Loading

Lightweight Node Authentication and Establishing a Secure AODV protocol in Mobile Ad hoc Network
V. Joshibha Bency1, C. Annadurai2, D. Ramkumar3, R. Rajesh4

1V. Joshibha Bency, Department of Electronics and Communication Engineering, SSN College of Engineering, Kalavakkam, TN, India.
2Dr. C. Annadurai, Department of Electronics and Communication Engineering, SSN College of Engineering, Kalavakkam, TN, India.
3D. Ramkumar, Department of Electronics and Communication Engineering, SSN College of Engineering, Kalavakkam, TN, India.
4R. Rajesh, Department of Electronics and Communication Engineering, SSN College of Engineering, Kalavakkam, TN, India
Manuscript received on 05 May 2019 | Revised Manuscript received on 12 May 2019 | Manuscript published on 30 May 2019 | PP: 915-920 | Volume-8 Issue-7, May 2019 | Retrieval Number: F3704048619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A MANET is an independent network communication through a wireless medium without requiring any fixed infrastructure, where a target node is not in the direct range of transmission over a sender node, and where midway nodes are needed in order to forward packets. The midway nodes here are not only the host but also acts as a router for hand over packets. Nonetheless, it is very simple to attack the defenseless character of the ad hoc networks by malicious node like the dropping or hand over of forged data etc. As the need for dynamic network is constantly developing, security problems in the network layer in particular must be properly solved according to MANETs. This paper discusses a series of routing violations and proposes an improvement in AODV’s design to authenticate route requests using digital signatures to prevent malicious node attacks. 
Keyword: MANET, AODV Protocol, Attacks, Secure Routing, Cryptography, Digital signature. 
Scope of the Article: Authentication