Abstract
In present-day wireless communication scenario, Mobile ad hoc network (MANET) plays a very important role, as it consists of many autonomous nodes which communicate together to form a proper communication network. Each node in a network will move in random path, so that nodes direction will change frequently. But, some of the nodes may misbehave which leads to many problems in that network. These nodes are called as malicious nodes which create severe data loss by dropping data packets, and network may loss its privacy due to these intruders. So, providing security is the major challenge, because the networks are more vulnerable to many attacks. Some major attacks like flooding and black hole affect the E2E delay, packet delivery ratio (PDR), and throughput of the network. So, this paper mainly explains on enhancements in security in AODV using efficient techniques called SHA-3 Keccak and dynamic threshold routing algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2016) Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In: International conference on electrical and information technologies (ICEIT), tangiers, pp 536â542
Ramya P, SairamVamsi T (2018) Impact analysis of blackhole, flooding, and grayhole attacks and security enhancements in mobile ad hoc networks using SHA3 algorithm. In: Anguera J, Satapathy S, Bhateja V, Sunitha K (eds) Microelectronics, electromagnetics and telecommunications. Lecture notes in electrical engineering, vol 471. Springer, Singapore; Fahmy AHH, Bahaa-Eldin A (2015) Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. Wirel Netw 21(2):467â483
Mane Dadaso, Gothwal Deepali (2013) Improved security for attacks in MANET using AODV. Int J Innov Eng Technol (IJIET) 2(3):37â44
Mahmoud MMEA, Shen XS (2014) Secure routing protocols. Security for multi-hop wireless networks. Springer, New York, pp 63â93
Zhao Z, Hu H, Ahn GJ, Wu R (2010) Risk aware mitigation for MANET routing attacks. IEEE Trans Dependable Secur Comput 9(2):250â260
Tseng F-H, Chou L-D, Chao H-C (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Hum-Centric Comput Inf Sci 1(1):1â16
Yi P et al (2005) A new routing attack in mobile ad hoc networks. Intâl J Info Tech 11(2)
Palanisamy V, Annadurai P (2009) Impact of rushing attack on multicast in mobile ad hoc network. Int J Comput Sci Inf Secur 4(1â2)
Shanmuganathan V, Anand T (2012) A survey on gray hole attack in MANET. IRACSTâInt J Comput Netw Wirel Commun (IJCNWC) 2250â3501
Mahajan V, Natu M, Sethi A (2008) Analysis of wormhole intrusion attacks in MANETs. In: IEEE military communications conference, pp 1â7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Âİ 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sairam Vamsi, T., Sudheer Kumar, T., Vamsi Krishna, M. (2021). Impact Analysis of Black Hole, Flooding Attacks and Enhancements in MANET Using SHA-3 Keccak Algorithm. In: Chowdary, P., Chakravarthy, V., Anguera, J., Satapathy, S., Bhateja, V. (eds) Microelectronics, Electromagnetics and Telecommunications. Lecture Notes in Electrical Engineering, vol 655. Springer, Singapore. https://doi.org/10.1007/978-981-15-3828-5_12
Download citation
DOI: https://doi.org/10.1007/978-981-15-3828-5_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3827-8
Online ISBN: 978-981-15-3828-5
eBook Packages: EngineeringEngineering (R0)