Identifying Intruders in MANET: Exploiting RREP Message of AODV Protocol
Deepak Kumar Verma,
Ashwani Kush and
Renu Jain
Additional contact information
Deepak Kumar Verma: University Institute of Engineering and Technology, Kanpur, India
Ashwani Kush: University College, Kurukshetra, India
Renu Jain: University Institute of Engineering and Technology, Kanpur, India
International Journal of Information Technology Project Management (IJITPM), 2020, vol. 11, issue 4, 42-55
Abstract:
Mobile ad hoc networks are characterized by wireless medium used for communication, frequent change of topology, and non-availability of centralized control for authentication. Out of all the attributes, communication through open air poses the biggest threat to security. Absence of security implementations by the routing protocols gives opening for intrusion to malicious nodes which then operate various attacks to hinder the normal communication. Solution suggested modifies vastly used AODV protocol to exploit the unused reserved bits of RREP message for identifying the malicious nodes in the MANET. Proposed algorithm finds the neighbors of the destination through RREQ messages, identifies vindictive neighbors providing contrived DSNs of the destination.
Date: 2020
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 18/IJITPM.2020100104 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jitpm0:v:11:y:2020:i:4:p:42-55
Access Statistics for this article
International Journal of Information Technology Project Management (IJITPM) is currently edited by John Wang
More articles in International Journal of Information Technology Project Management (IJITPM) from IGI Global
Bibliographic data for series maintained by Journal Editor ().