Open Access Open Access  Restricted Access Subscription Access

Implementation of Black Hole Node Detection Using Intrusion Detection System


Affiliations
1 Department of Computer, Punjabi University Patiala, Punjab, India
2 Punjabi University, Patiala, Punjab, India
 

Mobile ad-hoc networks are known by their continuously changing topology, no permanent infrastructure, resource restrictions and multi-hop scenario. Owing to this, they are more exposed to security attacks. In these networks, one of the hazardous attacks is packet dropping attack differentiated into 2 types: 1. Black hole and 2. Gray hole. Within both of them, an attacker replies to source node incorrectly that it is encompassing the shortest path to the destination. In former, attackers drops the entire volume of packets sent through it and in latter, attacker drops packets selectively. The following study implement to detect and isolate these attacks in network. The performance of the network has been compared without black hole node and with black hole node on the basis of PDR, throughput and energy consumption of the network. It has been observed that the actual performance of the network without black hole node is better as compare with the network with black hole node.

Keywords

Mobile ad hoc Networks, Black Hole Attack, Grey Hole Attack, Throughput.
User
Notifications
Font Size

Abstract Views: 137

PDF Views: 0




  • Implementation of Black Hole Node Detection Using Intrusion Detection System

Abstract Views: 137  |  PDF Views: 0

Authors

Gurpreet Singh
Department of Computer, Punjabi University Patiala, Punjab, India
Raman Maini
Punjabi University, Patiala, Punjab, India

Abstract


Mobile ad-hoc networks are known by their continuously changing topology, no permanent infrastructure, resource restrictions and multi-hop scenario. Owing to this, they are more exposed to security attacks. In these networks, one of the hazardous attacks is packet dropping attack differentiated into 2 types: 1. Black hole and 2. Gray hole. Within both of them, an attacker replies to source node incorrectly that it is encompassing the shortest path to the destination. In former, attackers drops the entire volume of packets sent through it and in latter, attacker drops packets selectively. The following study implement to detect and isolate these attacks in network. The performance of the network has been compared without black hole node and with black hole node on the basis of PDR, throughput and energy consumption of the network. It has been observed that the actual performance of the network without black hole node is better as compare with the network with black hole node.

Keywords


Mobile ad hoc Networks, Black Hole Attack, Grey Hole Attack, Throughput.