IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1522105                                                     

Efficient technique to Detect Blackhole Attack in Mobile Ad Hoc Networks


R. Deenadhayalan, S.Anandamurugan
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
An ad hoc routing protocol is a pattern, or standard, that controls to routepackets between mobile devices in a mobile ad hoc network. A new node announces its presence and listens for announcements broadcast by its neighbours. To communicate one node to another one, each node can act as both host as well as router at the same time and perform all the routing and state maintenance operations. Source routing allows a sender of a packet to partially or completely specify the route the packet takes through the network. Source routing allows easier troubleshooting, improved traceroute, and enables a node to discover all the possible routes to a host. Opportunistic data forwarding has not been widely utilized in MANETs, because the lack of an efficient lightweight proactive source routing capability. A lightweight Table Driven Source Routing (TDSR) protocol can maintain more network topology information than Distance Vector (DV). To facilitate source routing and also smaller overhead than DV-based protocols, Link State (LS) and reactive source routing protocols.The threats to users of wireless technology have increased as the service has become more popular.Because of the dynamically changing topology, open environment and lack of security infrastructure, a mobile ad hoc network (MANET) is susceptible to the presence of malicious nodes and to ad hoc routing attacks. The variety of routing attacks that target the weakness of MANETs.In proposed scheme, efforts on mobile ad hoc network's routing weakness and analyzes the network performance under black hole attack that can easily be employed against the mobile ad hoc network (MANET). The resistive schemes against these attacks were proposed for Table Driven Source Routing (TDSR) protocol and the effectiveness of the schemes is validated using NS2 simulations.

R. Deenadhayalan, S.Anandamurugan

Access control, authentication, attribute-based encryption, cloud storage.

  1. Behrens. J and Garcia-Luna-Aceves J. J, (1994), ‘Distributed, scalable routing based on link-state vectors’, ACM Conference. SIGCOMM, pp. 136-147.
  2. Biswas. S and Morris. R, (2005), ‘ExOR: Opportunistic multi-hop routing for wireless networks’, ACM Conference. SIGCOMM, Philadelphia, PA, USA,      pp. 133-144.
  3. Chlamtac. I, Conti. M and Liu J.-N, (2003), ‘Mobile ad hoc networking: Imperatives and challenges’, Ad Hoc Networks., Vol. 1, no. 1, pp. 13-64.
  4. Clausen. T and Jacquet. P, (2003) ‘Optimized Link State Routing Protocol (OLSR)’, RFC 3626.
  5. Johnson. D. B and Maltz. D. A, (2007), ‘On The Dynamic Source Routing Protocol (DSR) for mobile ad hoc networks for IPv4’, RFC 4728.
  6. Murthy. S, (1996), ‘Routing in packet-switched networks using path-finding algorithms’, Ph.D. dissertation, Computer Engineering., University of California, USA.
  7. Murthy. S. and Garcia-Luna-Aceves. J. J, (1996), ‘An efficient routing protocol for wireless networks’, Mobile Networks Application., Vol. 1, no. 2, pp. 183-197.
  8. Perkins. C. E and Bhagwat. P, (1994), ‘Highly dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers’, Computer Communication., Vol. 24, pp. 234-244.
  9. Perkins. C. E and Royer E. M, (2003), ‘Ad hoc On-Demand Distance Vector (AODV) routing’, RFC 3561.
  10. Rajaraman. R, (2002), ‘Topology control and routing in ad hoc networks: A survey’, ACM SIGACT News, Vol. 33, no. 2, pp. 60-73.
  11. West. D, (2000), ‘Introduction to Graph Theory’, 2nd ed. Upper Saddle River, NJ, USA: Prentice-Hall.
  12. Zehua Wang,Yuanzhu Chen, and Cheng Li, (2014), ‘PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks’, IEEE Transactions On Vehicular Technology., Vol. 63, no. 2, pp. 859 - 868.
  13. ArunmozhiAnnamalai, VenkataramaniYegnanarayanan, September 2012,‘Secured System against DDoS Attack in Mobile Adhoc Network’ Issue 9, Volume 11E-ISSN: 2224-2864.
  14. M .Nasir Iqbal, JunaidA.Khan, (2013), ‘Security Enhancement of Pro-active Protocols in Mobile Ad-hoc Networks’,      J. Basic. Appl. Sci. Res., 3(3)101-107.

Publication Details

Published in : Volume 1 | Issue 2 | March-April - 2015
Date of Publication Print ISSN Online ISSN
2015-04-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
339-346 IJSRSET1522105   Technoscience Academy

Cite This Article

R. Deenadhayalan, S.Anandamurugan, "Efficient technique to Detect Blackhole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.339-346, March-April-2015.
URL : http://ijsrset.com/IJSRSET1522105.php