An Efficient Approach for Prevention of Cooperative Black Hole Attack on DSR Protocol
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
In the mobile ad hoc networks, the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node with security. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we are considering the one such attack on mobile ad hoc network called blackhole attack. We proposed methods to detect and prevent cooperative blackhole attack in the MANET. We modify the existing DSR protocol to adopt the proposed cooperative algorithm of blackhole attack detection as well as prevention without the affecting overall performance of the network. Mobile nodes in the mobile ad hoc networks are acts host node and router node means nodes in the MANET are responsible for both data forwarding and routing mechanisms. But because of few malicious nodes which acts as misbehaving & selfish nodes, data packets not delivered to the destination and dropped by such nodes. We investigating the performance of existing DSR protocol with this new modified security enabled DSR protocol using the performance metrics like throughput, delay and jitter. Simulations for this work are carried out over the NS2 simulator.
Authors and Affiliations
Sunil Kumar Yadav
A Survey on Data Annotation for the Web Databases
Abstract : Web search engines are designed to search information in the web database and to return dynamic web pages. Data unit’s returns from the databases and information technology are accessible through HTML fo...
Sentiment Classification in Hindi
Abstract : Traditional approaches for classification of sentiments depend on lexical or syntax based feature oron both. Different methods for sentiments classifications are described .The main goal of analysis of thesent...
Security Implication of Social Networking in the Corporate Environment
Abstract: Social media offers basic business inclinations to associations and affiliations, furthermore has most likely comprehended security perils. With a particular finished objective to reduce these security risks an...
11 × 11 Playfair Cipher based on a Cascade of LFSRs
Playfair cipher is one of the better-known multiple letter encryption ciphers. In this method, the diagrams in the plaintext are treated as a single unit and then these units converted into ciphertext diagrams.&n...
Analysis of GLCM Feature Extraction for Choosing Appropriate Angle Relative to BP Classifier
GIS can manage remotely sensed images, users must have an appropriate digital map that represents lands each one has information according to its owner, status, and some other data. The classification of such lan...