Work place: Department of Computer Science & Engineering, DIT School of Engineering, Plot -48A, Knowledge Park – III, Greater Noida, Uttar Pardesh, India
E-mail: kmr.roshan1@gmail.com
Website:
Research Interests: Computational Science and Engineering, Computational Engineering, Computer systems and computational processes
Biography
Mr. Kumar Roshan is MCA and pursuing M.Tech in Computer Science & Engineering from IETE, New delhi. He has published many papers in international journals.
By Vimal Bibhu Kumar Roshan Kumar Balwant Singh Dhirendra Kumar Singh
DOI: https://doi.org/10.5815/ijcnis.2012.11.06, Pub. Date: 8 Oct. 2012
Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. The delay, throughput and load are simulated by the help of OPNET 14.5 modeler. The simulation setup comprises of 30 Vehicular nodes moving with constant speed of 10 meter per second. The data rate of Vehicular nodes is 11 Mbps with default transmitting power of 0.005 watts. With On Demand Distance Vector Routing and Optimized Link State Routing the malicious node buffer size is lowered to a level which increase packet drops.
[...] Read more.DOI: https://doi.org/10.5815/ijcnis.2012.06.07, Pub. Date: 8 Jun. 2012
Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV) are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET) to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals