International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.6, No.5, Sep. 2016

Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm

Full Text (PDF, 530KB), PP.54-60

Views:102   Downloads:4


Pooja Kundu, Neeti Kashyap

Index Terms

MANET;ad hoc networks;intrusion detection;Black hole attack;Gray hole attack;Message Digest;Secure key


Mobile ad hoc networks (MANETs) are very useful in various scenarios where there is need of fast deployment of the network and expensive set up is not required. With these benefits, there are some issues related to these networks. One of these issues is of secure communication. Malicious nodes can easily attack existing routing protocols for MANETs like DSR. In this paper we have proposed a modification of DSR by using message digest. The proposed work produces better results in terms of different metrics when compared with the results of DSR. When a route is set up between the two communicating mobile nodes, the data is sent through a secure key which is not impossible for the intruder nodes to intercept. This halts intrusion in the network. A message digest is created of the data packets. 

Cite This Paper

Pooja Kundu, Neeti Kashyap,"Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm",International Journal of Wireless and Microwave Technologies(IJWMT), Vol.6, No.5, pp.54-60, 2016.DOI: 10.5815/ijwmt.2016.05.06


[1]Elizabeth M. Royer, and Chai-KeongToh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks," IEEE Personal Communications, pp. 46-55, April 1999.

[2]Kundu Pooja, NeetiKashyap, and NehaYadav."Literature Survey on Intrusion Detection Systems in MANETs." Information Systems Design and Intelligent Applications.Springer India, 2016.357-366.

[3]Al-Shurman, M., Yoo, S. and Park, S., "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional Conference, pp. 96-97, 2004.

[4]S. Banerjee, "Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks," in 2008 WCECS.

[5]David B. Johnson, and David A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.

[6]Tamilselvan, Latha, and V. Sankaranarayanan. "Prevention of co-operative black hole attack in MANET." Journal of networks 3.5 (2008): 13-20.

[7]Thachil, Fidel, and K. C. Shet. "A trust based approach for AODV protocol to mitigate black hole attack in MANET." Computing Sciences (ICCS), 2012 International Conference on.IEEE, 2012.

[8]Tsou, Po-Chun, et al. "Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs." Advanced Communication Technology (ICACT), 2011 13th International Conference on.IEEE, 2011.

[9]Wu, Xiaoxin, and David KY Yau. "Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach."Security and Privacy in Communications Networks and the Workshops, 2007.SecureComm 2007.Third International Conference on.IEEE, 2007.

[10]L. Zhou and Z. J. Haas - Securing ad hoc networks. EEE Network, Vol. 13, Nov.-Dec. 1999, pp. 24 -30, 1999