Interception of black-hole attacks in mobile AD-HOC networks

    Research output: Contribution to conferencePaperpeer-review

    2 Citations (Scopus)

    Abstract

    Mobile Ad-hoc network (MANET), is one of the ideal means for communication using mobile devices, as the devices here can configure themselves without a strict interference by the network administrators. Providing apt security for such networks is a challenging task and this area has proved itself as a vital field for researchers. MANET s are more susceptible to network attacks because of their dynamic network topology, absence of centralized monitoring, unavailability of sufficient resources to support their changing environment and restricted power supply. In this paper, we scrutinize one among the denial of service attacks known as the black hole attack. In this attack, a malicious node broadcasts a false route via itself as the most compact and valid path to the destination [1]. Using this fabricated route the malignant node schemes to intercept and consume all data packets intended for the destination node. An approach employing SAODV (secure ad-hoc on demand distance vector) routing algorithm is advocated in this paper to reveal and intercept black hole attacks in mobile networks. Here we use watchdog mechanism as an add-on in SAODV routing algorithm for detection and prevention of the black hole nodes in the MANET. The proposed methodology enhances the packet delivery ratio and performance in the presence of multiple black hole nodes in Mobile ad hoc networks.

    Original languageEnglish
    DOIs
    Publication statusPublished - 01-01-2016
    Event2016 International Conference on Inventive Computation Technologies, ICICT 2016 - Coimbatore, India
    Duration: 26-08-201627-08-2016

    Conference

    Conference2016 International Conference on Inventive Computation Technologies, ICICT 2016
    Country/TerritoryIndia
    CityCoimbatore
    Period26-08-1627-08-16

    All Science Journal Classification (ASJC) codes

    • Computer Vision and Pattern Recognition
    • Artificial Intelligence
    • Computer Graphics and Computer-Aided Design
    • Computer Networks and Communications
    • Computer Science Applications
    • Health Informatics

    Fingerprint

    Dive into the research topics of 'Interception of black-hole attacks in mobile AD-HOC networks'. Together they form a unique fingerprint.

    Cite this