An efficient approach to circumvent black hole nodes in manets
MANETs are self-configured network. Nodes in Manets need not follow a specific infrastructure. Nodes are connected wirelessly and so nodes can travel to any direction. Manets assure that all its nodes are cooperating with each other. Sometimes, some nodes may not be reliable. These unreliable interm...
Gespeichert in:
Veröffentlicht in: | Cluster computing 2019-09, Vol.22 (Suppl 5), p.11401-11409 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 11409 |
---|---|
container_issue | Suppl 5 |
container_start_page | 11401 |
container_title | Cluster computing |
container_volume | 22 |
creator | Tamilselvi, P. Ganesh Babu, C. |
description | MANETs are self-configured network. Nodes in Manets need not follow a specific infrastructure. Nodes are connected wirelessly and so nodes can travel to any direction. Manets assure that all its nodes are cooperating with each other. Sometimes, some nodes may not be reliable. These unreliable intermediate nodes participate in the packet forwarding and drop the packets instead of forwarding them to the destination node. This type of security attack is called black hole attack (Baadache and Belmehdi in Int Comput Sci Inf Sec 7(1):1–10,
2010
). In this paper, an efficient method of route discovery process is used which bypasses the black hole nodes and uses only the reliable route for transmission. The main advantage of using the proposed method is that there is no need to maintain black hole list. So, there is no need to check the black hole list each time during route discovery. Dynamic source routing (DSR) is used for the transmission of packets. The simulations are done to measure packet delivery ratio, packet drop, average throughput, normalized routing overhead and average end-to-end delay. Simulation results shows that the proposed method improves the packet delivery ratio in presence of black hole and reduces the packet drop. Also the communication overhead is reduced which in turn minimizes the resource utilization in Manets. |
doi_str_mv | 10.1007/s10586-017-1395-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918243261</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918243261</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-af5904cdadb8f24723d1ddbdb079bcab21dc9d15b4dee095a5ed210660b1e57a3</originalsourceid><addsrcrecordid>eNp1kE9LAzEQxYMoWKsfwFvAczSTbDabi1CKVqHgRc8h_9ZubbM12Qp-e7Os4MnTDDPvvRl-CF0DvQVK5V0GKpqaUJAEuBIETtAMhOREioqflp6XrWyEPEcXOW8ppUoyNUP3i4hD23auC3HA5nBIvXEbPPTYdckd91_j2O6M-8Cbfhdw7H3IuIt4b2IY8iU6a80uh6vfOkdvjw-vyyeyflk9Lxdr4jjUAzGtULRy3njbtKySjHvw3npLpbLOWAbeKQ_CVj4EqoQRwTOgdU0tBCENn6ObKbf893kMedDb_phiOamZgoZVnNVQVDCpXOpzTqHVh9TtTfrWQPWISU-YdMGkR0x69LDJk4s2vof0l_y_6Qdarmqd</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918243261</pqid></control><display><type>article</type><title>An efficient approach to circumvent black hole nodes in manets</title><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Tamilselvi, P. ; Ganesh Babu, C.</creator><creatorcontrib>Tamilselvi, P. ; Ganesh Babu, C.</creatorcontrib><description>MANETs are self-configured network. Nodes in Manets need not follow a specific infrastructure. Nodes are connected wirelessly and so nodes can travel to any direction. Manets assure that all its nodes are cooperating with each other. Sometimes, some nodes may not be reliable. These unreliable intermediate nodes participate in the packet forwarding and drop the packets instead of forwarding them to the destination node. This type of security attack is called black hole attack (Baadache and Belmehdi in Int Comput Sci Inf Sec 7(1):1–10,
2010
). In this paper, an efficient method of route discovery process is used which bypasses the black hole nodes and uses only the reliable route for transmission. The main advantage of using the proposed method is that there is no need to maintain black hole list. So, there is no need to check the black hole list each time during route discovery. Dynamic source routing (DSR) is used for the transmission of packets. The simulations are done to measure packet delivery ratio, packet drop, average throughput, normalized routing overhead and average end-to-end delay. Simulation results shows that the proposed method improves the packet delivery ratio in presence of black hole and reduces the packet drop. Also the communication overhead is reduced which in turn minimizes the resource utilization in Manets.</description><identifier>ISSN: 1386-7857</identifier><identifier>EISSN: 1573-7543</identifier><identifier>DOI: 10.1007/s10586-017-1395-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Collaboration ; Communication ; Computer Communication Networks ; Computer Science ; Data transmission ; Nodes ; Operating Systems ; Packet transmission ; Processor Architectures ; Protocol ; Resource utilization</subject><ispartof>Cluster computing, 2019-09, Vol.22 (Suppl 5), p.11401-11409</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2017</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-af5904cdadb8f24723d1ddbdb079bcab21dc9d15b4dee095a5ed210660b1e57a3</citedby><cites>FETCH-LOGICAL-c316t-af5904cdadb8f24723d1ddbdb079bcab21dc9d15b4dee095a5ed210660b1e57a3</cites><orcidid>0000-0003-4406-667X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10586-017-1395-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918243261?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,41464,42533,43781,51294</link.rule.ids></links><search><creatorcontrib>Tamilselvi, P.</creatorcontrib><creatorcontrib>Ganesh Babu, C.</creatorcontrib><title>An efficient approach to circumvent black hole nodes in manets</title><title>Cluster computing</title><addtitle>Cluster Comput</addtitle><description>MANETs are self-configured network. Nodes in Manets need not follow a specific infrastructure. Nodes are connected wirelessly and so nodes can travel to any direction. Manets assure that all its nodes are cooperating with each other. Sometimes, some nodes may not be reliable. These unreliable intermediate nodes participate in the packet forwarding and drop the packets instead of forwarding them to the destination node. This type of security attack is called black hole attack (Baadache and Belmehdi in Int Comput Sci Inf Sec 7(1):1–10,
