Node Disjoint Multiple Paths Routing Technique for Secure, Reliable and Confidential Data Transmission against Black Hole Attacks in MANET
Rama Rao Tandu1, P. V. Nageswara Rao2
1Rama RaoTandu*, Research Scholar, Department of Computer Science and Engineering, GITAM (Deemed to be University), Visakhapatnam, India and Asst.Professor in dept. of CSE, Vignan‟s Institute of Technology and Aeronautical Engineering, Hyderabad, India.
2Dr. P.V. NageswaraRao, Professor, Department of Computer Science and Engineering, GITAM (Deemed to be University), Visakhapatnam, India.
Manuscript received on January 17, 2020. | Revised Manuscript received on January 23, 2020. | Manuscript published on February 10, 2020. | PP: 288-298 | Volume-9 Issue-4, February 2020. | Retrieval Number: B6239129219/2020©BEIESP | DOI: 10.35940/ijitee.B6239.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The Ad-hoc On-Demand Multipath Distance Vector (AOMDV)is an extension of AODV protocol in the mobile ad-hoc network (MANET). It utilizes the features of DSDV, DSR, and AODV Routing protocols for Secure, Reliable and confidential data transmission against the attacks in the MANET, butinblack hole attack malicious nodes utilize the behavior of AODV and show its malicious behavior at the data transmission, it causes the loss of data packets. So to avoid this loss more researchers have been conducted several techniques for detection and put several efforts to prevent the Blackhole attacks. But still, it isnot prevented completely, sothis paper proposes a Node Disjoint Multiple paths routing algorithm technique on AOMDV against black hole attacks in MANET and shows its better performance in Network Simulator (NS2).
Keywords: MANET, DSDV, DSR, AODV, and AOMDV routing protocols, Black Hole Attacks, Asymmetric Key Cryptography Technique.
Scope of the Article: Cryptography and Applied Mathematics