Performance Evaluation of Secured AODV v/s Impersonated AODV

Main Article Content

Payal Gupta
Kuldeep Singh

Abstract

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are infrastructure less. Due to Open Medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks. This paper is about the prevention of impersonation Attack. The proposed system is based on authentication system. In which cryptographic signature matching is performed between the mobile station and the base station. we have used Diffie-Hellman based cryptography approach to perform the secure transmission over the network. The system is implemented in ns2 with AODV protocol and analysis is presented using Xgraph.

 

Keywords: MANET, AODV, Security, Impersonation attack,NS2

Downloads

Download data is not yet available.

Article Details

Section
Articles