( ISSN 2277 - 9809 (online) ISSN 2348 - 9359 (Print) ) New DOI : 10.32804/IRJMSH

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 128    Submit Your Rating     Cite This   Download        Certificate

A WAY OF MITIGATE BLACK HOLE ATTACKS IN MOBILE AD HOC NETWORK

    2 Author(s):  KHUSHBU , DR. R.K. BATHLA

Vol -  10, Issue- 7 ,         Page(s) : 238 - 244  (2019 ) DOI : https://doi.org/10.32804/IRJMSH

Abstract

Remote frameworks are grabbing noticeable quality to its zenith today. Flexible Ad hoc Networks called MANETs are self-orchestrating remote frameworks and it is with no concentrated control made by convenient center points. Center points can go about as the two switches and has. The dynamic topology of MANETs empowers centers to join and leave the framework whenever of time. Thusly, it is feeble to various sorts of strikes like Active attack, Passive ambush, Internal attack, External attack, Black hole what's increasingly, dull opening strike. Past work is done on security issues in MANET relied upon responsive coordinating show model: Ad-Hoc On Demand Separation Vector (AODV). Various sorts of ambushes were considered previously, and their things were clarified by communicating how these strikes aggravate the show of MANET. The framework offers versatile access to customers with immaterial structure to work. Regardless, such outstanding component requires versatility and coordinated effort between customers, which manufactures the framework's lack of protection to the Black opening strike. As such, an improved security approach is relied upon to keep up perfect framework execution. In this paper, we present an audit on number of systems that mitigates dark opening assault that impact the presentation of MANET

 [1] Kartik Kumar Srivastava, AvinashTripathiand Kumar Tiwari, “ Secure Data Transmission in MANET Routing Protocol” IJCTA , Int.J.Computer Technology &Applications,Vol 3 (6), 1915-1921 Nov-Dec 2012. Available online@www.ijcta.com
[2]OnkarV.Chandure, Prof V.T.Gaikwad “ A Mechanismfor recognition & Eradication of Gray Hole attack usingAODV Routing Protocol in MANET” IJCSIT , Vol.2,No.6, Jul 2011.
[3] Sanjay Ramaswamy, Huirong Fu, ManoharSreekantaradhya, John Dixon and Kendall Nygard, “Prevention of Cooperative Black Hole Attackin Wireless Ad Hoc Networks” International Journal of Computer Science.
[4] Vikram verma1and Naveenagarg, “Enhanced AODV Protocol to Mitigate Black Hole Attack in MANETS” Proc. of Int. Conf. on Emerging Trends in Engineering and Technology, ACEEE.
[5] Rajiv Ranjan, NareshTrivedi and AnoopSrivastava “Mitigating of Black Hole Attack in Manets”,VSRDIJCSIT, Vol. 1 (2), 2011, 53-57, ISSN no. 2231-2471.
 [6] Jiwen CAI, Ping YI, Jialin CHEN, Zhiyang WANG, Ning LIU, “An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network”, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[7] HimadriNathSaha , Dr. Debika Bhattacharyya , Dr. P. K.Banerjee,Aniruddha Bhattacharyya ,Arnab Banerjee , Dipayan Bose , “Study of Different Attacks in Manet with its Detection & Mitigation Schemes”, International Journal of Advanced Engineering Technology E-ISSN 0976-3945
[8] Mohammad Al-Shurman, Seong-Moo Yoon and Seungjin park, “Black Hole Attack in Mobile Ad Hoc Networks”, ACM Southeast Regional Conference, Proceedings of the 42nd annual southeast regional conference , 2004, pp 96-97.
[9] J.Sen, S.Koilakonda and A.Ukil, “A mechanism for detection of cooperative black hole attack in mobile ad hoc networks”, Second International Conference on Intelligent System, Modeling and Simulation ,Innovation lab, Tata consultancy services ltd. , Kolkata, 25-27January 2011.
[10] Kartik Kumar Srivastava, AvinashTripathi and Anjnesh Kumar Tiwari, “ Secure Data Transmission in MANET Routing Protocol” IJCTA , Int.J.ComputerTechnology &Applications,Vol 3 (6), 1915- 1921 Nov-Dec 2012. Available online@www.ijcta.com
[11] Abhilasha Sharma et.al. “Detection and Prevention from Black Hole attack in AODV protocol for MANET”, International Journal of Computer Applications (0975 – 8887) Volume 50 – No.5, July 2012.
      

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details