2010
). In this paper, an efficient method of route discovery process is used which bypasses the black hole nodes and uses only the reliable route for transmission. The main advantage of using the proposed method is that there is no need to maintain black hole list. So, there is no need to check the black hole list each time during route discovery. Dynamic source routing (DSR) is used for the transmission of packets. The simulations are done to measure packet delivery ratio, packet drop, average throughput, normalized routing overhead and average end-to-end delay. Simulation results shows that the proposed method improves the packet delivery ratio in presence of black hole and reduces the packet drop. Also the communication overhead is reduced which in turn minimizes the resource utilization in Manets.</description><subject>Algorithms</subject><subject>Collaboration</subject><subject>Communication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data transmission</subject><subject>Nodes</subject><subject>Operating Systems</subject><subject>Packet transmission</subject><subject>Processor Architectures</subject><subject>Protocol</subject><subject>Resource utilization</subject><issn>1386-7857</issn><issn>1573-7543</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kE9LAzEQxYMoWKsfwFvAczSTbDabi1CKVqHgRc8h_9ZubbM12Qp-e7Os4MnTDDPvvRl-CF0DvQVK5V0GKpqaUJAEuBIETtAMhOREioqflp6XrWyEPEcXOW8ppUoyNUP3i4hD23auC3HA5nBIvXEbPPTYdckd91_j2O6M-8Cbfhdw7H3IuIt4b2IY8iU6a80uh6vfOkdvjw-vyyeyflk9Lxdr4jjUAzGtULRy3njbtKySjHvw3npLpbLOWAbeKQ_CVj4EqoQRwTOgdU0tBCENn6ObKbf893kMedDb_phiOamZgoZVnNVQVDCpXOpzTqHVh9TtTfrWQPWISU-YdMGkR0x69LDJk4s2vof0l_y_6Qdarmqd</recordid><startdate>20190901</startdate><enddate>20190901</enddate><creator>Tamilselvi, P.</creator><creator>Ganesh Babu, C.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0003-4406-667X</orcidid></search><sort><creationdate>20190901</creationdate><title>An efficient approach to circumvent black hole nodes in manets</title><author>Tamilselvi, P. ; Ganesh Babu, C.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-af5904cdadb8f24723d1ddbdb079bcab21dc9d15b4dee095a5ed210660b1e57a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Collaboration</topic><topic>Communication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data transmission</topic><topic>Nodes</topic><topic>Operating Systems</topic><topic>Packet transmission</topic><topic>Processor Architectures</topic><topic>Protocol</topic><topic>Resource utilization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tamilselvi, P.</creatorcontrib><creatorcontrib>Ganesh Babu, C.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Cluster computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tamilselvi, P.</au><au>Ganesh Babu, C.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An efficient approach to circumvent black hole nodes in manets</atitle><jtitle>Cluster computing</jtitle><stitle>Cluster Comput</stitle><date>2019-09-01</date><risdate>2019</risdate><volume>22</volume><issue>Suppl 5</issue><spage>11401</spage><epage>11409</epage><pages>11401-11409</pages><issn>1386-7857</issn><eissn>1573-7543</eissn><abstract>MANETs are self-configured network. Nodes in Manets need not follow a specific infrastructure. Nodes are connected wirelessly and so nodes can travel to any direction. Manets assure that all its nodes are cooperating with each other. Sometimes, some nodes may not be reliable. These unreliable intermediate nodes participate in the packet forwarding and drop the packets instead of forwarding them to the destination node. This type of security attack is called black hole attack (Baadache and Belmehdi in Int Comput Sci Inf Sec 7(1):1–10,
2010
). In this paper, an efficient method of route discovery process is used which bypasses the black hole nodes and uses only the reliable route for transmission. The main advantage of using the proposed method is that there is no need to maintain black hole list. So, there is no need to check the black hole list each time during route discovery. Dynamic source routing (DSR) is used for the transmission of packets. The simulations are done to measure packet delivery ratio, packet drop, average throughput, normalized routing overhead and average end-to-end delay. Simulation results shows that the proposed method improves the packet delivery ratio in presence of black hole and reduces the packet drop. Also the communication overhead is reduced which in turn minimizes the resource utilization in Manets.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10586-017-1395-1</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0003-4406-667X</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1386-7857 |
ispartof | Cluster computing, 2019-09, Vol.22 (Suppl 5), p.11401-11409 |
issn | 1386-7857 1573-7543 |
language | eng |
recordid | cdi_proquest_journals_2918243261 |
source | SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Algorithms Collaboration Communication Computer Communication Networks Computer Science Data transmission Nodes Operating Systems Packet transmission Processor Architectures Protocol Resource utilization |
title | An efficient approach to circumvent black hole nodes in manets |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T22%3A54%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20efficient%20approach%20to%20circumvent%20black%20hole%20nodes%20in%20manets&rft.jtitle=Cluster%20computing&rft.au=Tamilselvi,%20P.&rft.date=2019-09-01&rft.volume=22&rft.issue=Suppl%205&rft.spage=11401&rft.epage=11409&rft.pages=11401-11409&rft.issn=1386-7857&rft.eissn=1573-7543&rft_id=info:doi/10.1007/s10586-017-1395-1&rft_dat=%3Cproquest_cross%3E2918243261%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918243261&rft_id=info:pmid/&rfr_iscdi=true |