Open Access Open Access  Restricted Access Subscription Access

Detection of Black Hole Attack in Mobile Ad-hoc Networks using Ant Colony Optimization – simulation Analysis


Affiliations
1 P.G. and Research Department of Computer Science, Government Arts College (Autonomous), Karur - 639005, Tamil Nadu, India
 

Background: Security in Mobile Ad hoc Networks (MANETs) is an essential component for basic network function. Black hole attack may cause packet dropping, misrouting the information from source to destination. Methods: Biology-inspired techniques like as Ant Colony Optimization (ACO) is used to modify the Ad-hoc On Demand Distance Vector (AODV) routing protocol. The ant place of at each node calculates its pheromone value by using the forwarding ratio at node. This modified protocol is compared with existing protocol by using various parameters i.e. packet delivery ratio, end-to-end delay and throughput. Results: The results shows to increase in packet delivery ratio, throughput and decrease in end-to end delay show better performance of proposed work as compared existing.

Keywords

ACO, Black Hole Attack, Challenges, MANETs, Security
User

Abstract Views: 129

PDF Views: 0




  • Detection of Black Hole Attack in Mobile Ad-hoc Networks using Ant Colony Optimization – simulation Analysis

Abstract Views: 129  |  PDF Views: 0

Authors

Anchugam Vangili
P.G. and Research Department of Computer Science, Government Arts College (Autonomous), Karur - 639005, Tamil Nadu, India
K. Thangadurai
P.G. and Research Department of Computer Science, Government Arts College (Autonomous), Karur - 639005, Tamil Nadu, India

Abstract


Background: Security in Mobile Ad hoc Networks (MANETs) is an essential component for basic network function. Black hole attack may cause packet dropping, misrouting the information from source to destination. Methods: Biology-inspired techniques like as Ant Colony Optimization (ACO) is used to modify the Ad-hoc On Demand Distance Vector (AODV) routing protocol. The ant place of at each node calculates its pheromone value by using the forwarding ratio at node. This modified protocol is compared with existing protocol by using various parameters i.e. packet delivery ratio, end-to-end delay and throughput. Results: The results shows to increase in packet delivery ratio, throughput and decrease in end-to end delay show better performance of proposed work as compared existing.

Keywords


ACO, Black Hole Attack, Challenges, MANETs, Security



DOI: https://doi.org/10.17485/ijst%2F2015%2Fv8i13%2F75205