An Efficient Approach for Prevention of Cooperative Black Hole Attack on DSR Protocol

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 In the mobile ad hoc networks, the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node with security. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we are considering the one such attack on mobile ad hoc network called blackhole attack. We proposed methods to detect and prevent cooperative blackhole attack in the MANET. We modify the existing DSR protocol to adopt the proposed cooperative algorithm of blackhole attack detection as well as prevention without the affecting overall performance of the network. Mobile nodes in the mobile ad hoc networks are acts host node and router node means nodes in the MANET are responsible for both data forwarding and routing mechanisms. But because of few malicious nodes which acts as misbehaving & selfish nodes, data packets not delivered to the destination and dropped by such nodes. We investigating the performance of existing DSR protocol with this new modified security enabled DSR protocol using the performance metrics like throughput, delay and jitter. Simulations for this work are carried out over the NS2 simulator.

Authors and Affiliations

Sunil Kumar Yadav

Keywords

Related Articles

Simulated Analysis and Enhancement of Blowfish Algorithm

Abstract: This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for e...

 Socio Media Connect: A Social Profile based P2P Network

 Abstract: It is observed that users tend to like and follow a particular type music/movies based on their socialinterests. Users like music of particular artists, album; movies/TV shows of a particular actor, direc...

 Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems

 In this paper, Adaptive Modulation and Coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The u...

 Analysis of Rayleigh Quotient in Extrapolation Method to Accelerate the Computation Speed of PageRank

 The development of techniques for computing PageRank efficiently for Web-scale graphs is very important since computing a PageRank vector of Web graphs containing a billion nodes can take several days. Previous m...

 Detecting Anomaly IDS in Network using Bayesian Network

 In a hostile area of network, it is a severe challenge to protect sink, developing flexible and adaptive security oriented approaches against malicious activities. Intrusion detection is the act of detecting, mon...

Download PDF file
  • EP ID EP99284
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

Sunil Kumar Yadav (2014).  An Efficient Approach for Prevention of Cooperative Black Hole Attack on DSR Protocol. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 56-62. https://europub.co.uk/articles/-A-99284