TY - JOUR T1 - Routing Security in Mobile Ad-hoc Networks AU - , Latha Tamilselvan AU - , V. Sankaranarayanan JO - Asian Journal of Information Technology VL - 5 IS - 10 SP - 1070 EP - 1075 PY - 2006 DA - 2001/08/19 SN - 1682-3915 DO - ajit.2006.1070.1075 UR - https://makhillpublications.co/view-article.php?doi=ajit.2006.1070.1075 KW - Ad Hoc network KW -mobile nodes KW -routing security KW -black hole AB - An Ad Hoc network is a collection of mobile nodes that dynamically form a temporary network. Unlike traditional wireless and mobile networks in which mobile nodes communicate with a centralized structure, an Ad Hoc network operates without the use of existing a network infrastructure. It is primarily used for military tactical communication applications with some commercial use. One important issue in Ad Hoc networks is security. The entire system of Ad-Hoc network works on the principle of Trust. If the neighbor’s security is compromised or the node is itself hijacked then the security of the entire network is under threat. One of the principal routing protocols used in Ad-Hoc networks is AODV (Ad-Hoc On demand Distance Vector) protocol. The security of the AODV protocol is compromised by a particular type of attack called ‘Black Hole’ attack. This study provides routing security to the AODV routing protocol by eliminating the threat of ‘Black Hole’ attacks. Our solution utilizes the sequence numbers used in transmission and reception of data/control packets in AODV to identify the ‘Black Hole’ and isolate it from the network. Computer simulation using GLOMOSIM shows that our protocol provides better performance than the conventional AODV in the presence of Black Holes with minimal additional delay and hops. ER -