A SURVEY ON IMPROVING THE PERFORMANCE OF DSR PROTOCOL UNDER BLACKHOLE ATTACK IN MANET
Creators
- 1. Department of Information Technology, AMET University, Chennai, Tamilnadu
Description
The Mobile Ad-hoc Network is a network in which the nodes can communicate with other nodes without infrastructure network. This network has exposed to handle different types of attacks. Black hole attack is one of the attack in which the node itself claim the fake RREP that has shortest distance to reach destination. In this way that the node drops the packets from sender and further, it will not forward the packets to any other node. Such type of node is known as malicious node. Most of the researchers are find feasible solution to improve the performance of routing protocol under this attack. This paper presents the analysis on improving the performance of DSR Protocol under black hole attack.
Files
166.pdf
Files
(310.3 kB)
Name | Size | Download all |
---|---|---|
md5:4f14ff69619a571d7ed6f3b73748885e
|
310.3 kB | Preview Download |
Additional details
References
- 1. Padiya S, Pandit R, Patel S. Survey of Innovated Techniques to Detect Selfish Nodes in MANET. International Journal of Computer Networking. 2013. 2. Koshti D, Kamoji S. Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks. IJSCE. 2011. 3. He Q, Wu D, Khosla P. Sori: A secure and objective reputation based incentive scheme for ad-hoc networks. WCNC; 2004. p. 825–30 4. Buchegger S, Boudec JL. Performance analysis of the confidant protocol: (cooperative of nodes – fairness in dynamic ad hoc networks). Proceedings IEEE/ACM Workshop on (MobiHoc'02); 2002 Jun. p. 226–336. 5. Michiardi P, Molva R. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. CMS'02; 2002 Sep. 6. Liu K, Deng J, Varshney P, Balakrishnan K. An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computing. 2006 7. Samba P, Aswini M, Kusuma T, Vasudha Y. Detection of Routing Misbehavior Nodes Using Improved 2-ACK in MANET'S (Simulation through NS-2). International Journal of Computer Science and Information Technologies. 2014; 5(2):1042–4. 8. G. Vennila, D. Arivazhagan, "Hash based Technique to Identify the Selfish Node in Mobile Ad-hoc Network", Indian Journal of Science and Technology, Vol 8(14), 70696, July 2015 9. G. Vennila, D. Arivazhagan, "Prevention of Co-operative Black Hole attack in Manet on DSR protocol using Cryptographic Algorithm", International Journal of Engineering and Technology (IJET), Vol 6 No 5 Oct-Nov 2014. 10. Nitin Khanna, "Mitigation of Collaborative Blackhole Attack using Trace Route Mechanism with Enhancement in AODV Routing Protocol", International Journal of Future Generation Communication and Networking, Vol. 9, No. 1 (2016), pp. 157-166. 11. D. B. Jagannadha Rao, Karnam Sreenu, Parsi Kalpana, "A Study on Dynamic Source Routing Protocol for Wireless Ad Hoc Networks", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 8, October 2012.