An Approach for Security Measures of Black Hole Attack in MANET
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2016, Vol 3, Issue 1
Abstract
Mobile Ad Hoc Network (MANET) is a major next generation wireless technology which is mostly used in future. MANET is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predefine organization of available links. In a MANET mobile node will be increases and moveable, so that attacker will be attack by a malicious node which brings great challenges to the security of Mobile Ad Hoc network. The Black hole attack is one of such security issue in MANET. Our focus is specifically is on ensuring the security against the Black hole attack with the help of the popular routing protocol which is mostly used in MANET. Mobile Ad hoc Networks (MANET) are the extension of the wireless networks. They plays important role in real life applications such as military applications, home applications etc. these networks are exposed by a lot of security attacks such as alteration, Denial of service attack, Fabrication attack etc. Black hole attack is one of the dangerous active attacks on the MANET. In this research paper an efficient approach for the detection and removal of the Black hole attack in the Mobile Ad Hoc Networks (MANET) is described. The algorithm is implemented on AODV (Ad hoc on demand Distance Vector) Routing protocol. The algorithm can detects both the single Black hole attack and the Cooperative Black hole attack. The beauty of the algorithm described in this paper is that it not only detects the black hole nodes in case when the node is not idle but it can also detect the Black hole nodes in case when a node is idle as well
Authors and Affiliations
Prachi Goyal
Tall Office Building Form to Attend Sustainability
From the early history, we can visualize that there is continuous development in urban areas. Development not only city settlements but rather in individual buildings along with innovative technologies from pyramids of E...
Quadratic Trend Running CostReplacement Model with Linear Trend Salvage and Predicted Inflation
The paper Quadratic Trend Running Cost Replacement Model with Linear Trend Salvage and Predicted Inflation is an attempt made to develop right replacement strategy to determine an age of equipment at which the replacemen...
Prevalence of Intestinal Parasitic Infections and Associated Risk factors among School children in Adigrat town, Northern Ethiopia
Intestinal parasitic infections are among the major public health and socioeconomic problems in developing countries. A cross sectional parasitological examination was conducted on 309 school children to assess the preva...
Intentional Caching in Disruption Tolerant Network
Disruption Tolerant Network (DTN) is a networking architecture that is designed to provide communications in the most unstable and stressed environments. DTN route network messages through intermittently connected mobile...
VHDL implementation of a Novel Low Power Squaring Circuit Using YTVY Algorithm of Vedic Mathematics
Squaring plays an important role in VLSI signal processing applications. The multiplier piece is used to square of a number in much complex multiplication. For carrying out the large hardware circuit, the multiplier unit...