International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 101 | Views: 273

Informative Article | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016 | Popularity: 6.7 / 10


     

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar


Abstract: MANET (Mobile ad-hoc Network) is mostly known for providing communication between nomadic nodes along with the different features such as, routing of data packets, managing whole network by self organization capabilities, interaction among nodes by maintaining trust factors. In MANET it is difficult to maintain the trust for nodes in the network. The different nodes communicate with each other by cooperating among the network. Due to these features MANET is more vulnerable to the different attacks. In this paper one of the attack detection and isolation mechanisms have been proposed. The point of concentration is to detect sinkhole attack. Presence of sinkhole attack will try to divert the whole network traffic towards itself or any other node by propagating wrong routing information in the network. In this paper the DSR (Dynamic Source Routing) algorithm is used for routing of data. Due to presence of sinkhole attack delay increases, network throughput decreases and packet delivery ratio decreases (PDR) and finally complete network leads to dead stage. This paper proposes the efficient method to deal with the sinkhole attack and make the network more efficient.


Keywords: MANET, DSR, PDR, sinkhole attack, throughput


Edition: Volume 5 Issue 4, April 2016


Pages: 2169 - 2172



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Jeeja Borkar, Vaishali Malekar, "Spotting and Segregation of Sinkhole Node in MANET", International Journal of Science and Research (IJSR), Volume 5 Issue 4, April 2016, pp. 2169-2172, https://www.ijsr.net/getabstract.php?paperid=NOV163100, DOI: https://www.doi.org/10.21275/NOV163100



Similar Articles

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 736 - 741

Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks

Dr. J. Seetaram, Dr. M. Nagaraju Naik

Share this Article

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article



Top