Open Access   Article Go Back

An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network

S.Anusuya 1 , S.Meenakshi 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-12 , Page no. 112-117, Dec-2015

Online published on Dec 31, 2015

Copyright © S.Anusuya , S.Meenakshi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Anusuya , S.Meenakshi, “An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.112-117, 2015.

MLA Style Citation: S.Anusuya , S.Meenakshi "An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network." International Journal of Computer Sciences and Engineering 3.12 (2015): 112-117.

APA Style Citation: S.Anusuya , S.Meenakshi, (2015). An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network. International Journal of Computer Sciences and Engineering, 3(12), 112-117.

BibTex Style Citation:
@article{_2015,
author = {S.Anusuya , S.Meenakshi},
title = {An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2015},
volume = {3},
Issue = {12},
month = {12},
year = {2015},
issn = {2347-2693},
pages = {112-117},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=765},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=765
TI - An Improved Dynamic Source Routing Protocol for Detection and Removal of Black Hole Attack in Mobile Ad-Hoc Network
T2 - International Journal of Computer Sciences and Engineering
AU - S.Anusuya , S.Meenakshi
PY - 2015
DA - 2015/12/31
PB - IJCSE, Indore, INDIA
SP - 112-117
IS - 12
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2380 2265 downloads 2268 downloads
  
  
           

Abstract

A mobile ad-hoc network (MANET) is a group of wireless mobile devices or nodes that communicate with each other without any help of a pre-installed infrastructure and centralized access points. Security is the most important concern for the functionality of network in MANET. MANET is unsecure from various attacks in the routing path and understanding the form of attacks is always the primary step towards the secured communication between mobile nodes. A number of attacks affect the safe exchange of information in MANET and among them the occurrence of black hole attack causes several limitations such as fault tolerance, packet loss, denial of service and jamming of network while transmitting data between nodes in the route. In order to preserve the security of MANET from attacks, routing protocols are important to ensure proper functioning of the path from source to destination nodes. In this research paper an improved dynamic source routing (IDSR) technique has been proposed to detect and remove the black hole attack nodes in the routing path and ensures reliable communication between nodes by constructing the black hole attack free route in MANET.

Key-Words / Index Term

MANET, black hole attack, routing protocols, dynamic source routing technique

References

[1] Alex Hinds, Michael Ngulube, Shaoying Zhu, and Hussain Al-Aqrabi, “A Review of Routing Protocols for Mobile Ad-Hoc Networks (MANET)”, International Journal of Information and Education Technology, Vol. 3, No. 1, February 2013.
[2] S. Anusuya, Dr. S.Meenakshi, “A Review of Routing Protocols and Attacks in Mobile Ad-hoc Network”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 4, Issue 9, pp.3485-3493, September 2015.
[3] T.Ashish Bhole, Prachee ,N. Patil “Study Of Black hole Attack In MANET”, International Journal of Engineering and Innovative Technology, Vol.2, No. 4, October 2012.
[4] C-C Chiang, H-K Wu, W .Liu, M.Gerla “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel”, In Proceedings of IEEE SICON, pp.197–211, 1997.
[5] H. Deng, W. Li, and Dharma P. Agrawal, “Routing Security in Ad Hoc Networks,” IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol. 40, No. 10, pp. 70-75, October 2002.
[6] M. Girish Chandra ,S.G.HarishReddy,JaydipSen “A Mechanism for Detection of black hole attack in Manets”, In Proceeding of the 6th International Conference on Information, Communication and Signal Processing(ICICS07), Singapore, December 2010.
[7] HesiriWeerasinghe and Huirong Fu, Member of IEEE, “Preventing Cooperative Black Hole Attacks in Mobile Ad-hoc Networks”, Simulation implementation and evaluation, Vol. 2, No.3, July 2008.
[8] JaydipSen, M. Girish Chandra, Harihara S.G., Harish Reddy, P. Balamurlidhar (Embedded System Research Group, TCS), “Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks”, IEEE 2007.
[9] D. B. Johnson, DA.Maltz and J.Broch “Dynamic Source Routing Protocol (DSR)”, ACM Digital Library, pp 210-215, October 1996.
[10] M.Mohanapriya, krishnamurthi “DSR protocol for detection and removal of black hole attack in MANET”, ELSEVIER computer and electrical engineering, pp.530-538, 2014.
[11] V. G. Muralishankar and Dr. E. George Dharma Prakash Raj, “Routing Protocols for MANET: A Literature Survey”, International Journal of Computer Science and Mobile Applications, Vol. 2, No.3, March 2014.
[12] D.B.Roy, R.Chaki and N.Chaki, “A New Cluster-Based black hole Intrusion Detection Algorithm for Mobile Ad Hoc Networks”, International Journal of Network Security and Its Application (IJNSA), Vol. 1, No.1, April, 2009.
[13] Shalini, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by dynamic learning method”, International Journal of Network Security”, Vol.5, No.3, pp. 338-346, 2007.
[14] Tamilselvan, L.Sankaranarayanan, “Prevention of black hole Attack in MANET”, International Journal of networks Network Security, Vol.3, No.5, May 2008.