. Digital signature is the verification technique. The ad hoc mobile network (MANET) is a combination of mobile nodes that form a temporary network, without the need for any fixed network infrastructure, although commercial wireless technologies are generally based on towers and base stations High power. MANET is characterized [5-6] by its fast installation, low bandwidth, limited processing capacity, etc. The communication in MANET is through intermediate nodes of the network. In the absence of adequate security mechanisms, an attacking node can easily join the network and act as an intermediate node that may threaten the security of the data being exchanged.
An ad hoc mobile network (MANET) comprises mobile nodes that move independently in an open environment. The communication between the nodes in a MANET is enabled with the help of intermediate routers. The nature of MANET as the open medium, dynamic network topology, lack of centralized monitoring, and lack of clear defense mechanisms make it vulnerable to various routing attacks. In MANET routing, there is a high probability that intermediate nodes are malicious and may be a security threat. Blackhole is the common attack in ad hoc routing in which the malicious node uses the routing process to indicate that it is the shortest path to the destination. Once you receive the data packets, you discard the data packets instead of forwarding them to your neighbors.
An ad hoc mobile network (MANET) comprises mobile nodes that move independently in an open environment. The communication between the nodes in a MANET is enabled with the help of intermediate routers. The nature of MANET as the open medium, dynamic network topology, lack of centralized monitoring, and lack of clear defense mechanisms make it vulnerable to various routing attacks. In MANET routing, there is a high probability that intermediate nodes are malicious and may be a security threat. Blackhole is the common attack in ad hoc routing in which the malicious node uses the routing process to indicate that it is the shortest path to the destination. Once you receive the data packets, you discard the data packets instead of forwarding them to your neighbors.