EAODV: A*-BASED ENHANCEMENT AD-HOC ON DEMAND VECTOR PROTOCOL TO PREVENT BLACK HOLE ATTACKS
Abstract: Black hole attack is
an attack where a node that responds to RREQ from the source node by replying a
fake freshness information and false hop count. The black hole nodes do not
respond to distributed co-operation in routing protocol to absorb all the packets,
as a result, the network performance will drop. Most previous works are focused
on anomaly detection through dynamic trusted of the neighbouring nodes. We find
out that the internal comparisons take a long time. This loss can be shortened
by changing the routing mechanism. We propose an enhancement of AODV protocol,
named EAODV, that is able to prevent black hole attacks. The EAODV can find a
shortest path of routing discovery using A* heuristic search algorithm. Values
of hop count and estimate time to reach the destination node are used as input
in the heuristic equation and one-way hash function is used to make a secure
value and then to casting it to all neighbouring nodes. Experiments were
conducted in NS2 to simulate EAODV in different running time with and without
black hole nodes. The EAODV performance results are indicated better in terms
Packet loss and Average End-to-End delay.
Author: Khalil I Ghathwan,
Abdul Razak Yaakub, Rahmat Budiarto
Journal Code: jptkomputergg130012

Artikel Terkait :
Jp Teknik Komputer gg 2013
- Gamelan Music Onset Detection based on Spectral Features
- Streamed Sampling on Dynamic data as Support for Classification Model
- A Mobile Ecotourism Recommendations System Using Cars-Context Aware Approaches
- Improved Harmony Search Algorithm with Chaos for Absolute Value Equation
- Future Smart Cooking Machine System Design
- A Review of Communication Protocols for Intelligent Remote Terminal Unit Development
- Power Balance AODV Algorithm of WSN in Agriculture Monitoring
- Circularly Polarized Proximity-Fed Microstrip Array Antenna for Micro Satellite
- Ovarian Cancer Identification using One-Pass Clustering and k-Nearest Neighbors
- Localizing Region-Based Level-set Contouring for Common Carotid Artery in Ultrasonography
- Separability Filter for Localizing Abnormal Pupil: Identification of Input Image
- Feature Extraction of Composite Damage on Acoustic Emission Signals
- A Camera Self-Calibration Method Based on Plane Lattice and Orthogonality
- Application of Wavelet Analysis in Detecting Runway Foreign Object Debris
- Palmprint Verification Using Time Series Method
- Time Series Based for Online Signature Verification
- Two-phase Flow Visualization Employing Gauss-Newton Method in Microchannel
- Study on Thermal Conductivity Methane Sensor Constant Temperature Detection Method
- Fuzzy Adaptive PID Control of a New Hydraulic Erecting Mechanism
- Optimization of Membership Functions for the Fuzzy Controllers of the Water Tank and Inverted Pendulum with Differents PSO Variants
- Study of an Improved Fuzzy Direct Torque Control of Induction Motor
- Research of NiMH Battery Modeling and Simulation Based on Linear Regression Analysis Method
- Design and Modeling of an Integrated Micro-Transformer in a Flyback Converter
- Renewable Distributed Generation Models in Three-Phase Load Flow Analysis for Smart Grid
- A Design Study of Dual-Stator Permanent Magnet Brushless DC Motor