Submit Paper

Article Processing Fee

Pay Online

           

Crossref logo

  DOI Prefix   10.20431


 

International Journal of Research Studies in Computer Science and Engineering
Volume 1, Issue 4, 2014, Page No: 75-78

Security in Wireless Network: Black Hole Attack Avoidance

Ankit Sharma1, Manjusha Deshmukh2

1.Information Technology Engg., PIIT New panvel, Navi Mumbai, India.
2.Computer Engg., PIIT, New Panvel Navi Mumbai, India.

Citation : Ankit Sharma, Manjusha Deshmukh, Security in Wireless Network: Black Hole Attack Avoidance International Journal of Research Studies in Computer Science and Engineering 2014, 1(4) : 75-78

Abstract

Wireless networks are computer networks that are not connected by cables of any kind. The use of wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. Wireless networks are susceptible to many attacks. One such specific attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh and shortest path to the destination. In this paper, we propose a method for avoiding blackhole attack without the constraint of special hardware and dependency on physical medium of wireless network. The proposed methods forms link disjoint multi-path during path discovery to provide greater path selection in order to avoid malicious nodes in the path using legitimacy table maintained by each node in the network. By making use of bell curve, Non-malicious nodes gradually isolate the blackhole nodes and avoid them while making path between source and destination.Various related works were also studied for knowing the related works which have been carried out in order to avoid blackhole attack in a network. They had some flaws too,which were overcome by the proposed system.Proposed system helps us in defending against the blackhole attack without any requirement of hardware and special detection node.


Download Full paper: Click Here