Black Hole Attack Research Paper

1704 Words7 Pages

4. MALICIOUS NODE BEHAVIOUR
Malicious node is sometimes called as a black hole node. [30] Malicious node is a node in the network, which does flooding and leads to denial of service attack. Its main focus to acquire an attention of the source node or any neighbouring node. [31, 32]Malicious node always advertises itself with the highest sequence number as well as containing minimum hop count. By this way, It establishes trust of the neighbouring node or source node or any other node of the MANET environment that it has a valid fresh and a short route to the corresponding receiver whom the intended node wants to communicate. [33]It is the nature of the malicious node in a wireless network having aim to make the network insecure, which leads …show more content…

In this protocol, every node is working as an observer to watch the working of its next hope neighbourhood node. It collects transmission information of this node and observes that node correctly forward to its next hope neighbourhood node along with the correct destination route. [35]This protocol measures the sending time of the next hop node. If the sending time of the next hope neighbour is greater than the packet storing time and exceeds above some defined threshold of the network then Watchdog knows that system is under black hole attack and it immediately mark this node as a malicious node. The Watchdog protocol announces the existence of the malicious node in the network by generating the alerts. The benefit of the Watchdog protocol is that, they make use of only local information and are proficient to spot the malicious node. They can resolve the predicament of black hole attack which demonstrate the way to denial of service attack (DOS) in MANET network. [36]Watchdog protocol act as a very good intrusion detection system mechanism in the network. However, [37]there are certain disadvantages regarding to this protocol such that it decreases the network performance in terms of throughput, it does not support mobility with high number of nodes, and it doesn’t detect the actual reason of the packet loss. To overcome these disadvantages of this Watchdog protocol, the improved …show more content…

RESULTS AND COMPARISION
The simulation of proposed mobile ad hoc network environment is done in network simulator (NS-2). The simulation results are evaluated in provisions of throughput, Packet delivery ratio (PDR) and end-to-end delay. In this paper, we compare the performance of a network of wireless nodes of MANET under DSDV protocol carrying the proposed methodology with the network of nodes under a DSDV routing protocol with simple Watchdog mechanism. This result will evaluate the impact of the proposed methodology in mobile ad hoc network.
• THROUGHPUT
The principal performance is measured in the relations of the throughput. Throughput is represented in bits per second (bps) and it is the number of packets which is received in per unit of time. Figure 9 represents the throughput of mobile ad hoc network environment under a DSDV protocol with simple Watchdog.
Fig 9: Throughput of mobile ad hoc network with DSDV protocol under simple Watchdog
In the above figure, it is shown that the Throughput of simulated mobile ad hoc network comes out to be about 791.24 kbps. Figure 10 represents the throughput of the proposed methodology in mobile ad hoc network.
Fig 10: Throughput of the proposed method for MANET using I-Watchdog

More about Black Hole Attack Research Paper

Open Document