Enhanced Detection and Elimination Mechanism from Cooperative Black Hole Threats in MANETs
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 3
Abstract
Malicious node invasion as black hole attack is a burning issue in MANETs. Black hole attacks with a single malicious node is easy to detect and prevent. The collaborative attacks with multiple cooperative malicious node is a challenging issue in security of MANETs as it is difficult to figure out due to its complex and sophisticated mechanism. This study proposed a novel signature-based technique to detect and handle the cooperative black hole attack in MANETs. For this purpose, diverse type of simulation scenarios are used with increasing number of nodes. The parameters such as average throughput, average packet drop, average end to end delay, average processing time and malicious node detection rate are used to measure the impact of signature-based malicious node detection scheme. AODV is used as routing protocol in this study. This study revealed that the performance of MANETs degrades with an increase in a number of malicious nodes. The average throughput of MANETs decreases with increase in average end to end delay and average packet drop. Signature-based malicious nodes detection mechanism is used to counter the cooperative black hole attack. The signature-based technique has enhanced the detection and elimination of cooperative black hole attack in MANETs. This helps in comparatively an increase in average throughput and decrease in packet delay and packet drop.
Authors and Affiliations
Samiullah Khan, Faqir Usman, Matiullah Matiullah
: Optimized Min-Sum Decoding Algorithm for Low Density Parity Check Codes
Low Density Parity Check (LDPC) code approaches Shannon–limit performance for binary field and long code lengths. However, performance of binary LDPC code is degraded when the code word length is small. An op...
Development of Rest Facility Information Exchange System by Utilizing Delay Tolerant Network
In this paper, we propose temporary rest facilities information exchange system among many people unable to get home by utilizing Delay Tolerant Network (DTN) after a disaster. When public transportation services are int...
Applications of Data Envelopment Analysis in Development and Assessment of Sustainability Across Economic, Environmental and Social Dimensions
Recently, senior managers are paying much more attention to the environmental aspects of decision-making units. Technically, global economy is inextricably connected to the environment, as it is heavily dependent on extr...
Social Success Factors Affecting Implementation of Agile Software Development Methodologies in Software Industry of Pakistan: An Empirical Study
During the past few years it has been observed that the implementation of Agile software development methodologies have become a part and parcel in software development projects not only in large and developed organizati...
Video conference Android platform by your mobile phone
Video conferencing is a visual and audio communications technology dedicated to Smartphones. It is based on the client-server communication model that this requires many limits since using the server. In this paper, we p...