Redirigiendo al acceso original de articulo en 23 segundos...
Inicio  /  Future Internet  /  Vol: 7 Par: 3 (2015)  /  Artículo
ARTÍCULO
TITULO

Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

Dilraj Singh and Amardeep Singh    

Resumen

The self-organizing nature of the Mobile Ad hoc Networks (MANETs) provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV) protocol, Enhanced Secure Trusted AODV (ESTA), which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

Palabras claves

 Artículos similares

       
 
Flavio Pinto, Yogachandran Rahulamathavan and James Skinner    
Doping is a well-known problem in competitive sports. Along the years, several cases have come to public, evidencing corrupt practices from within the sports environment. To guarantee fair play and prevent public health issues, anti-doping organizations ... ver más
Revista: Future Internet

 
Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch and Alexander Aved    
With the fast development of Fifth-/Sixth-Generation (5G/6G) communications and the Internet of Video Things (IoVT), a broad range of mega-scale data applications emerge (e.g., all-weather all-time video). These network-based applications highly depend o... ver más
Revista: Future Internet

 
Fatma S. Alrayes, Jaber S. Alzahrani, Khalid A. Alissa, Abdullah Alharbi, Hussain Alshahrani, Mohamed Ahmed Elfaki, Ayman Yafoz, Abdullah Mohamed and Anwer Mustafa Hilal    
Over the last few years, unmanned aerial vehicles (UAV), also called drones, have attracted considerable interest in the academic field and exploration in the research field of wireless sensor networks (WSN). Furthermore, the application of drones aided ... ver más
Revista: Drones

 
As supply chains become more complex and globalized, the individual participants of the supply chains should invest in systems based on information communication technologies (ICT) such as the remote frequency identification device (RFID) with tags that ... ver más
Revista: Sustainability

 
Qingwu Gong, Jiazhi Lei and Jun Ye    
With the penetration of distributed generators (DGs), operation planning studies are essential in maintaining and operating a reliable and secure power system. Appropriate siting and sizing of DGs could lead to many positive effects forthe distribution s... ver más
Revista: Energies