JOURNAL ARTICLE

Two-Step Verification Technique for Isolation of Black hole Attack in MANETs

A Sai Venkateshwar RaoDr Siddhartha Chauhan

Year: 2019 Journal:   International Journal of Recent Technology and Engineering (IJRTE) Vol: 8 (4)Pages: 491-495

Abstract

A network in which the nodes can configure themselves and change their locations is known as mobile ad hoc network. For connecting to other networks, MANETs use wireless connections since they are mobile. Signal protection and reliability of mobile nodes are the major challenges faced by the applications which use MANETs. An active intrusion attack that is initiated by a malicious node to degrade the network’s performance is known as black hole attack. A new approach is proposed in this research that uses the blacklist and clustering approaches to remove this attack from networks. NS2 simulation is used to conduct simulation experiments for evaluating the performance of proposed method. The outcomes show that the performance of proposed method is better in terms of different performance parameters as compared to the traditional approaches.

Keywords:
Computer science Mobile ad hoc network Blacklist Computer network Packet drop attack Wireless ad hoc network Node (physics) Reliability (semiconductor) Intrusion detection system Cluster analysis Isolation (microbiology) Distributed computing Computer security Wireless Routing protocol Network packet Engineering Telecommunications

Metrics

1
Cited By
0.19
FWCI (Field Weighted Citation Impact)
0
Refs
0.60
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Mobile Ad Hoc Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications
Security in Wireless Sensor Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications
Opportunistic and Delay-Tolerant Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Technique for Detection and Isolation of Black Hole Attack in MANETs

Ramneet KaurAmandeep Kaur

Journal:   International Journal of Computer Applications Year: 2017 Vol: 174 (4)Pages: 22-25
JOURNAL ARTICLE

Black Hole Attack Detection in MANETs using Trust Based Technique

Mahuwa GoswamiPrashant SharmaAnkita Bhargava

Journal:   International Journal of Innovative Technology and Exploring Engineering Year: 2020 Vol: 9 (4)Pages: 1446-1451
JOURNAL ARTICLE

Sink Hole Attack Detection using Two Step Verification Technique in Wireless Sensor Networks

Priya Ranjan RajDarpan Anand

Journal:   2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) Year: 2021 Pages: 1245-1250
JOURNAL ARTICLE

Depictive Analysis of MANETs under Black Hole Attack

Veena TrivediV. Preethi

Journal:   2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) Year: 2017 Vol: 3 Pages: 1116-1120
© 2026 ScienceGate Book Chapters — All rights reserved.