scholarly journals Remove the black-hole attack in mobile ADHOC network using Threshold Based Technique

2016 ◽  
Vol 15 (12) ◽  
pp. 7316-7321
Author(s):  
Sanjay Yadav ◽  
Kaptan Singh

In this paper enhanced the AODV routing protocol for the prevention of black hole attack. The enhanced AODV routing protocol based on the principle of thresholding. The thresholding using the concept of reference node selection process. The reference node selection process creates two group of node one is path altered group and other is stable path with sensibility. The sensibility path estimates the hop count and packet sequence number. If the number of hop count is not changed or the sequence of packet is also not lost is called sensitivity path of network. The function of threshold generated by the node distance formula based on the Euclidean distance derivation. The enhanced AODV protocol simulate in NS2.34 simulators and measure some standard parameter such as PDR, throughput, overload and E2E delivery ratio.

2014 ◽  
Vol 573 ◽  
pp. 418-423
Author(s):  
S. Asha Latha ◽  
A. Sivabalan

Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).


2017 ◽  
Vol 168 (8) ◽  
pp. 27-33 ◽  
Author(s):  
Sarita Badiwal ◽  
Aishwary Kulshrestha ◽  
Neeraj Garg

2018 ◽  
Vol 7 (1.9) ◽  
pp. 6 ◽  
Author(s):  
Pandi Selvam Raman ◽  
Shankar K ◽  
Ilayaraja M

Mobile ad hoc networks (MANETs) are wireless infrastructure-less network consisting collection of autonomous nodes that communicate with each other in decentralized manner. Security remains major challenge due to its some unique characteristics like open medium, mobility and hence topology changes. Therefore, routing protocol for MANETs is much vulnerable to attacks. Black Hole is a type of attack, where malicious node falsely advertises itself having the shortest or optimal path to the destination node. This attack is more dangerous while a group of nodes are cooperating with each other.The objective of this paper is to design cluster based routing protocol and prevent it from the black hole attack. The simulation results show improvement in packet delivery ratio and control overhead.


2020 ◽  
Vol 12 (2) ◽  
pp. 25-46
Author(s):  
T. Aditya Sai Srinivas ◽  
S S Mani Manivannan

Workers or labors who are working in construction sites are prone to severe risks such as death, injuries happened due to accidents, falls and stuck in between objects. Internet of things (IoT) based sensors can be utilized to monitor the behavior of workers when they are in danger zones/areas. To safeguard site workers, supervisors or site managers should monitor and alert them when they are in danger. Data will be routed from site worker to supervisor, during this routing process data is subjected to routing attacks such as black hole attack and so on, due to wireless transmission. This article addresses the problem of black hole attack that happens during the wireless transmission between nodes and the base station (BS) of IoT-based civil construction. The proposed solution Collaborative Black Hole Attack – Ad Hoc On-Demand Distance Vector routing protocol (CBHA-AODV) prevents the collaborative black hole attack by 87.72%.


2015 ◽  
Vol 109 (6) ◽  
pp. 27-33 ◽  
Author(s):  
Tarek M.Mahmoud ◽  
Abdelmgeid A. Aly ◽  
Omar Makram M

Author(s):  
Thebiga M ◽  
Suji Pramila

<p>Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Routing Protocol is more comprehensively utilized protocol in MANETS. This type of network is more exposed to assorted number of attacks and among those, the black hole attack and its variant pull off critical detriment to the entire network .In this type of attack, named black hole attack, the noxious node utilizes its routing principles, with the view to annunciate itself, that it has the briefest route to the target node. In this paper, we have investigated all the subsisting techniques and graded the solution with a table to understand their pros and cons.<strong></strong></p>


Sign in / Sign up

Export Citation Format

Share Document