Trusted AODV Protocol Against Blackhole Attack in Wireless Ad-Hoc Network

Provided by: Reed Elsevier
Topic: Security
Format: PDF
"In on-demand routing protocols for wireless ad-hoc networks, whenever communication is needed, source discovers route for data delivery to destination. Black hole attackers exploit the on demand route discovery process and data delivery by dropping the packets which are supposed to be forwarded by them. In this paper, the authors have proposed an enhanced AODV routing protocol, CAT-AODV-B (Context Aware Trusted AODV against Black hole attack) depending on TOR (Trusted On-demand Routing) model. The TOR model is used to defend the desired routing path on identification of black hole attacker on the basis of their trust values and isolating them from the routing path."

Find By Topic