Informative Article | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016
Spotting and Segregation of Sinkhole Node in MANET
Jeeja Borkar, Vaishali Malekar
MANET (Mobile ad-hoc Network) is mostly known for providing communication between nomadic nodes along with the different features such as, routing of data packets, managing whole network by self organization capabilities, interaction among nodes by maintaining trust factors. In MANET it is difficult to maintain the trust for nodes in the network. The different nodes communicate with each other by cooperating among the network. Due to these features MANET is more vulnerable to the different attacks. In this paper one of the attack detection and isolation mechanisms have been proposed. The point of concentration is to detect sinkhole attack. Presence of sinkhole attack will try to divert the whole network traffic towards itself or any other node by propagating wrong routing information in the network. In this paper the DSR (Dynamic Source Routing) algorithm is used for routing of data. Due to presence of sinkhole attack delay increases, network throughput decreases and packet delivery ratio decreases (PDR) and finally complete network leads to dead stage. This paper proposes the efficient method to deal with the sinkhole attack and make the network more efficient.
Keywords: MANET, DSR, PDR, sinkhole attack, throughput
Edition: Volume 5 Issue 4, April 2016
Pages: 2169 - 2172
How to Cite this Article?
Jeeja Borkar, Vaishali Malekar, "Spotting and Segregation of Sinkhole Node in MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163100, Volume 5 Issue 4, April 2016, 2169 - 2172
108 PDF Views | 85 PDF Downloads
Similar Articles with Keyword 'MANET'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Similar Articles with Keyword 'DSR'
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2169 - 2172Spotting and Segregation of Sinkhole Node in MANET
Jeeja Borkar, Vaishali Malekar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1148 - 1153ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS
Abdul Jawad PP, Bismin Chacko
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 633 - 636Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay
Kaushal Kishor, Parma Nand
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 597 - 602Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks
Abhishek Kumar, Shweta Kumari
Similar Articles with Keyword 'PDR'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2169 - 2172Spotting and Segregation of Sinkhole Node in MANET
Jeeja Borkar, Vaishali Malekar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2105 - 2111EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks
H. Syed Siddiq, M. Hymavathi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2171 - 2174A Revised Approach on Attack Identification and Handling in WSN
Seema Khokher
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1051 - 1053Object Tracking Using Wireless Sensor Network and Performance Evaluation of Dynamic and Static Sensor Node
Snehal Andhare, Sachin Deshpande
Similar Articles with Keyword 'sinkhole attack'
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2169 - 2172Spotting and Segregation of Sinkhole Node in MANET
Jeeja Borkar, Vaishali Malekar
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 969 - 973AODV based Secure Algorithm for Detection and Prevention of Sink Hole Attack in WSN
Varpreet Kaur, Pratibha
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1045 - 1051Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks
Umashri Karkikatti, Dr. Nalini N
Similar Articles with Keyword 'throughput'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar