scholarly journals Two-Step Verification Technique for Isolation of Black hole Attack in MANETs

A network in which the nodes can configure themselves and change their locations is known as mobile ad hoc network. For connecting to other networks, MANETs use wireless connections since they are mobile. Signal protection and reliability of mobile nodes are the major challenges faced by the applications which use MANETs. An active intrusion attack that is initiated by a malicious node to degrade the network’s performance is known as black hole attack. A new approach is proposed in this research that uses the blacklist and clustering approaches to remove this attack from networks. NS2 simulation is used to conduct simulation experiments for evaluating the performance of proposed method. The outcomes show that the performance of proposed method is better in terms of different performance parameters as compared to the traditional approaches.

Mobile Ad hoc network is a temporary network. It helps to communicate two or more devices for short range. Routing Protocols are use to establish a communication in MANET. As it is a open network , it has many vulnerabilities from security point. Black hole Attack is one of the major concern in MANET. In this paper, we have implemented Black hole Attack in random mobility environment and analyse its impact on MANET using various parameters for single and multiple connection in MANET. Black hole attack disturbs one of the connection in the network while remaining connection are unaffected. During our analysis, we found that performance result of black hole attack in multiple connection network give a similar kind of output mentioned in various research paper related to gray hole attack, which will make difficult to analysis the type of attack in the network.


Sign in / Sign up

Export Citation Format

Share Document