Browse

The Virtual University, Pakistan’s first University based completely on modern Information and Communication Technologies, was established by the Government as a public sector, not-for-profit institution with a clear mission: to provide extremely affordable world class education to aspiring students all over the country.

Using free-to-air satellite television broadcasts and the Internet, the Virtual University allows students to follow its rigorous programs regardless of their physical locations. It thus aims at alleviating the lack of capacity in the existing universities while simultaneously tackling the acute shortage of qualified professors in the country. By identifying the top Professors of the country, regardless of their institutional affiliations, and requesting them to develop and deliver hand-crafted courses, the Virtual University aims at providing the very best courses to not only its own students but also to students of all other universities in the country.

BLACK HOLE ATTACKSPREVENTION THROUGH MAC BASED AODV PROTOCOL IN CONSTRAINT ORIENTED NETWORKS

Download

Author: MUHAMMAD ADIL


Citable URI : https://vspace.vu.edu.pk/detail.aspx?id=345

Publisher : Virtual University

Date Issued: 7/4/2020 12:00:00 AM


Abstract

Wireless sensor network (WSN) consists of a large number of sensor nodes with data collecting, processing and communication capabilities. Its primary objectives are how to exchange information securely to achieve authenticity, integrity and availability of data in an efficient manner. These networks are easily compromised by different attacks, i.e. Jamming attacks, Denial of service attacks (DoS), Sybil attacks, tampering attacks, and Black hole attacks. Black hole attacks are one of the most lured attacks that are used to highjack the security, functionality and performance of the WSNs. Ad hoc on demand distance vector (AODV) and Enhanced ad hoc on demand distance vector (E-AODV) protocols were proposed to resolve this issue. However, a tightly coupled issue associated with these approaches is their inconsistency to block an intruder node, i.e. every node doesn’t know anything about an intruder node until this information is shared by the concerned destination node. Moreover, communication process with the concerned destination node is an energy harvesting and time consuming process. Therefore, an energy efficient and secure routing protocol is needed to resolve the aforementioned issue i.e., black hole attack. In this research, a secure and lightweight routing protocol is proposed to prevent black hole attacks in constraint oriented networks i.e. WSNs, IoT and ad hoc networks. The proposed scheme is a hybrid of media access control (MAC) and Ad hoc on demand distance vector (AODV) protocols. Initially, every node is registered with nearest gateway/Cluster Head module through the MAC addressing scheme and only registered nodes are allowed to communicate. Registration process is useful in solving black hole attacks in WSNs i.e. due to communication restriction, intruder node(s) cannot interact either with gateway/CH or registered nodes. If somehow an adversary is able to send a message to the controller, it is not entertained or simply neglected by gateway/CH module. Simulation tool OMNeT++ was used to verify the authenticity, performance and security of the proposed scheme against field proven techniques such as AODV and EAODV.The simulation results of the proposed scheme were compared with the said techniques on the basis of key parameters such as latency, packet lost ratio and end to end delay.


URI : https://vspace.vu.edu.pk/details.aspx?id=345

Citation: Adil,M(2019).BLACK HOLE ATTACKSPREVENTION THROUGH MAC BASED AODV PROTOCOL IN CONSTRAINT ORIENTED NETWORKS. Virtual University of Pakistan(Lahore, Pakistan)

Version : Final Version

Terms of Use :

Detailed Terms :

Journal :

Files in this item

Name Size Format
Fall 2019_CS720_MS170401318.pdf 3790kb pdf


Copyright 2016 © Virtual University of Pakistan