Cluster-based technique for detection and prevention of black-hole attack in MANETs
Title | Cluster-based technique for detection and prevention of black-hole attack in MANETs |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Saurabh, V. K., Sharma, R., Itare, R., Singh, U. |
Conference Name | 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA) |
Date Published | apr |
Keywords | Ad hoc networks, ad hoc routing, AODV, AODV routing protocol, attack detection, black-hole attack, black-hole attack detection, black-hole attack prevention, cluster head, Cluster-head, clustering, clustering direction, compositionality, contagious nodes, cryptographic protocols, data packets, data transfer, end to end delay throughput, energy simulation inferences, ETD throughput, fresh route, malicious nodes, MANET, Metrics, mobile ad hoc network, mobile ad hoc networks, mobile computing, NS2 simulator, packet delivery ratio, particular node, pattern clustering, PDR, pubcrawl, rapid node mobility, resilience, Resiliency, Routing, Routing protocols, Secure Routing, security, telecommunication security, Throughput, trustworthy security protocol |
Abstract | Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low configuration and quick deployment, MANETs are well-suited for emergency situations like natural disasters or military applications. Therefore, data transfer between two nodes should necessarily involve security. A black-hole attack in the mobile ad-hoc network (MANET) is an offense occurring due to malicious nodes, which attract the data packets by incorrectly publicizing a fresh route to the destination. A clustering direction in AODV routing protocol for the detection and prevention of black-hole attack in MANET has been put forward. Every member of the unit will ping once to the cluster head, to detect the exclusive difference between the number of data packets received and forwarded by the particular node. If the fault is perceived, all the nodes will obscure the contagious nodes from the network. The reading of the system performance has been done in terms of packet delivery ratio (PDR), end to end delay (ETD) throughput and Energy simulation inferences are recorded using ns2 simulator. |
URL | https://ieeexplore.ieee.org/document/8212712/ |
DOI | 10.1109/ICECA.2017.8212712 |
Citation Key | saurabh_cluster-based_2017 |
- pubcrawl
- MANET
- Metrics
- mobile ad hoc network
- mobile ad hoc networks
- mobile computing
- NS2 simulator
- packet delivery ratio
- particular node
- pattern clustering
- PDR
- malicious nodes
- rapid node mobility
- resilience
- Resiliency
- Routing
- Routing protocols
- Secure Routing
- security
- telecommunication security
- Throughput
- trustworthy security protocol
- clustering direction
- ad hoc routing
- AODV
- AODV routing protocol
- Attack detection
- black-hole attack
- black-hole attack detection
- black-hole attack prevention
- cluster head
- Cluster-head
- clustering
- Ad hoc networks
- Compositionality
- contagious nodes
- Cryptographic Protocols
- data packets
- data transfer
- end to end delay throughput
- energy simulation inferences
- ETD throughput
- fresh route