CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

by Neelima Gupta, Krishnakant Kishore
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 2
Year of Publication: 2015
Authors: Neelima Gupta, Krishnakant Kishore
10.5120/19641-1227

Neelima Gupta, Krishnakant Kishore . An Implementation of Secure Wireless Network for Avoiding Black hole Attack. International Journal of Computer Applications. 112, 2 ( February 2015), 34-40. DOI=10.5120/19641-1227

@article{ 10.5120/19641-1227,
author = { Neelima Gupta, Krishnakant Kishore },
title = { An Implementation of Secure Wireless Network for Avoiding Black hole Attack },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 2 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number2/19641-1227/ },
doi = { 10.5120/19641-1227 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:24.538022+05:30
%A Neelima Gupta
%A Krishnakant Kishore
%T An Implementation of Secure Wireless Network for Avoiding Black hole Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 2
%P 34-40
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc network (MANET) is a temporary infrastructure less network, Due to absence of infrastructure, MANET is vulnerable to attacks such as Black hole attack, Gray hole attack, wormhole attack, Sybil attack, and Route table modification attack. This research is concerned with "includes a way to produce and implement a simulation based solution, which is based on cluster organization of network approach". The proposed scheme is device specific technique, where individual devices are creating a trust over network and based on these trust values the network cluster heads and monitoring servers deciding malicious activities in network.

References
  1. Muhammad Raza1 and Syed Irfan Hyder2 in January 2012 (A Forced Routing Information Modification Model for Preventing Black Hole Attacks in Wireless Ad Hoc Network)
  2. E. A. Mary Anita, V. Vasudevan, A. Ashwini in 2010. ( A Certificate-Based Scheme to Defend Against Worm Hole Attacks in Multicast Routing Protocols for MANETs)
  3. Sudharson Kumar and Parthipan. V in June 2011. ( SOPE: Self-Organized Protocol for Evaluating Trust in MANET using Eigen Trust Algorithm)
  4. U. Venkanna and R Leela Velusami in 2011. (Black Hole Attack and Their Counter Measure Based On Trust Management in Manet. )
  5. Fidel Thachil 1, K C Shet 2 in 2012, A trust based approach for AODV protocol to mitigate black hole attack in MANET.
  6. E. A. Mary Anita V. Vasudevan2, A. Ashwini3 in 2010, A Certificate-Based Scheme to Defend Against Worm Hole Attacks in Multicast Routing Protocols for MANETs.
  7. Muhammad Raza1 and Syed Irfan Hyder2 in 9th - 12th January, 2012, A Forced Routing Information Modification Model for Preventing Black Hole Attacks in Wireless Ad Hoc Network
  8. Mehdi Sookhak 1, Mahbubeh Haghparast 2, Abdullah Gani 3 in 2012, Anomaly detection in Geographic Routing Protocols.
Index Terms

Computer Science
Information Sciences

Keywords

MANET MAODV Cluster Head security wireless networks