scholarly journals ECC Based Defense Scheme for Selective Drop Attack in Wireless Ad Hoc Network

Author(s):  
Sangeetha V ◽  
Dr. G. Umamaheswari

Performance and security are two critical functions of wireless ad-hoc networks (WANETs). Network security ensures the integrity, availability, and performance of WANETs. It helps to prevent critical service interruptions and increases economic productivity by keeping networks functioning properly. Since there is no centralized network management in WANETs, these networks are susceptible to packet drop attacks. In selective drop attack, the neighbouring nodes are not loyal in forwarding the messages to the next node. It is critical to identify the illegitimate node, which overloads the host node and isolating them from the network is also a complicated task. Resistive to selective drop attack (RSDA) scheme is proposed to provide effective security against selective drop attack. A lightweight RSDA protocol is proposed for detecting malicious nodes in the network under a particular drop attack. The RSDA protocol can be integrated with the many existing routing protocols for WANETs such as AODV and DSR. It accomplishes reliability in routing by disabling the link with the highest weight and authenticate the nodes using the elliptic curve digital signature algorithm. In the proposed methodology, the packet drop rate, throughput and end to end delay are analysed.

2021 ◽  
Author(s):  
Vinoth kumar P ◽  
Venkatesh K

Abstract Performance and protection are the main important factors of Wireless Ad-hoc Network. Network protection includes the protection, stability and parameters of WANET. This helps to avoid significant service disruptions and increases network productivity by making the network more efficient. Since wireless ad hoc networks lack concentrate network management, these methods are vulnerable to data attack. In selected intruder finding tests, the neighboring locations are not trusted to send messages below. It is important to expose the invalid node, which pulls the capture mode and separates it from the network by pushing its routing mechanism. In this paper, we introduce the Resistant Drop Attack (RDA) method to provide effective protection against data loss. An RDA network protocol is recommended to detect weak nodes in the network during a fixed-speed attack. The RDA protocol can be embedded with present Wireless Ad-hoc Network routing systems such as AODV and DSR. Using the Digital Signature Algorithm (DSA) improves the reliability of the route by blocking links at high speeds and verifying the nodes.


2017 ◽  
Vol 100 (2) ◽  
pp. 311-320 ◽  
Author(s):  
Vishvas Haridas Kshirsagar ◽  
Ashok M. Kanthe ◽  
Dina Simunic

Sign in / Sign up

Export Citation Format

Share Document