Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/3007
Title: | An Effective Black Hole Attack Detection Mechanism using Permutation Based Acknowledgement in MANET |
Authors: | Dave, Dhaval Dave, Pranav |
Keywords: | MANET Black Hole |
Issue Date: | 2015 |
Publisher: | Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014 |
Citation: | 10.1109/ICACCI.2014.6968417 |
Abstract: | With the evolution of wireless technology and use of mobile devices, Mobile Ad-hoc Network has become popular among researchers to explore. A mobile ad-hoc network (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links. The routers and hosts are free to move randomly and organize themselves arbitrarily. It allows mobile nodes to communicate directly without any centralized coordinator. Such network scenarios cannot rely on centralized and organized connectivity, and can be conceived as applications of Mobile Ad-Hoc Networks. Thus, MANET is vulnerable due to its dynamic network topology, as any node become untrusted at any time. The Black hole attack is one kind of security risk in which malicious node advertises itself to have a shortest path for any destination, to forge data or for DOS attack. In this paper, to detect such nodes effectively, we propose a Permutation based Acknowledgement for most widely used reactive protocol ad-hoc on demand distance vector routing AODV. This mechanism is enhancement of Adaptive Acknowledgement (AACK) and TWO-ACK, here we have tried to show the efficiency increment by decreasing number of messages routed in the network. |
Description: | NITW |
URI: | http://localhost:8080/xmlui/handle/123456789/3007 |
Appears in Collections: | Computer Science & Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
An_effective_Black_hole_attack_detection_mechanism_using_Permutation_Based_Acknowledgement_in_MANET.pdf | 1.32 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.