Enhanced Multipath Approach for Prevention and Elimination of Black Hole Attack in Mobile Ad-Hoc Networks considering the Enhancement of Network Throughput
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 5
Abstract
Mobile Ad-Hoc Networks are highly dynamic, infrastructure lacking and resource constrained networks. These networks consist of set of nodes which are performing the routing functions and simultaneously acting as hosts. The structure of these networks imposes restrictions on monitoring or employing heavy security checks on the activities of the various participants in the network, which is possible with fixed infrastructure networks. Because of these limitations there are possibilities of security breaches in MANET’s. The security concerns come from within the network or from outside. It becomes more challenging task to detect and eliminate when the attack is being executed from inside the network. Black hole attack is one such attack which comes from within the network, where a participant of the network starts misbehaving in terms of packets. Packets supposed to be relayed through the node are not forwarded. It also manipulates the routing process of adaptive routing algorithm like AODV to get itself as most preferred route. If the attacker in black hole attack succeeds in gaining the route, it can intercept the coming and perform eavesdropping, denial-of-service, or man-in-the-middle attacks. The node which is performing the black hole attack shows itself as either having the highest sequence number or it shows that it can provide the shortest path from the source to the destination. Multipath algorithm can be a possible solution to this security attack. If more than one, routes are available from source to destination it is possible to find and identify a misbehaving/attacking node and also report it to the network. In this thesis the problem of black hole attack has been identified and use of multipath algorithm for dealing with it is selected. Further enhancements are done on the multipath approach so as to get better network utilization. We have considered OPNET (Optimized Network Engineering Tools) for our simulations.
Authors and Affiliations
Maninderpal Singh*1
STUDY AND IMPLEMENTATION OF NAMED ENTITY RECOGNITION IN HINDI LANGUAGE USING PHP
NER Technique for HINDI language and a lot of NER issues relating to language has been developed and studied in this paper. This System includes a List Look-Up Approach for Named Entity Tagset associated with NER Syste...
ELECTRICITY PRODUCTION FROM WASTE WATER BY MICROBIAL FUEL CELL
A microbial fuel cell (MFC) is a bio-electrochemical system that converts the chemical energy in the organic compounds such as acetate, lactate, and glucose. It converts renewable energy sources to electrical ener...
Geographic Adaptive Protocol for Improving the Link-Stability and Energy Efficiency in Distributed Wireless Networks
Energy awareness for computation and protocol management is becoming a crucial factor in the design of protocols and algorithms. On the other hand, in order to support node mobility, scalable routing strategies h...
Study of Artificial Roughness in Condenser Tube used in Household Refrigerator: A Review
Enhancement techniques based on artificial roughness are used in numerous applications of condenser such as: the flow regime (Reynolds number), the fluid properties (Prandtl number), with and without fouling, the...
Simulation and Analysis of Fuzzy Logic based Unified Power Flow Controller connected to Transmission Line
The Unified Power Flow Controller (UPFC) is used to control the flow of power in the transmission systems by controlling the impedance, voltage magnitude and phase angle. The Unified Power Flow Controller (UPFC)...