Aodv Routing Protocol Security Paper Presentation & Seminar

Ad hoc networks are primarily meant for use in military,emergency and rescue scenarios, where in spite of on existing nfrastructure, decentralized, fast deployment, a network can be established. Nodes assist each other by passing data and control packets from source to destination, often beyond the wireless range of the original sender using multi hop technique. However this cooperation between nodes and rely on intermediate nodes for passing the packets to desired destination makes ad hoc network vulnerable to different types of security attacks like malicious / selfish node attacks. The Black Hole problem is one of the Denial of Serviceattacks that occur in mobile ad hoc networks (MANET).DoS is the one of the crucial active attack in ad hoc networks. The active attack is at stake as in commercial or military environments. As this paper describe the activity of Black Hole node in AODV i.e.) mainly used reactive routing protocol in MANET. This paper alsogives the overview of existing solution for black holeproblem and proposes a novel approach to identify black hole node in ad hoc networks. This solution purely based on Trust Based Secured (TBS) architecture without any malicious node's activity in MANET. It also provides an error free, secured route to two different peers.

Please find the attached file along with this

If You have any query regarding the files.Please feel free to ask .I'll be glad to answer them