CFP last date
22 April 2024
Reseach Article

Performance Enhancement and Mitigation of Black Hole Attack in MANET using CRN and Enhanced AODV

by Natasha, Preety Chaudhary, Rakesh Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 13
Year of Publication: 2016
Authors: Natasha, Preety Chaudhary, Rakesh Kumar
10.5120/ijca2016912587

Natasha, Preety Chaudhary, Rakesh Kumar . Performance Enhancement and Mitigation of Black Hole Attack in MANET using CRN and Enhanced AODV. International Journal of Computer Applications. 156, 13 ( Dec 2016), 16-20. DOI=10.5120/ijca2016912587

@article{ 10.5120/ijca2016912587,
author = { Natasha, Preety Chaudhary, Rakesh Kumar },
title = { Performance Enhancement and Mitigation of Black Hole Attack in MANET using CRN and Enhanced AODV },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 13 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number13/26769-2016912587/ },
doi = { 10.5120/ijca2016912587 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:31.362864+05:30
%A Natasha
%A Preety Chaudhary
%A Rakesh Kumar
%T Performance Enhancement and Mitigation of Black Hole Attack in MANET using CRN and Enhanced AODV
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 13
%P 16-20
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET is field of networking that is used to transmit information. MANET utilizes different routing strategies for data transmission from source to destination. Mobility is main concern in MANET due to path management for data transmission. In this paper MANET security has been discussed to overcome various attacks performed by attacker.in this paper black hole attack detection has been done on the basis of dynamic detection strategies malicious node that degrades performance of network has been detected. Purposed approach provides much better results than previous approaches available for data communication and attack detection in MANET.

References
  1. Shakshuki, E.M. “EAACK-A Secure Intrusion-Detection System for MANETs” IEEE Journals on Industrial Electronics, Volume 60, 2012, pp. 1089–1098.
  2. Lee, Uichin. “Efficient peer-to-peer files sharing using network coding in MANET”IEEE Journal on Communications and Networks, Volume10, 2008, pp. 422–429.
  3. Hiranandani, “MANET protocol simulations considered harmful: the case for benchmarking” IEEE Journal on Wireless Communications, Volume: 20, 2013, pp. 82 – 90.
  4. Burbank, J.L. “Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology” journal IEEE on Communications Magazine, Volume 44, 2006, pp-39 – 45.
  5. Dongkyun Kim. “Improving TCP-Vegas Performance over MANET Routing Protocols” journal IEEE on Vehicular Technology, Volume 56, 2007, pp. 372 – 377.
  6. El Defrawy, K. “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs IEEE Journal on Mobile Computing, Volume10, 2010, pp. 1345 – 1358.
  7. Di Crescenzo, G. “Securing reliable server pooling in MANET against byzantine adversaries” IEEE Journal on Selected Areas in Communications, Volume 24 , 2006,pp- 357 – 369.
  8. Bellavista, P. “Convergence of MANET and WSN in IoT Urban Scenarios” IEEE Journal on Volume 13, 2013, pp.3558 – 3567.
  9. Ziming Zhao “Risk-Aware Mitigation for MANET Routing Attacks”, IEEE Journal on Dependable and Secure Computing, Volume 9, 2011, pp. 250–260.
  10. Gaeta, R. “Exploiting Rate less Codes and Belief Propagation to Infer Identity of Polluters in MANET”, IEEE Journal on Mobile Computing, Volume 13, pp. 1482 – 1494.
Index Terms

Computer Science
Information Sciences

Keywords

Black hole nodes CRN Mobile Ad-hoc Network