International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Informative Article | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

MANET (Mobile ad-hoc Network) is mostly known for providing communication between nomadic nodes along with the different features such as, routing of data packets, managing whole network by self organization capabilities, interaction among nodes by maintaining trust factors. In MANET it is difficult to maintain the trust for nodes in the network. The different nodes communicate with each other by cooperating among the network. Due to these features MANET is more vulnerable to the different attacks. In this paper one of the attack detection and isolation mechanisms have been proposed. The point of concentration is to detect sinkhole attack. Presence of sinkhole attack will try to divert the whole network traffic towards itself or any other node by propagating wrong routing information in the network. In this paper the DSR (Dynamic Source Routing) algorithm is used for routing of data. Due to presence of sinkhole attack delay increases, network throughput decreases and packet delivery ratio decreases (PDR) and finally complete network leads to dead stage. This paper proposes the efficient method to deal with the sinkhole attack and make the network more efficient.

Keywords: MANET, DSR, PDR, sinkhole attack, throughput

Edition: Volume 5 Issue 4, April 2016

Pages: 2169 - 2172


How to Cite this Article?

Jeeja Borkar, Vaishali Malekar, "Spotting and Segregation of Sinkhole Node in MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163100, Volume 5 Issue 4, April 2016, 2169 - 2172

25 PDF Views | 19 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANET'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2234 - 2241

Distributed Direct Neighbour Comparison Based Approach

Pankaj Singh Chouhan, Brajesh Kumar Shrivash, Nidhi Bajpai

Share this article



Similar Articles with Keyword 'DSR'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2832 - 2834

Hiding Sensitive Association Rules Using EMDSRRC

Marate Shashank S., Manjusha Yeola

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article



Similar Articles with Keyword 'PDR'

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2171 - 2174

A Revised Approach on Attack Identification and Handling in WSN

Seema Khokher

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1051 - 1053

Object Tracking Using Wireless Sensor Network and Performance Evaluation of Dynamic and Static Sensor Node

Snehal Andhare, Sachin Deshpande

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 376 - 379

Performance Analysis of Routing Protocols Over Multimedia Streaming In MANET

Pooja Saini, Meenakshi Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2167 - 2171

MAS-AODV: Mobility Aware Secure AODV to Prevent Gray Hole Attack in MANETs

Namrata Jain, Yogesh Rathore

Share this article



Similar Articles with Keyword 'sinkhole attack'

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1045 - 1051

Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks

Umashri Karkikatti, Dr. Nalini N

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 969 - 973

AODV based Secure Algorithm for Detection and Prevention of Sink Hole Attack in WSN

Varpreet Kaur, Pratibha

Share this article



Similar Articles with Keyword 'throughput'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2171 - 2174

A Revised Approach on Attack Identification and Handling in WSN

Seema Khokher

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1187 - 1192

Effect of Load and Threshold Variation on Performance of RED: Random Early Detection

Kiran Chhabra, Manali Kshirsagar, Arun Zadgaonkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this article
Top