Open Access
Remove the black-hole attack in mobile ADHOC network using Threshold Based Technique
Author(s) -
Sanjay Kumar Yadav,
Kaptan Singh
Publication year - 2016
Publication title -
international journal of computer and technology
Language(s) - English
Resource type - Journals
ISSN - 2277-3061
DOI - 10.24297/ijct.v15i12.3966
Subject(s) - computer network , packet drop attack , computer science , routing protocol , network packet , path vector protocol , ad hoc on demand distance vector routing , node (physics) , routing information protocol , hop (telecommunications) , dynamic source routing , link state routing protocol , engineering , structural engineering
In this paper enhanced the AODV routing protocol for the prevention of black hole attack. The enhanced AODV routing protocol based on the principle of thresholding. The thresholding using the concept of reference node selection process. The reference node selection process creates two group of node one is path altered group and other is stable path with sensibility. The sensibility path estimates the hop count and packet sequence number. If the number of hop count is not changed or the sequence of packet is also not lost is called sensitivity path of network. The function of threshold generated by the node distance formula based on the Euclidean distance derivation. The enhanced AODV protocol simulate in NS2.34 simulators and measure some standard parameter such as PDR, throughput, overload and E2E delivery ratio.