Efficient Dynamic Data Flow and Black Hole Detection in Manet

Abstract

In Wireless networks, when data packets are being transferred between nodes from a specified node to destination, then source node checks for shortest path to reach destination. In this approach there may be a possibility of occurring attack called BLACKHOLE attack. In Black Hole attack, source node sends Route Request (RREQ) to its neighbor nodes to know which node contains shortest path to reach destination. So malicious node sends Route Reply (RREP) to source node that it has a valid route to destination and then responds with False Route Reply (RREP). Then Source node transmits data to the destination through this malicious node. Then the malicious node absorbs or drops the data packets that are destined for destination. In this, an approach is proposed to detect the malicious node along with Routing tables. It can also show the metric analysis like packets sent, packets Received, Dropped Packets etc. A Runtime frame work for dynamic data flow using Network Simulator2 (ns2) has been proposed to implement black hole attack.

Authors and Affiliations

A. Vanathi, A. S. S. D. Toyaza

Keywords

Related Articles

Human Identification System Based On Iris Scan

Biometrics includes various technologies for uniquely identifying an individual person in accordance with an examination of particular attributes of either the person’s interior or exterior eye. The technologies have ma...

Laptop Operated Fire Fighting Robot

detecting fire and extinguishing it is a harmful job that puts life of a fire fighter at hazard. There are many fire accidents which fire fighter had to lose their lives in the line of duty every year throughout the wor...

CFD Analysis on Circular Fins in Light Weighted Automobile Vehicle

The presented paper deals with the design of fins on the cylinder of four stroke single cylinder SI engine. The main objective of design is to provide the maximum cooling which will result in producing highly efficient...

Text Encryption and Decryption using Triple Keys Symmetric Cryptography

Interchange of information over the network is increasing very rapidly. Transferring any information on internet arises with the biggest issue that is security. Surety must be provided at any cost. Cryptography plays an...

Comparative Demographic Distribution of Upper and Lower Assam

India is a country with rich tapestry of cultures, ethnic mixes, languages and traditions which coexist in harmony and peace. Assam, a state in the northeast part of India sets a fine example which contributes to the pr...

Download PDF file
  • EP ID EP24888
  • DOI -
  • Views 563
  • Downloads 16

How To Cite

A. Vanathi, A. S. S. D. Toyaza (2017). Efficient Dynamic Data Flow and Black Hole Detection in Manet. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(7), -. https://europub.co.uk/articles/-A-24888