Efficient Dynamic Data Flow and Black Hole Detection in Manet
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 7
Abstract
In Wireless networks, when data packets are being transferred between nodes from a specified node to destination, then source node checks for shortest path to reach destination. In this approach there may be a possibility of occurring attack called BLACKHOLE attack. In Black Hole attack, source node sends Route Request (RREQ) to its neighbor nodes to know which node contains shortest path to reach destination. So malicious node sends Route Reply (RREP) to source node that it has a valid route to destination and then responds with False Route Reply (RREP). Then Source node transmits data to the destination through this malicious node. Then the malicious node absorbs or drops the data packets that are destined for destination. In this, an approach is proposed to detect the malicious node along with Routing tables. It can also show the metric analysis like packets sent, packets Received, Dropped Packets etc. A Runtime frame work for dynamic data flow using Network Simulator2 (ns2) has been proposed to implement black hole attack.
Authors and Affiliations
A. Vanathi, A. S. S. D. Toyaza
Implementation of an IOT Based Smart Chair
We present the implementation of a Smart IoT Chair system for Internet of Things (IoT) that combines an embedded device and IOT server. The proposed Smart IoT Chair records and visualizes user’s posture through a smart...
LTE Advanced: The Next Generation Wireless Technology
LTE-Advanced (LTE-A) is the project name of the evolved version of LTE that is being developed by 3GPP. LTE-A will meet or exceed the requirements of the International Telecommunication Union (ITU) for the fourth genera...
Partial Replacement of Cement with Marble Dust Powder in Cement Concrete
In this study, the investigation of performance on the strength parameter of concrete mix by partial replacing the cement with marble powder is done. Since marble powder employed in the various type of construction work...
slugReduction of Non Conformative Rate of Bearing Rings Using Six Sigma Methodology
The fast changing economic condition such as global competition declining profit margin ,customer demand for high quality product ,product variety and reduced lead time etc had a major impact on manufacturing industries...
Design and Construction of Six Sigma Tightened�Normal�Tightened Variables Sampling Scheme Indexed by Six Sigma Quality Levels
Motorola developed the Six Sigma methodology in the mid-1980s as a result of recognizing that products with high first-pass yield rarely failed in use. Six Sigma aims to deliver quality products to the customers. It als...