Recognition and Removal of Black Hole Attack for Secure Communication in MANETs

نویسندگان

  • S. Rakesh Kumar
  • N. Gayathri
  • T. Manikandan
چکیده

Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANETs). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. Previously the works done on security issues in MANETs were based on reactive routing protocol like Ad-Hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANETs. The scope of this paper is to develop a technique to identify Black Hole Attack and then removal of Black Hole Attack in Mobile Ad-hoc Networks (MANETs). Simulation is done with Network Simulator (NS2).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

M Identification and Removal of Black Hole Attack for Secure Communication in MANETs

Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANETs). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black h...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Evaluation of Performance of AODV over DSDV Protocol using Blackhole attack in MANET

Wireless and ad hoc are the striking networks these days in which many researchers are working. Basically Wireless or mobile networks are emerged to replace the wired networks from traditional scenario to new paradigm. The next trend of wireless network is quite differ than conventional wired network in many ways viz. infrastructure, cost, capacity, adaptability, easy to operate, schematizing r...

متن کامل

A Review of Black Hole attack on AODV Routing in MANET

Mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized access point such as a base station. MANET has potential applications in very unpredictable and dynamic environments. The nodes, which act as a host as well as a router, communicate to each other through multi hops d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016