A Novel Approach for Detection of Blackhole Attacks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
The MANET (Mobile Adhoc Network) is a wireless distributed network. It is formed by group of autonomous mobile nodes without any infrastructure like access points. Every node of MANET can acts as router as well as host. It has a basic characteristic of dynamic topology, it means nodes can enter and leave network any time. MANET is vulnerable to many security attacks. Black hole attack is most occurred attack in MANET and very hard to detect which is performed on network layer. Black hole attacks are classified into two types. In single black hole attack, one malicious node will change the route of source to destination and wrong path of malicious node will follow. In collaborative black hole attack one malicious node records packet at one end and send to another malicious node at other end. Black hole attacks are active attacks. In this paper, we propose a solution for detecting black hole attack. Our protocol’s name is EBAODV (Enhance Black hole AODV). In this approach, leader nodes are used for detecting black hole nodes.
Authors and Affiliations
Ankita V. Rachh, Yatin V. Shukla, Tejas R. Rohit
Network Intrusion Detection in Virtual Network Systems and Countermeasure Selection (NIDCS)
Abstract: Cloud computing provides shared resources to various cloud users. All the users share various computing resources e.g., being connected through the same switch, sharing the same data storage and the file...
A Study on Energy Model Prototyping in Various Simulators of WSN
Simulators are used to abstract the real hardware behaviors and proceed the research more economically. Various simulators of Wireless Sensor Network (WSN) are used to access the performance and transmission processes in...
Extracting Repitative Patterns from Fuzzy Temporal Data
Abstract: Association rules mining from temporal dataset is to find associations between items that hold within certain time frame but not throughout the dataset. This problem involves first discovering frequent itemsets...
Secured E-Learning Content on Handheld Device
To survive in this competitive world one has to update him continuously with the latest trends and new emerging technologies. It is not feasible for everyone to go and learn at different places. For this reason e...
A Novel Method of Data Staging For Better Mobile User Accessibility through Cloud
Abstract: In this paper, we identify and create vantage sites to stage shared data items for the ease of mobile user accesses. As mobile users will be charged on the usage of communication bandwidth and for the amo...