Detection and Prevention of Black Hole Attack in MANET

Evangelin Motha.C, Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India ; K.J.Isabel Steffi ,Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India ; R.W.Jessica Jency ,Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India ; Sherril Sophie Maria Vincent ,Loyola-ICAM College of Engineering and Technology(LICET) Chennai, India

MANET, AODV, DSR, 2-Way Routing Protocol

The wireless Ad-hoc network is one of the active and vibrant in the field of communication and network. Mobile Ad-hoc network [MANET] is one of the field of wireless networks that provides the research and development of the wireless networks in various applications. The 2-way routing protocol is being implemented for the detection of black hole attack in MANET that has same data packet to be transmitted from source to the destination as a replication via two protocols such as AODV (Ad-hoc on-demand routing) protocol and DSR (destination sequence routing) protocol. The problem defined in this paper is the black hole attack that deprives the normal transmission of data packets from source to destination by introducing the malicious node that drops or discards the packet without being transmitted to the destination thus causing the loss of the packet, end to end delay and reduction in the packet delivery ratio. The solution to the above problem is the usage of the 2-way routing protocol that assures the effective outcome of detecting the malicious nodes by traversing the packet across another destined route. The solution comprising the 2-way routing protocol is comparatively effective than the existing mechanisms in a way that it detects the route of the malicious node and traverses the packet via another route using different protocol simultaneously.
    [1] Kanchan Ubnare , Prof. Navneet Manghi , Prof. Vimal Shukla, "A Comparative Study of Routing Protocols in Mobile Ad-hoc Networks" ,in International Journal of Emerging Technology and Advanced Engineering; Volume 4, Issue 3, March 2015 Publication Year: 2014 [2] M. Swathi, B. Pravallika, N. V. Muralidhar, “Implementing And Comparison of MANET Routing Protocols Using NS2”,in International Journal of Emerging Technology and Advanced Engineering; Volume 4, Issue 2, February 2014; Publication Year: 2014 [3] Sunil Kumar Yadav, Shiv Om Tiwari, “An Efficient Approach for Prevention of Cooperative Black Hole Attack on DSR Protocol”, in IOSR Journal of Computer Engineering,8727 Volume 16, Issue 1,Jan 2014. Publication Year:2014 [4] Vimal Kumar and Rakesh Kumar (2015) An Adaptive Approach for Detection of Black Hole Attack in Mobile Ad hoc Network. Available at: http://www.sciencedirect.com/science/article/pii/S1877050915006316 (Accessed: 12 February 2017) [5] Monika and Swati Gupta (2015) A Survey on Detection and Prevention of Black Hole Attack in MANET. Available at: http://www.ijecs.in/issue/v4-i8/17%20ijecs.pdf (Accessed: 12 February 2017) [6] Tejasvi Thanvi, Neeraj Arora and Piyush Vyas (2015) Literature Survey of MANET under Black Hole Attack. Available at: http://www.ijarcce.com/upload/2015/september-15/IJARCCE%2082.pdf (Accessed: 12 February 2017). [7] Rahul singh and Anurag Uphdaya (2016) A Literature Review on Black hole Attacks in AODV Protocol in MANET. Available at: http://www.ijettjournal.org/2016/volume-38/number-1/IJETT-V38P209.pdf (Accessed: 12 February 2017) [8] Priya Dharshini.R, Prabhu.V,Rajes Singh .S, “Research on Implementation and Comparison of Routing Protocols in MANET Using NS2”, in International Journal of Science and Research, Volume 3, Issue 4, April 2014, Publication Year: 2016 [9] Devendra Kumar and Rupali Bhartiya (2016) An Implementation of Black hole Detection and Prevention Method using AODV Routing Protocol in MANET Environment. Available at: http://www.ijcaonline.org/archives/volume150/number9/kumar-2016-ijca-911635.pdf (Accessed: 12 February 2017) [10] Viswa Jhananie K. R (2016) An Efficient Algorithm for Detecting and Removing Black hole Attack for Secure Routing in Mobile Ad-hoc Network. Available at: https://www.ripublication.com/ijaer16/ijaerv11n5_39.pdf (Accessed: 12 February 2017)
Paper ID: GRDCF003005
Published in: Conference : National Conference on Computational Intelligence Systems (NCCIS - 2017)
Page(s): 6 - 12