Abstract

In Mobile Ad hoc NETworks (MANETs) nodes communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Each node in MANET can act as a host or as a router. Due inherent characteristics like decentralization, self configuring, self -organizing networks, they can be deployed easily without need of expensive infrastructure and have wide range of military to civilian and commercial applications. But wireless medium, dynamically changing topology, limited battery and lack of centralized control in MANETs, make them vulnerable to various types of attacks. This paper focus on network layer packet dropping attacks – Black Hole & Gray Hole attacks in Dynamic Source Routing (DSR) based MANETs and discuss various pros and cons of acknowledgement based techniques for detection of above said attacks.

Highlights

  • Mobile Ad hoc NETwork (MANET) is a collection of devices or nodes that communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching

  • This paper focus on network layer packet dropping attacks – Black Hole & Gray Hole attacks in Dynamic Source Routing (DSR) based MANETs and discuss various pros and cons of acknowledgement based techniques for detection of above said attacks

  • We focus on network layer packet dropping attack - Black hole and Gary hole attacks in Dynamic Source Routing (DSR) Protocol based MANETs

Read more

Summary

INTRODUCTION

Mobile Ad hoc NETwork (MANET) is a collection of devices or nodes that communicate via wireless links, without any fixed infrastructure like base stations, central servers or mobile switching. Examples include Destination Sequenced Distance Vector routing protocol (DSDV)[10] and Optimized Link State Routing Protocol (OLSR)[13].Re active protocols are known as demand driven protocols. They do not require constant update of paths and they only create routes when desired by the source node that is they don’t find route until demanded. We have chosen one of the reactive protocols, namely Dynamic Source Routing (DSR) protocol The reason being, it uses source routing, (that is the packet header contains the path to be followed by the packet), as the source node need to know the identity of every intermediate node in the route to destination. It avoids the need of constantly updating routing information in the intermediate nodes

DYNAMIC SOURCE ROUTING PROTOCOL
LITERATURE SURVEY
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.