High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Black Hole Attack Minimization using Leach Protocol

Author(s):

S. Rajesh , Sri Ramakrishna institute of technology,Cbe-10; Dr. A. N. Jayanthi, Sri Ramakrishna institute of technology,Cbe-10

Keywords:

Black Hole Attack, WSN, Leach Protocol

Abstract

In MANET, Guaranteed routing is one of the most emerging areas of research. Scheming protocol for ad hoc routing is a difficult task due to the unique in lack of fundamental authorization, node mobility, prevailing changes in topology, and limited availability of resources. MANETs are appropriate for emergency situations like Natural disasters or Military applications. Thus data transfer between two nodes must require security from black-hole attack in the MANET which is a malicious nodes that attracts the data packets by falsely advertising a fresh route to the destination. LEACH routing protocol is used for the detection and prevention of black-hole attack in MANETs has been proposed. It observe the singular difference between the number of data packets received and forwarded by the node. If abnormal condition is detected, all the nodes will obscure the malicious nodes from the network. The analysis of the system performance has been improved in terms of Packet Delivery Ratio, Detection Rate (DR) and Throughput and simulation results obtained using ns2 simulator.

Other Details

Paper ID: IJSRDV7I90079
Published in: Volume : 7, Issue : 9
Publication Date: 01/12/2019
Page(s): 44-46

Article Preview

Download Article