Open Access Open Access  Restricted Access Subscription Access

Performance Comparison of Cluster Based and Threshold Based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs


Affiliations
1 Department of Computer Science, Gulbarga University, Gulbarga, India
2 Department of Computer Science and Engineering, P.D.A College of Engineering, Gulbarga, India
 

In mobile ad-hoc networks (MANET), the movement of the nodes may quickly change the networks topology resulting in the increase of the overhead message in topology maintenance. The nodes communicate with each other by exchanging the hello packet and constructing the neighbor list at each node. MANET is vulnerable to attacks such as black hole attack, gray hole attack, worm hole attack and sybil attack. A black hole attack makes a serious impact on routing, packet delivery ratio, throughput, and end to end delay of packets. In this paper, the performance comparison of clustering based and threshold based algorithms for detection and prevention of cooperative in MANETs is examined. In this study every node is monitored by its own cluster head (CH), while server (SV) monitors the entire network by channel overhearing method. Server computes the trust value based on sent and receive count of packets of the receiver node. It is implemented using AODV routing protocol in the NS2 simulations. The results are obtained by comparing the performance of clustering based and threshold based methods by varying the concentration of black hole nodes and are analyzed in terms of throughput, packet delivery ratio. The results demonstrate that the threshold based method outperforms the clustering based method in terms of throughput, packet delivery ratio and end to end delay.

Keywords

Mobile Ad-Hoc Network, Attacks in Routing Protocol, Cooperative Black Hole Attack, AODV Routing Protocol, Clustering, Server, Cluster Head, Trust Value.
User
Notifications
Font Size

Abstract Views: 227

PDF Views: 4




  • Performance Comparison of Cluster Based and Threshold Based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs

Abstract Views: 227  |  PDF Views: 4

Authors

P. S. Hiremath
Department of Computer Science, Gulbarga University, Gulbarga, India
T. Anuradha
Department of Computer Science and Engineering, P.D.A College of Engineering, Gulbarga, India

Abstract


In mobile ad-hoc networks (MANET), the movement of the nodes may quickly change the networks topology resulting in the increase of the overhead message in topology maintenance. The nodes communicate with each other by exchanging the hello packet and constructing the neighbor list at each node. MANET is vulnerable to attacks such as black hole attack, gray hole attack, worm hole attack and sybil attack. A black hole attack makes a serious impact on routing, packet delivery ratio, throughput, and end to end delay of packets. In this paper, the performance comparison of clustering based and threshold based algorithms for detection and prevention of cooperative in MANETs is examined. In this study every node is monitored by its own cluster head (CH), while server (SV) monitors the entire network by channel overhearing method. Server computes the trust value based on sent and receive count of packets of the receiver node. It is implemented using AODV routing protocol in the NS2 simulations. The results are obtained by comparing the performance of clustering based and threshold based methods by varying the concentration of black hole nodes and are analyzed in terms of throughput, packet delivery ratio. The results demonstrate that the threshold based method outperforms the clustering based method in terms of throughput, packet delivery ratio and end to end delay.

Keywords


Mobile Ad-Hoc Network, Attacks in Routing Protocol, Cooperative Black Hole Attack, AODV Routing Protocol, Clustering, Server, Cluster Head, Trust Value.