Efficient technique to Detect Blackhole Attack in Mobile Ad Hoc Networks

Authors(2) :-R. Deenadhayalan, S.Anandamurugan

An ad hoc routing protocol is a pattern, or standard, that controls to routepackets between mobile devices in a mobile ad hoc network. A new node announces its presence and listens for announcements broadcast by its neighbours. To communicate one node to another one, each node can act as both host as well as router at the same time and perform all the routing and state maintenance operations. Source routing allows a sender of a packet to partially or completely specify the route the packet takes through the network. Source routing allows easier troubleshooting, improved traceroute, and enables a node to discover all the possible routes to a host. Opportunistic data forwarding has not been widely utilized in MANETs, because the lack of an efficient lightweight proactive source routing capability. A lightweight Table Driven Source Routing (TDSR) protocol can maintain more network topology information than Distance Vector (DV). To facilitate source routing and also smaller overhead than DV-based protocols, Link State (LS) and reactive source routing protocols.The threats to users of wireless technology have increased as the service has become more popular.Because of the dynamically changing topology, open environment and lack of security infrastructure, a mobile ad hoc network (MANET) is susceptible to the presence of malicious nodes and to ad hoc routing attacks. The variety of routing attacks that target the weakness of MANETs.In proposed scheme, efforts on mobile ad hoc network's routing weakness and analyzes the network performance under black hole attack that can easily be employed against the mobile ad hoc network (MANET). The resistive schemes against these attacks were proposed for Table Driven Source Routing (TDSR) protocol and the effectiveness of the schemes is validated using NS2 simulations.

Authors and Affiliations

R. Deenadhayalan
Kongu Engineering College, Perundurai, Erode, Tamilnadu, India
S.Anandamurugan
Kongu Engineering College, Perundurai, Erode, Tamilnadu, India

Access control, authentication, attribute-based encryption, cloud storage.

  1. Behrens. J and Garcia-Luna-Aceves J. J, (1994), ‘Distributed, scalable routing based on link-state vectors’, ACM Conference. SIGCOMM, pp. 136-147.
  2. Biswas. S and Morris. R, (2005), ‘ExOR: Opportunistic multi-hop routing for wireless networks’, ACM Conference. SIGCOMM, Philadelphia, PA, USA,      pp. 133-144.
  3. Chlamtac. I, Conti. M and Liu J.-N, (2003), ‘Mobile ad hoc networking: Imperatives and challenges’, Ad Hoc Networks., Vol. 1, no. 1, pp. 13-64.
  4. Clausen. T and Jacquet. P, (2003) ‘Optimized Link State Routing Protocol (OLSR)’, RFC 3626.
  5. Johnson. D. B and Maltz. D. A, (2007), ‘On The Dynamic Source Routing Protocol (DSR) for mobile ad hoc networks for IPv4’, RFC 4728.
  6. Murthy. S, (1996), ‘Routing in packet-switched networks using path-finding algorithms’, Ph.D. dissertation, Computer Engineering., University of California, USA.
  7. Murthy. S. and Garcia-Luna-Aceves. J. J, (1996), ‘An efficient routing protocol for wireless networks’, Mobile Networks Application., Vol. 1, no. 2, pp. 183-197.
  8. Perkins. C. E and Bhagwat. P, (1994), ‘Highly dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers’, Computer Communication., Vol. 24, pp. 234-244.
  9. Perkins. C. E and Royer E. M, (2003), ‘Ad hoc On-Demand Distance Vector (AODV) routing’, RFC 3561.
  10. Rajaraman. R, (2002), ‘Topology control and routing in ad hoc networks: A survey’, ACM SIGACT News, Vol. 33, no. 2, pp. 60-73.
  11. West. D, (2000), ‘Introduction to Graph Theory’, 2nd ed. Upper Saddle River, NJ, USA: Prentice-Hall.
  12. Zehua Wang,Yuanzhu Chen, and Cheng Li, (2014), ‘PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks’, IEEE Transactions On Vehicular Technology., Vol. 63, no. 2, pp. 859 - 868.
  13. ArunmozhiAnnamalai, VenkataramaniYegnanarayanan, September 2012,‘Secured System against DDoS Attack in Mobile Adhoc Network’ Issue 9, Volume 11E-ISSN: 2224-2864.
  14. M .Nasir Iqbal, JunaidA.Khan, (2013), ‘Security Enhancement of Pro-active Protocols in Mobile Ad-hoc Networks’,      J. Basic. Appl. Sci. Res., 3(3)101-107.

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 339-346
Manuscript Number : IJSRSET1522105
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

R. Deenadhayalan, S.Anandamurugan, " Efficient technique to Detect Blackhole Attack in Mobile Ad Hoc Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.339-346, March-April-2015.
Journal URL : http://ijsrset.com/IJSRSET1522105

Follow Us

Contact Us