Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET

google+
Views: 27                 

Author :  Nitesh Ghodichor1 , Raj Thaneeghavl. V1 , Dinesh Sahu1 , Gautam Borkar2 , Ankush Sawarkar

Affiliation :  1Department of Computer Science and Engineering, SRK University, Hoshangabad Road, Misrod, Bhopal-462026 (India), 2Department of Information Technology, RAIT, DY Patil University Sector 7. Nerul, Navi

Country :  India

Category :  Networks & Communications

Volume, Issue, Month, Year :  15, 2, March, 2023

Abstract :


MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.

Keyword :  Mobile Adhoc Network, Security, Attacks and Malicious Nodes, Secure Routing, security mechanism, Blockchain

Journal/ Proceedings Name :  International Journal of Computer Networks & Communications (IJCNC)

URL :  https://aircconline.com/ijcnc/V15N2/15223cnc07.pdf

User Name : steve price
Posted 17-05-2023 on 15:48:34 AEDT



Related Research Work

  • Improved Q-reinforcement Learning Based Optimal Channel Selection In Cognitive Radio Networks
  • Performance Evaluation Of The Kvm Hypervisor Running On Arm-based Single-board Computers
  • A New Image Steganography Algorithm Based On Mlsb Method With Random Pixels Selection
  • Detection Of Peer-to-peer Botnets Using Graph Mining

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals