Proceedings of the First International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India

Research Article

Multiple Black Hole Attack in Mobile Ad Hoc Network -Analysis and Detection

Download610 downloads
  • @INPROCEEDINGS{10.4108/eai.16-5-2020.2303937,
        author={T.  Harshini and Somnath  Sinha},
        title={Multiple Black Hole Attack in Mobile Ad Hoc Network -Analysis and Detection},
        proceedings={Proceedings of the First  International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India},
        publisher={EAI},
        proceedings_a={ICASISET},
        year={2021},
        month={1},
        keywords={blackhole attack blackhole routing protocols detection manets centralized authority},
        doi={10.4108/eai.16-5-2020.2303937}
    }
    
  • T. Harshini
    Somnath Sinha
    Year: 2021
    Multiple Black Hole Attack in Mobile Ad Hoc Network -Analysis and Detection
    ICASISET
    EAI
    DOI: 10.4108/eai.16-5-2020.2303937
T. Harshini1,*, Somnath Sinha2
  • 1: Department of Computer Science Amrita School of Arts and Sciences, Mysore Amrita Vishwa Vidyapeetham, India.
  • 2: Department of Computer Science Amrita School of Arts and Sciences, Mysore
*Contact email: thirumurthyharshini@gmail.com

Abstract

Mobile ad-hoc network is a short-lived and self-prepared wireless community including mobile nodes. Therefore, safety in MANET, the fundamental functionality of the network is of most critical concern. MANETs should be able to communicate easily and this is a very challenging and critical problem, because the threats to mobile networks are increasing. Protection in the Mobile ad-hoc Network is one of most complicated issues, given the lack of centralized authority and limited resources. In this document we have explored some available detection and prevention schemes A new approach to stopping MANET from black-hole attacks is suggested in this paper.