Show simple item record

dc.contributor.authorSuravarapu, Vijay Anand
dc.description.abstractMobile Ad Hoc Networks (MANETs) are important because they are widely used in war zones, rescue missions and other civilian applications where it is almost impossible to use any other networks. MANETs are temporary networks where nodes are allowed to join or leave the network at any point in ~ime. Though MANETs offer flexibility, self maintenance and dynamic topology, they suffer from limited resources, have less computational power and are susceptible to attacks. Due to the dynamic nature of MANETs, the secure transmission of data is one of the key issues in MANETs. Thus there is a need to safeguard the network from internal as well as external security threats. In this paper, I attempt to improve the security environment of one of the most popular routing protocols in MANETs, the Ad Hoc On Demand Distance Vector Routing Protocol (AODV). AODV is a reactive protocol which guarantees loop free routes during the transmission of data, and the focus of this paper is mainly to secure the AODV protocol against black hole attacks. This paper proposes the Forward Reaching Black Hole Detection algorithm (FRBD) to detect single black holes in MANETs that are based on the AODV routing protocol. This paper presents a solution that includes slight modifications in the functioning of the AODV protocol. I demonstrate the proposed solution on a specially developed Java based simulation tool. The paper examines the black hole detection capabilities of the FRBD algorithm by applying it on randomly generated problem instances. These instances vary based on the total number of nodes, paths and the location of the black hole node. Our analysis shows that the FRBD algorithm effectively detects single black holes in the network and thus improves the overall security of MANETs.en_US
dc.publisherNorth Dakota State Universityen_US
dc.rightsNDSU policy 190.6.2en_US
dc.titleA Technique to Detect a Black Hole in Ad Hoc Networksen_US
dc.typeMaster's Paperen_US
dc.date.accessioned2024-01-04T18:22:52Z
dc.date.available2024-01-04T18:22:52Z
dc.date.issued2010
dc.identifier.urihttps://hdl.handle.net/10365/33562
dc.subject.lcshAd hoc networks (Computer networks) -- Security measures.en_US
dc.subject.lcshRouting protocols (Computer network protocols).en_US
dc.rights.urihttps://www.ndsu.edu/fileadmin/policy/190.pdfen_US
ndsu.degreeMaster of Science (MS)en_US
ndsu.collegeEngineeringen_US
ndsu.departmentComputer Scienceen_US
ndsu.programComputer Scienceen_US
ndsu.advisorNygard, Kendall


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record