Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers

Research Article

Black Hole Combat Using Node Stability System in MANET

Download
266 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-32573-1_42,
        author={Ranajoy Chatterjee and Mukti Routray},
        title={Black Hole Combat Using Node Stability System in MANET},
        proceedings={Signal Processing and Information Technology. First International Joint Conference, SPIT 2011 and IPC 2011, Amsterdam, The Netherlands, December 1-2, 2011, Revised Selected Papers},
        proceedings_a={SPIT \& IPC},
        year={2012},
        month={10},
        keywords={DTMS Black Hole Attack Node Stability System},
        doi={10.1007/978-3-642-32573-1_42}
    }
    
  • Ranajoy Chatterjee
    Mukti Routray
    Year: 2012
    Black Hole Combat Using Node Stability System in MANET
    SPIT & IPC
    Springer
    DOI: 10.1007/978-3-642-32573-1_42
Ranajoy Chatterjee1,*, Mukti Routray2,*
  • 1: Indic Institute of Design and Research
  • 2: Silicon Institute of Technology
*Contact email: ronychatterjee@gmail.com, muktiroutray@gmail.com

Abstract

MANET (Mobile Ad hoc Network) is a form of ad hoc network consisting of mobile nodes. The behavior of such network is autonomous and it gets connected to several types of network by using wireless connection. As no nodes in this network infrastructure are stationary, nodes link each other to participate in transmission. However nodes in the family may turn bad (malicious) or external attacking nodes disrupt secured routing bringing instability to network and sometimes increasing threat to applications of importance for e.g. both military and civilian applications. In both the above cases the nodes needs to be punished. In this paper we use a Node Stability System (NSS) to propose methods of identification of singular and co-operative Black hole nodes and provide steps to recover the network from such vulnerabilities.