Two-Step Verification Technique for Isolation of Black hole Attack in MANETs

  • Rao* A
  • et al.
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A network in which the nodes can configure themselves and change their locations is known as mobile ad hoc network. For connecting to other networks, MANETs use wireless connections since they are mobile. Signal protection and reliability of mobile nodes are the major challenges faced by the applications which use MANETs. An active intrusion attack that is initiated by a malicious node to degrade the network’s performance is known as black hole attack. A new approach is proposed in this research that uses the blacklist and clustering approaches to remove this attack from networks. NS2 simulation is used to conduct simulation experiments for evaluating the performance of proposed method. The outcomes show that the performance of proposed method is better in terms of different performance parameters as compared to the traditional approaches.

Cite

CITATION STYLE

APA

Rao*, A. S. V., & Chauhan, D. S. (2019). Two-Step Verification Technique for Isolation of Black hole Attack in MANETs. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 491–495. https://doi.org/10.35940/ijrte.d7107.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free