An Efficient Approach for Prevention of Cooperative Black Hole Attack on DSR Protocol
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
In the mobile ad hoc networks, the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node with security. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we are considering the one such attack on mobile ad hoc network called blackhole attack. We proposed methods to detect and prevent cooperative blackhole attack in the MANET. We modify the existing DSR protocol to adopt the proposed cooperative algorithm of blackhole attack detection as well as prevention without the affecting overall performance of the network. Mobile nodes in the mobile ad hoc networks are acts host node and router node means nodes in the MANET are responsible for both data forwarding and routing mechanisms. But because of few malicious nodes which acts as misbehaving & selfish nodes, data packets not delivered to the destination and dropped by such nodes. We investigating the performance of existing DSR protocol with this new modified security enabled DSR protocol using the performance metrics like throughput, delay and jitter. Simulations for this work are carried out over the NS2 simulator.
Authors and Affiliations
Sunil Kumar Yadav
Semantic Similarity Search Model for Obfuscated Plagiarism Detection in Marathi Language using Fuzzy and Naïve Bayes Approaches
Abstract: Plagiarism detection (PD) in natural language texts is an example of NLP applications that is linked with information retrieval (IR) and soft computing (SC) approaches. Obfuscated plagiarism cases contain invis...
Dynamic and transparent seat allocation using QR Code in a Mobile Application
Abstract: Indian Railway is world’s largest human transport system which is currently dealing with a lot of problems, such as availability of confirming seat to waiting list passengers after its departure. Moreover, ther...
Net Neutrality – A Look at the Future of Internet
Abstract: The Internet is an indispensable medium. The success story of Internet has evolved free from complex government regulation. But there is an increasing threat that Internet Service Providers (ISPs) will al...
Analysis of Time Complexities and Accuracy of Depression FillingAlgorithms in DEM
Abstract: The recent development of digital representation has stimulated the development of automaticextraction of topographic and hydrologic information from Digital Elevation Model (DEM). A DEM is used tocreate hydrol...
An Approach to Secure Data Sharing for Dynamic Groups in the Cloud
Abstract: As the low maintenance, cloud computing supply an capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from a...