PERFORMANCE COMPARISON OF BLACK HOLE ATTACK DETECTION MECHANISM IN 6LOWPAN OVER MANET
Main Article Content
Abstract
Black Hole Attack is the most vulnerable attacks in the network layer of wireless environment. In MANET, the existing techniques were proposed to detection and mitigate the black hole attacks. Thus the environment of the MANET which is differs from the 6LoWPAN Network. The cluster based nodes are connected together to form an MANET and also these type of architecture may have used in the 6LoWPAN Network. In MANET, it should be connected with the environment of mobile nodes itself rather; in 6LoWPAN architecture the mobile nodes are connected to form a network and also the nodes in the clusters can be connect with the internet through the gateway. The severity of attacks may differ from the environment to environment. Thus the malicious nodes may vulnerable within the range of MANET. It only can be able to connect with the nodes in the MANET rather it is most vulnerable thing is to detect the black hole attack from the nodes which are connected with the internet through the gateway. In this cluster based routing protocol implementation is proposed and the performance of the black hole attack detection can be analyzed and comparatively discussed with their results based on the parameters such as positive detection rate and energy consumption for packet overhead in the attack detection.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.