DSR is an on-demand routing protocol. This means routes are not pre-established routes and routes are only active during the transmission. The main problem in the MANET is attack on data. As we know in MANET we cannot differentiate which node is the attacker node and which is benign node. So, the attacker node can easily capture the data. And these types of attacks are known as Black-hole, worm-hole and gray-hole attack. So, identifying which node is genuine node or for preventing the data from the attacker node is necessary in MANETs. This paper provides the good technique which helps in preventing from these types of routing attacks during data transmission. And this leads to the secure communication as we select the intermediate node on the basis of its energy and buffer state. This paper consider the two parameters for selecting the forwarding nodes, first one is their energy state and second is buffer value. Only those nodes will participate in the transmission which have their energy state equal to some threshold value and have the less buffer value. Because the attacker nodes have less energy due to continuously sending the RREP message to the nodes and have high buffer value as it always attract the neighbor nodes for transmission. So, the implemented technique only selects the nodes which seem to be genuine on the basis of measuring two factors its thresh-hold energy and buffer value of the IN. And this result into the less packet loss as compared to the DSR. And even if the attacker captures the packets, the packets will be in encrypted form. Attackers have to decrypt the packet for reading it and it’s really hard to decrypt the data. The packet loss will be less in the proposed technique and throughput will be increased.
[1]
Yih-Chun Hu,et al.
Wormhole attacks in wireless networks
,
2006,
IEEE Journal on Selected Areas in Communications.
[2]
Elizabeth M. Belding-Royer,et al.
A secure routing protocol for ad hoc networks
,
2002,
10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[3]
Ning Liu,et al.
The Simulation and Comparison of Routing Attacks on DSR Protocol
,
2009,
2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[4]
Manisha Sharma,et al.
Congestion Control in Manets Using Hybrid Routing Protocol
,
2013
.
[5]
P. Goyal,et al.
MANET: Vulnerabilities, Challenges, Attacks, Application
,
2011
.
[6]
Mohammed Bouhorma,et al.
Performance comparison of ad-hoc routing protocols AODV and DSR
,
2009,
2009 International Conference on Multimedia Computing and Systems.