Efficient Dynamic Data Flow and Black Hole Detection in Manet
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 7
Abstract
In Wireless networks, when data packets are being transferred between nodes from a specified node to destination, then source node checks for shortest path to reach destination. In this approach there may be a possibility of occurring attack called BLACKHOLE attack. In Black Hole attack, source node sends Route Request (RREQ) to its neighbor nodes to know which node contains shortest path to reach destination. So malicious node sends Route Reply (RREP) to source node that it has a valid route to destination and then responds with False Route Reply (RREP). Then Source node transmits data to the destination through this malicious node. Then the malicious node absorbs or drops the data packets that are destined for destination. In this, an approach is proposed to detect the malicious node along with Routing tables. It can also show the metric analysis like packets sent, packets Received, Dropped Packets etc. A Runtime frame work for dynamic data flow using Network Simulator2 (ns2) has been proposed to implement black hole attack.
Authors and Affiliations
A. Vanathi, A. S. S. D. Toyaza
Implementation of UART Using VHDL
UART (Universal Asynchronous Receiver Transmitter) is a kind of serial communication protocol; mostly used for short-distance, low speed, low-cost data exchange between computer and peripherals. During the actual indust...
Identification of Suspicious Activities in Chat Logs using Support Vector Machine and Optimization with Genetic Algorithm
In the era of modern technology, the advancements in communication technology are leading to riveting trends in daily lives through instant messengers, social networking websites and many other popular communication tec...
Brief Review of De Duplication over Cloud for Optimizing Storage
Cloud storage is one of the services provide in cloud computing which has been increasing in reputation. With the growing data size of cloud computing, a decrease in data volumes could help provider reducing the costs o...
Robot Leg Mechanisms
The Paper focuses on the walking mechanisms for a moving Robot. It describes designs of the leg drive mechanisms, hardware architecture and the leg control methods for walking machines. The body of knowledge that applie...
A Comparative of Analysis of Image Restoration Using Mean and Median Filtering
Image restoration is an important area to better the quality of an image, that attempts to recreate or remodel an image from noise. Image noise is a variation of brightness or unwanted signals and it used to destroy mos...