A network in which the nodes can configure themselves and change their locations is known as mobile ad hoc network. For connecting to other networks, MANETs use wireless connections since they are mobile. Signal protection and reliability of mobile nodes are the major challenges faced by the applications which use MANETs. An active intrusion attack that is initiated by a malicious node to degrade the network’s performance is known as black hole attack. A new approach is proposed in this research that uses the blacklist and clustering approaches to remove this attack from networks. NS2 simulation is used to conduct simulation experiments for evaluating the performance of proposed method. The outcomes show that the performance of proposed method is better in terms of different performance parameters as compared to the traditional approaches.
CITATION STYLE
Rao*, A. S. V., & Chauhan, D. S. (2019). Two-Step Verification Technique for Isolation of Black hole Attack in MANETs. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 491–495. https://doi.org/10.35940/ijrte.d7107.118419
Mendeley helps you to discover research relevant for your work.