IJCATR Volume 10 Issue 5

ECC Based Defense Scheme for Selective Drop Attack in Wireless Ad Hoc Network

Sangeetha V, Dr. G. Umamaheswari
10.7753/IJCATR1005.1004
keywords : wireless ad-hoc networks; resistive to selective drop attack; network security; elliptic curve digital signature algorithm; distance vector routing; ad-hoc on demand distance vector routing

PDF
Performance and security are two critical functions of wireless ad-hoc networks (WANETs). Network security ensures the integrity, availability, and performance of WANETs. It helps to prevent critical service interruptions and increases economic productivity by keeping networks functioning properly. Since there is no centralized network management in WANETs, these networks are susceptible to packet drop attacks. In selective drop attack, the neighboring nodes are not loyal in forwarding the messages to the next node. It is critical to identify the illegitimate node, which overloads the host node and isolating them from the network is also a complicated task. Resistive to selective drop attack (RSDA) scheme is proposed to provide effective security against selective drop attack. A lightweight RSDA protocol is proposed for detecting malicious nodes in the network under a particular drop attack. The RSDA protocol can be integrated with the many existing routing protocols for WANETs such as AODV and DSR. It accomplishes reliability in routing by disabling the link with the highest weight and authenticate the nodes using the elliptic curve digital signature algorithm. In the proposed methodology, the packet drop rate, throughput and end to end delay are analysed.
@artical{s1052021ijcatr10051004,
Title = "ECC Based Defense Scheme for Selective Drop Attack in Wireless Ad Hoc Network",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "10",
Issue ="5",
Pages ="123 - 131",
Year = "2021",
Authors ="Sangeetha V, Dr. G. Umamaheswari"}
  • The paper proposes ECC security algorithms for wireless ad-hoc network.
  • Selective drop attack is deployed using resistive to selective drop attack.
  • Performances is analyzed by proposing cryptography algorithms to bypass the attacker node.
  • Comparison of with and without RSDA by analyzing packet loss,throughput and end to end delay.