Remove the black-hole attack in mobile ADHOC network using Threshold Based Technique

  • Sanjay Yadav M.Tech Scholar, Department CSE, TIEIT Bhopal
  • Kaptan Singh Department of CSE TIEIT Bhopal
Keywords: MANET, AODV, Black-Hole, Threshold

Abstract

In this paper enhanced the AODV routing protocol for the prevention of black hole attack. The enhanced AODV routing protocol based on the principle of thresholding. The thresholding using the concept of reference node selection process. The reference node selection process creates two group of node one is path altered group and other is stable path with sensibility. The sensibility path estimates the hop count and packet sequence number. If the number of hop count is not changed or the sequence of packet is also not lost is called sensitivity path of network. The function of threshold generated by the node distance formula based on the Euclidean distance derivation. The enhanced AODV protocol simulate in NS2.34 simulators and measure some standard parameter such as PDR, throughput, overload and E2E delivery ratio.

References

[1] Sandeep Gupta, Abhishek Mathur “Enhanced Flooding Scheme for AODV Routing Protocol in Mobile Ad hoc Networks” International Conference on Electronic Systems, Signal Processing and Computing Technologies, IEEE, 2014. Pp 316-321.
[2] Ranjan Dasgupta, Ritwick Mukherjee and Prof Dr Amitava Gupta “Congestion Avoidance Topology in Wireless Sensor Network using Karnaugh Map” Applications and Innovations in Mobile Computing (AIMoC), IEEE,2015.Pp 89-96.
[3] Jun Long, Mianxiong Dong, Kaoru Ota, Anfeng Liu, and Songyuan Hai “Reliability Guaranteed Efficient Data Gathering in Wireless Sensor Networks” Reliability Guaranteed Efficient Data Gathering in WSNs, IEEE, 2015. Pp 430-444.
[4] Shabana Mehfuz, Sumit Kumar “Energy Aware Probabilistic Broadcasting for Mobile Adhoc Network” 2nd International Conference on Computingfor Sustainable Global Development (INDIACom), IEEE, 2015. Pp 1028-1033.
[5] Kartikay Garg, Pratibha and Shailender Gupta “A Novel Routing Strategy for Cognitive Radio Adhoc Network” 2nd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, 2015. Pp 1379-385.
[6] Zhimu Huang, Ryo Yamamoto, Yoshiaki Tanaka “A Multipath Energy-Efficient Probability Routing Protocol in Ad Hoc Networks” ICACT, IEEE, 2015. Pp 244-250.
[7] Akshai Aggarwal, Savita Gandhi, Nirbhay Chaubey, Keyurbhai A Jani “Trust Based Secure on Demand Routing Protocol (TSDRP) for MANETs” Fourth International Conference on Advanced Computing & Communication Technologies, IEEE, 2014.Pp 432-438.
[8] Junfeng Wang, Yin Zhang, Jialun Wang, Yujun Ma, and Min Chen “PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network” IEEE internet of things journal, vol. 2, no. 1, February 2015, Pp 14-22.
[9] Cheng chunling, Hao jingbo, Zhang dengyin “An Expanding Ring Prediction and Location Aided AODV Routing Algorithm” International Conference of Information Technology, Computer Engineering and Management Sciences, IEEE, 2011. Pp 61-64.
[10] Dinesh Singh, Ashish K. Maurya, Anil K. Sarje “Comparative Performance Analysis of LANMAR, LAR1, DYMO and ZRP Routing Protocols in MANET using Random Waypoint Mobility Model” IEEE, 2011. Pp 62-66.
[11] S.Preethi, B. Ramachandran “Energy Efficient Routing Protocols for Mobile AdHoc Networks” IEEE, 2011. Pp 1136-141.
[12] Jih-ching Chiu1, Chun-Yao Zheng, Yao-Chin Huang and Kai-Ming Yang “Design and Implementation of Sequential Repair and Backup Routing Protocol for Wireless Mesh Network” IEEE, 2011. Pp 1066-1070.
[13] Chaitali Biswas Dutta, Utpal Biswas “A Novel Blackhole Attack for Multipath AODV and its Mitigation” International Conference on Recent Advances and Innovations in Engineering, IEEE, 2014. Pp 1-6.
[14] Bow-Nan Cheng, Scott Moore” A Comparison of MANET Routing Protocols on Airborne Tactical Networks” 978-4673, IEEE 2013, PP 67-89.
[15] M. Goyal, M. Soperi, E. Baccelli, G. Choudhury, A. Shaikh, H. Hosseini, and K. Trivedi ” Improving Convergence Speed and Scalability in OSPF: A Survey” IEEE COMMUNICATIONS SURVEYS & TUTORIALS 1553-877, IEEE 2012,PP 86-92.
[16] Gihan Nagib and Wahied G. Ali” Network Routing Protocol using Genetic Algorithms” International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10, 2010, PP 56-67.
[17] Joseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, Stephen right” Power Awareness in Network Design and Routing” 9781-4244-IEEE 2008,PP 42-53.
[18] Kaixin Xu, Mario Gerla” A Heterogeneous Routing Protocol Based On A New Stable Clustering Scheme” IEEE 2010, PP 36-45.
[19] Murali Kodialam T. V. Lakshman” Minimum Interference Routing with Applications to MPLS Traffic Engineering” IEEE 2010, PP 56-64.
[20] Mirco Musolesi, Cecilia Mascolo” A Community Based Mobility Model for Ad Hoc Network Research” 1595933603 ACM 2010, PP 85-94.
[21] Anton Riedl” Optimized Routing Adaptation in IP Networks Utilizing OSPF and PLS”IEEE 2010, PP56-67.
Published
2016-10-20
How to Cite
Yadav, S., & Singh, K. (2016). Remove the black-hole attack in mobile ADHOC network using Threshold Based Technique. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(12), 7316-7321. https://doi.org/10.24297/ijct.v15i12.3966
Section
Articles