Spotting and Segregation of Sinkhole Node in MANET
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 101

Informative Article | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

MANET (Mobile ad-hoc Network) is mostly known for providing communication between nomadic nodes along with the different features such as, routing of data packets, managing whole network by self organization capabilities, interaction among nodes by maintaining trust factors. In MANET it is difficult to maintain the trust for nodes in the network. The different nodes communicate with each other by cooperating among the network. Due to these features MANET is more vulnerable to the different attacks. In this paper one of the attack detection and isolation mechanisms have been proposed. The point of concentration is to detect sinkhole attack. Presence of sinkhole attack will try to divert the whole network traffic towards itself or any other node by propagating wrong routing information in the network. In this paper the DSR (Dynamic Source Routing) algorithm is used for routing of data. Due to presence of sinkhole attack delay increases, network throughput decreases and packet delivery ratio decreases (PDR) and finally complete network leads to dead stage. This paper proposes the efficient method to deal with the sinkhole attack and make the network more efficient.

Keywords: MANET, DSR, PDR, sinkhole attack, throughput

Edition: Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Share this Article

How to Cite this Article?

Jeeja Borkar, Vaishali Malekar, "Spotting and Segregation of Sinkhole Node in MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163100, Volume 5 Issue 4, April 2016, 2169 - 2172

Enter Your Email Address




Similar Articles with Keyword 'MANET'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 79 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'DSR'

Downloads: 101

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this Article

Downloads: 105

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 106 | Weekly Hits: ⮙5

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1262 - 1265

Evaluation of MANET Routing Protocols using OMNeT++

Chand Jain, Jaswinder Singh

Share this Article

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this Article

Similar Articles with Keyword 'PDR'

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 101

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this Article

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2171 - 2174

A Revised Approach on Attack Identification and Handling in WSN

Seema Khokher

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK - To Overcome from Intruders Attacks in Manet's by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1051 - 1053

Object Tracking Using Wireless Sensor Network and Performance Evaluation of Dynamic and Static Sensor Node

Snehal Andhare, Sachin Deshpande

Share this Article

Similar Articles with Keyword 'sinkhole attack'

Downloads: 101

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this Article

Downloads: 106 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 969 - 973

AODV based Secure Algorithm for Detection and Prevention of Sink Hole Attack in WSN

Varpreet Kaur, Pratibha

Share this Article

Downloads: 118

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1045 - 1051

Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks

Umashri Karkikatti, Dr. Nalini N

Share this Article

Similar Articles with Keyword 'throughput'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 153

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 716 - 720

A Comprehensive Study of Elasticsearch

Nikita Kathare, O. Vinati Reddy, Dr. Vishalakshi Prabhu

Share this Article

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1353 - 1357

Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks

Manpreet Kaur, Pooja Saini

Share this Article



Top