CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks

by Raj Shree, Sanjay Kr. Dwivedi, Ravi Prakash Pandey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 18 - Number 5
Year of Publication: 2011
Authors: Raj Shree, Sanjay Kr. Dwivedi, Ravi Prakash Pandey
10.5120/2283-2959

Raj Shree, Sanjay Kr. Dwivedi, Ravi Prakash Pandey . Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks. International Journal of Computer Applications. 18, 5 ( March 2011), 6-10. DOI=10.5120/2283-2959

@article{ 10.5120/2283-2959,
author = { Raj Shree, Sanjay Kr. Dwivedi, Ravi Prakash Pandey },
title = { Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 18 },
number = { 5 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume18/number5/2283-2959/ },
doi = { 10.5120/2283-2959 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:05:29.160977+05:30
%A Raj Shree
%A Sanjay Kr. Dwivedi
%A Ravi Prakash Pandey
%T Design Enhancements in ZRP for Detecting Multiple Black Hole Nodes in Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 18
%N 5
%P 6-10
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a day, security in Mobile Ad hoc Network (MANET) is very important issue. Due to dynamic topology and mobility of nodes, Mobile Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless network. Nodes of Mobile Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication. Mobile ad hoc Network (MANET) is different than wireless sensor network (WSN). Mobile ad hoc network is more vulnerable than WSN. Therefore attacks in MANETs are very frequent than other networks. In this research paper we are describing black hole attacks which are easy to launch in wireless ad hoc network. Black hole attack is referred to as a node dropping all packets and sending forged routing packets to route packets over itself. In this paper, we are considering a zone with multiple black hole nodes that can work co-operatively and we are implementing Secure-ZRP protocol which can be used to prevent black hole attack in MANETs. We evaluated performance in Qualnet simulator. Our analysis indicates that S-ZRP is very suitable & efficient protocol to stop this attack.

References
  1. E. A .Mary Anita and V. Vasudevan, “Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining”, International Journal of Computer Applications (0975 – 8887) Volume 1 – No. 12, pp. 21-28, 2010.
  2. N. Bhalaji and A. Shanmugam, “A Trust Based Model to Mitigate Black Hole Attacks in DSR Based Manet”, European Journal of Scientific Research ISSN 1450-216X Vol.50 No.1, pp.6-15, 2011.
  3. Latha Tamilselvan and Dr. V Sankaranarayanan, “Prevention of Blackhole Attack in MANET”, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, 0-7695-2842-2/07, 2007.
  4. Chang Wu Yu, Tung-Kuang Wu, Rei Heng Cheng, and Shun Chao Chang, “A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks”, PAKDD 2007 Workshops, LNAI 4819, pp. 538–549, 2007.
  5. Santhosh Krishna B.V, Mrs.Vallikannu A.L, “Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism” International Journal of Scientific & Engineering Research, Volume 1, Issue 3, ISSN 2229-5518, December-2010.
  6. Hongmei Deng, Wei Li and Dharma P. Agrawal, “ Routing Security inWireless Ad Hoc Network”, IEEE Communications Magzine, vol. 40, no. 10, October 2002.
  7. Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, and Kendall Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”, International Conference on Wireless Networks (ICWN’ 03), Las Vegas, Nevada, USA, 2003.
  8. M.Saravana karthikeyan, K.Angayarkanni , and Dr.S.Sujatha, “ Throughput Enhancement in Scalable MANETs using Proactive and Reactive Routing Protocols”, Proceedings of International Multiconference of engineers and computer scientists, Vol2, Hong Kong, March17-19, 2010.
  9. S. R. Biradar, Hiren H D Sarma, Kalpana Sharma, Subir Kumar Sarkar , Puttamadappa C, “Performance Comparison of Reactive Routing Protocols of MANETs using Group Mobility Model”, Proceedings of International Conference on Signal Processing Systems, 2009.
  10. Shima Mohseni, Rosilah Hassan, Ahmed Patel, and Rozilawati Razali, “Comparative Review Study of Reactive and Proactive Routing Protocols in MANETs”,Proceedings of 4th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2010), 2010.
  11. Yasser Gadallah and Hadeel El-Kassabi, “A WSN/MANET Hybrid Protocol for Routing Data in Heterogeneous Wireless Sensor Networks”, study supported under the UAE University individual research grant number 01-03-9-11/07, 2008.
  12. Amit Kumar Jaiswal and Pardeep Singh, “New Scheme of Adaptive Zone Routing Protocol”, International Journal of Computer Science & Communication, Vol. 1, No. 2, pp. 207-210, July-December 2010.
  13. Mr. Kamaljit I. Lakhtaria and Mr. Paresh Patel, “Analyzing Zone Routing Protocol in MANET Applying Authentic Parameter”, Global Journal of Computer Science and Technology, Vol. 10, Issue 4, Ver. 1.0, pp. 114-118, June 2010.
  14. Akio Koyama, Yoshitaka Honma, Junpei Arai, Leonard Barolli, “ An Enhanced Zone-Based Routing Protocol for Mobile Ad-Hoc Networks Based on Route Reliability”, IEEE proceedings, 2006.
  15. Haas, Z.J., Pearlman, M.R., Samar, P., “The Zone Routing Protocol(ZRP)”, IETF Internet Draft, draft-ietf-manet-zone-zrp-04.txt, July 2002.
  16. Haas, Z.J., Pearlman, M.R., Samar, P., “Intrazone Routing Protocol (IARP)”, IETF Internet Draft, draft-ietf-manet-iarp-02.txt, July 2002.
  17. Haas, Z.J., Pearlman, M.R., Samar, P., “Interzone Routing Protocol (IERP)”, IETF Internet Draft, draft-ietf-manet-ierp-02.txt, July 2002.
  18. Haas, Z.J., Pearlman, M.R., Samar, P., “Bordercasting Resolution Protocol (BRP)”, IETF Internet Draft, draft-brp-manet-iarp-02.txt, July 2002.
Index Terms

Computer Science
Information Sciences

Keywords

ZRP Secure ZRP protocol