International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs

Mohan Babu G, S Balaji

A Mobile Ad hoc Network (MANET) is a set of mobile nodes in which every node in the network communicate with each other without any predefined infrastructure and due to mobility the nodes are free to move. Providing security to the moving nodes is a challenge and hence the MANETs are vulnerable to many attacks. One such attack is a black hole attack which blocks the successful delivery of the data to the destination. In this paper; a new routing approach is designed to detect the black hole attack and to achieve secure data transmission by splitting the data into shares. Next propagating the shares in multiple paths; in which the shortest path is selected to reach the destination based on the hop count.

Keywords: MANETs, Black Hole Attack, Routing, Security, Data Splitting

Edition: Volume 3 Issue 6, June 2014

Pages: 2021 - 2024


How to Cite this Article?

Mohan Babu G, S Balaji, "An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014619, Volume 3 Issue 6, June 2014, 2021 - 2024

26 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANETs'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2058 - 2061

Survey on Load Aware and Energy Aware Routing in MANET

Akshay Dubey, Medhavi Shriwas

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1960 - 1964

A Survey on Present State of the Art of Intrusion Detection Systems in MANETs: Finding Research Gaps

V. L. Pavani, Prof. B. Sathyanarayana

Share this article



Similar Articles with Keyword 'Black Hole Attack'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 350 - 352

Implementation, Detection and Prevention of Black hole Attack for Mobile Ad-hoc Network Scenario using NS-2

Raghvendra Prasad, Kuntal Barua

Share this article



Similar Articles with Keyword 'Routing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2058 - 2061

Survey on Load Aware and Energy Aware Routing in MANET

Akshay Dubey, Medhavi Shriwas

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1492 - 1499

Coverage Hole Reduction in Wireless Sensor Networks using Swarm Technique

Vinay Rana, Rani, Ravi

Share this article



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article



Similar Articles with Keyword 'Data Splitting'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2021 - 2024

An Opportunistic Routing to Secure Data Transmission against Black Hole Attack in MANETs

Mohan Babu G, S Balaji

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3216 - 3219

A Survey on Security Prospects through Multicloud Computing by Adapting Data Splitting

Smita Y. Aparadh, Tejaswini H. Patil

Share this article
Top