Detection and Prevention Of Cooperative Black Hole Attack in a MANET
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 5
Abstract
A mobile ad hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices connected wirelessly. In MANETs, security plays a major role as the mobile nodes can join and leave the network randomly due to the continuous movement of the mobile nodes. In this paper, a novel method for detection and prevention of cooperative black hole attack in MANETs, by thresholding RREP sequence number, is proposed. It is implemented using AODV routing protocol in the NS2 simulations. The experimental results are obtained by varying the concentration of black hole nodes and are analyzed in terms of throughput, end to end delay and packet delivery ratio. The results demonstrate the effectiveness of the proposed method.
Authors and Affiliations
P. S. Hiremath, Anuradha T.
Android Application Based Optical Character Recognition For Malayalam Language
Optical character recognition is to recognize alphanumeric or other characters from a digital image. At first the document to be converted will be captured by mobile camera or scanner then the resultant text will be ava...
Medium Voltage High-Power Converter Topology for the Large Permanent Magnet Wind Generator Systems
This paper proposes a modular, medium voltage, highpower converter topology for the large permanent magnet wind generator system, eliminating the grid-side step-up transformer, which is desirable for both onshore and o...
Applications of Graph Labeling in Major Areas of Computer Science
The field of Graph Theory plays a vital role in various fields. In Graph theory main problem is graph labeling. Graph Labeling is the assignment of integer’s form 1 to n for vertex, edges and both of the graphs respec...
Implementation of a Personalized Mobile Query Search Engine
PMSE, Personalized Mobile Search Engine has been proposed to show any client craved result or re-ranking result as per the client given question (UGQ) which incorporates content and the area of the client. It meets e...
Discretion Sustaining Location-Based Provision Etiquette for K-NN Search
A large number of individuals speak with their surroundings through their companions and their proposals utilizing Mobile gadget applications, for example, four square. However without legitimate security assurance,...