Beruflich Dokumente
Kultur Dokumente
A. Menaka Pushpa 2
Prof. and Head of the Department of CSE, Dr.Sivanthi Aditanar College of Engg.,Tamilnadu, India
2
Lecturer in CSE Department, Dr. Sivanthi Aditanar College of Engg.Tamilnadu, India
ABSTRACT
1. INTRODUCTION
A wireless ad hoc network consists of a collection
ofpeer mobile nodes that are capable of communication with
each other without help from a fixed infrastructure. Nodes within
each other's radio range communicate directly via wireless links,
while those that are far apart use other nodes as relays. The
nature of wireless networks makes this network very vulnerable
to an adversary's malicious attacks. At first these types of attacks
ranges from passive eavesdropping to active interfering. Attacks
on a wireless ad hoc network can come from all directions and
target at any node. Damages can leak secret information,
message contamination and node impersonation. All these means
that a wireless ad hoc network will not have a clear line of
defense and every node must be prepared to face the fake
advertised malicious node interaction. Second, mobile nodes are
autonomous units that are capable of roaming independently. So
a
Figure. 1 fb): Normal AODV Route
Establishment
The second solution proposed by Yoo and Park on the year 2004
as two different solutions. They are as follows; ? Redundant
Route Method ? Exploits Packet Sequence No Method Both of
them have its, own advantages and disadvantages. In the first
i i
d
Figure.
attack. In this way, the malicious node can easily misroute a lot
of traffic itself and could cause an attack to the network with
very little effort on its part.
4. TRUST MODEL
Our trust model is an adaptation of the trust model by Marsh
configured for use in ad hoc networks. Marsh's model computes
situational trust in agents based upon the general trust in the
trustor and in the importance and utility of the situation in which
an agent finds itself. General trust is basically the trust that one
entity assigns another entity based upon all situations. Utility is
consider similar to knowledge so that an agent can weigh up the
costs and benefits that a particular situation
holds.Importance caters for the significance of a particular
situation to the trustor based upon time. In order to reduce the
number of variables in our model, we merge the utility and
importance of the situation into a single variable called weight,
which in turn increases or decreases with time.
5)
mi-mi
bhd
IM
Sill IM >
7. CONCLUSION
A TmsiRep
" TnistRi
^H-HH
BH
6. SIMULATION RESULT
Simulation of this modified protocol performed using the
famous simulator NS-2. This bellow graph gives the comparison
results between normal AODV protocol with and without black
hole attack and modified protocol with black hole attack. We
evaluate normal AODV working performance with the presence
of single Black Hole node. This modified AODV protocol gives
the accepted performance and also it sends alarm message to
every node in the network if the malicious node was identified.
REFERENCES
[1] Asad amir and Chris McDonald, "Establishing Trust in
Pure Ad Hoc Networks", Australian Computer Society,
2004.
2001