An efficient secure routing mechanism for preventing wormhole and black hole attacks in a trusted DTN environment

2015 ◽  
Vol 9 (2) ◽  
pp. 140 ◽  
Author(s):  
C. Ashok Baburaj ◽  
K. Alagarsamy
Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

This article aims to secure a routing mechanism by completing amendments in previously proposed efficient secure routing (ESR) protocols against networking layer attacks in mesh networking environments. Along with generating the tickets to prove the authenticity of communicating clients, each node proves the legitimacy of its succeeding node by computing the behaviour. The intermediate nodes selected for routing the data packets proves the legitimacy of each other by getting the passive acknowledgement process within a predefined time to live (TTL) time. Further, grey hole and black hole attacks are considered in the network simulation environment as they drastically affect the network metrics during the communication because of their severe attacking characteristics. The proposed mechanism is validated over conventional routing mechanisms against packet loss and network delay parameters in the presence of black hole and grey hole routing attacks.


2019 ◽  
Vol 8 (2) ◽  
pp. 5799-5805

Cloud networks are very widespread and unreliable because of the amount of VMs and presented nodes in their Virtual Cloud Network. Nodes might connect and revoke networks at any time. Resilience is a advantage of cloud computing, but it has many safety issues in routing and transmitting information between messages. VCN research is very similar to the portable ad-hoc network (MANET), which depends on the collaboration of all involved nodes to provide fundamental activities. Many safety assaults and risks exploit the safety of information transmission due to the decentralized environment in VCN and MANET. Malicious nodes can interfere and use information during wireless communications. Numbers of methods are there that has a diverse effect on such attacks for malicious nodes. Varied attacks are susceptible to security, but Black hole assault is one of the most common effective assaults, as fraudulent nodes dump all incoming emails reducing network performance and reliability. A black hole node is designed to lampoon every node in the network that conveys with some other node by saying it always has the easiest route to the target node. In this manuscript, a secure routing discovery method has been presented using Ad hoc on demand distance vector (AODV) routing protocol. For the detection of attack in the cloud, the concept of Artificial Intelligence (AI) has been used. Therefore, in this research, Artificial Neural Network (ANN) and Support Vector Machine (SVM)is adapted to determine Packet Delivery Ratio (PDR), Delay and Throughput measures. The comparative examination has been conducted to depict the proposed FNN-AODV effectiveness. There is an enhancement of 61.01% in FNN-AODV and 5.08% enhancement in Throughput in proposed FNN-AODV than R-AODV, 6.26% enhancement in PDR for FNN-AODV than R-AODV and 10.8% is the decrement in delay in FNN-AODV than of R-AODV


Author(s):  
Jayashree Padmanabhan ◽  
Tamil Selvan Raman Subramaniam ◽  
Kumaresh Prakasam ◽  
Vigneswaran Ponpandiyan

Sign in / Sign up

Export Citation Format

Share Document