HSCT: A Hybrid and Secure Clustering Technique for Detection of Black hole Attack in Mobile Adhoc Networks
Main Article Content
Abstract
Mobile Adhoc Network (MANET) is a dynamic network with large number of mobile nodes .As the traffic increases over the MANET, it will leads to number of problems like congestion and packet loss. This congestion and packet loss problems occurs due to the attacks in MANET .Out of the various attacks black hole attack is most dangerous attack which drops all of the packets received from the source node and which act as a black hole in the universe. In this paper we are providing solution against this attack. We propose a new hybrid and secure clustering technique for detecting and isolating black hole attack in MANET. This technique firstly detect the black hole attack by using threshold values against different parameters, after this clustering approach is used for secure path from source to destination by reducing overhead in the network. Most of existing mechanisms are not as efficient because by isolating black hole attack overhead is increased. A HSCT approach has remarkable advantage over these existing techniques. We simulate the proposed technique by using ns2 simulator and proved that our technique effectively detect the black hole attack in terms of throughput, packet loss, overhead, delay. In the last section of paper we deliberate possible future work.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.