Two-Step Verification Technique for Isolation of Black hole Attack in MANETs
A Sai Venkateshwar Rao1, Siddhartha Chauhan2
1A Sai Venkateshwar Rao*,Computer Science and Engineering, National Institute Of Technology, Hamirpur, India.
2Dr Siddhartha Chauhan, Computer Science and Engineering,National Institute Of Technology, Hamirpur, India.

Manuscript received on November 15, 2019. | Revised Manuscript received on November 23, 2019. | Manuscript published on November 30, 2019. | PP: 491-495 | Volume-8 Issue-4, November 2019. | Retrieval Number: D7107118419/2019©BEIESP | DOI: 10.35940/ijrte.D7107.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A network in which the nodes can configure themselves and change their locations is known as mobile ad hoc network. For connecting to other networks, MANETs use wireless connections since they are mobile. Signal protection and reliability of mobile nodes are the major challenges faced by the applications which use MANETs. An active intrusion attack that is initiated by a malicious node to degrade the network’s performance is known as black hole attack. A new approach is proposed in this research that uses the blacklist and clustering approaches to remove this attack from networks. NS2 simulation is used to conduct simulation experiments for evaluating the performance of proposed method. The outcomes show that the performance of proposed method is better in terms of different performance parameters as compared to the traditional approaches.
Keywords: Blackhole, MANET, Clustering.
Scope of the Article: Clustering.