12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

100 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010REFERENCESFigure 10: Impact <strong>of</strong> blackhole attack on End-to-End DelayV. CONCLUSIONIn this paper, we studied AODV <strong>in</strong> detail and theblackhole attack <strong>in</strong> AODV. We evaluate the effects <strong>of</strong>blackhole nodes on AODV <strong>in</strong> ad hoc networks. Wesimulate the blackhole behavior with the help <strong>of</strong> NetworkSimulator 2 and compared the performance <strong>of</strong>blackholeAODV with the orig<strong>in</strong>al AODV <strong>in</strong> terms <strong>of</strong>packet loss percentage. The simulation results show thatthe packet loss <strong>in</strong>creases <strong>in</strong> the network with a blackholenode. Simulation results also show that the throughput <strong>of</strong>the network is decreased with blackhole attack ascompared to without blackhole attack.. When the number<strong>of</strong> blackhole nodes <strong>in</strong>creases the throughput decreases.We observed that the End-to-end Delay withoutblackhole attack is slightly <strong>in</strong>creased as compared to theeffect <strong>of</strong> blackhole attack. The detection <strong>of</strong> blackhole <strong>in</strong>ad hoc networks is still to be a challeng<strong>in</strong>g taskACKNOWLEDGEMENTI would like to take the opportunity to thank peoplewho guided and supported me dur<strong>in</strong>g this process.Without their contributions, this project would not havebeen possible. I have a great pleasure <strong>in</strong> express<strong>in</strong>g mydeep sense <strong>of</strong> gratitude and <strong>in</strong>debtedness to Mr. JagpreetS<strong>in</strong>gh, Lecturer, Teg Bahadur Khalsa Institute <strong>of</strong>Eng<strong>in</strong>eer<strong>in</strong>g and Technology, Malout and Ms. Rajkumari,lecturer, University Institute <strong>of</strong> Eng<strong>in</strong>eer<strong>in</strong>g andTechnology, Panjab University, Chandigarh, mysupervisor for their cont<strong>in</strong>uous guidance and <strong>in</strong>valuablesuggestions at all the time dur<strong>in</strong>g the research work. Myspecial thanks to all my friends for be<strong>in</strong>g supportive <strong>in</strong>my hours <strong>of</strong> need. F<strong>in</strong>ally, I would not forget to thank myparents for their love and bless<strong>in</strong>gs that support andencouraged me at every moment I need. They were thefirst ones that <strong>in</strong>troduced the amaz<strong>in</strong>g world to me andencouraged me to explore the wonderful nature.[1] Latha Tamilselvan and Dr. V.Sankaranarayanan,“Solution to Prevent Rush<strong>in</strong>g Attack <strong>in</strong> Wireless Mobile Adhoc Networks”.[2] Latha Tamilselvan, Dr.V Sankaranarayanan, “Prevention <strong>of</strong>Blackhole Attack <strong>in</strong> MANET”. The 2 nd InternationalConference on Wireles Broadband and Ultra WidebandCommunications (AusWireless 2007) India, 2007 IEEE.[3] Mohammad O. Pervaiz, Mihaela Cardei, and Jie Wu,“Rout<strong>in</strong>g Security <strong>in</strong> Ad Hoc wireless Networks”, NetworkSecurity, 2005 Spr<strong>in</strong>ger.[4] Elizabeth M. Royer, and Chai-Keong Toh, “A Review <strong>of</strong>Current Rout<strong>in</strong>g Protocols for Ad Hoc Mobile WirelessNetworks,” IEEE Personal Communications, pp. 46-55,April 1999.[5] Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, AbbasJamalipour, and Yoshiaki Nemoto. “Detect<strong>in</strong>g BlackholeAttack on AODV based Mobile Ad hoc networks byDynamic Learn<strong>in</strong>g Method”. International <strong>Journal</strong> <strong>of</strong>Network Security, Vol.5, No.3, PP.338–346, Nov 2007.[6] ns-2 : http://www.isi.edu/nsnam/ns/[7] C. E. Perk<strong>in</strong>s and E. M. Royer, “Ad Hoc On-DemandDistance Vector Rout<strong>in</strong>g,” Proc. 2nd IEEE Wksp. MobileComp. Sys. and Apps., New Orleans, LA, Feb. 1999, pp.90–100.Anu Bala from Bhogpur (Jalandhar, India)and her date <strong>of</strong> birth is 22 nd August 1985. She isa ME (IT) student <strong>in</strong> Information Technologyat the University Institute <strong>of</strong> Eng<strong>in</strong>eer<strong>in</strong>g andTechnology, Panjab University, Chandigarh,India. She received her B.Tech (CSE) degreefrom Panjab Technical University, jalandhar,India <strong>in</strong> 2006. Her research <strong>in</strong>terests <strong>in</strong> the area <strong>of</strong> mobile adhoc networks, especially ad hoc network security. Her recentwork has focused on ad hoc rout<strong>in</strong>g protocol attacks.She has worked as Lecturer for one year at IITT college <strong>of</strong>engg., Pojewal, Punjab, India.Raj Kumari from chandigarh (India) and his date <strong>of</strong> birth is6 th June 1981. she received her M.Tech (IT) degree fromGNDU, Amritsar, India <strong>in</strong> 2006 and her B.Tech from PanjabTechnical University, Jalandhar, India <strong>in</strong> 2003.She has works as Lecture for one year at college <strong>of</strong> Engg.Tangori, India. She has been work<strong>in</strong>g <strong>in</strong> UIET, Chandigarh,India s<strong>in</strong>ce 2007Jagpreet S<strong>in</strong>gh from Malout (India) and his date <strong>of</strong> birth is5 th March 1983. He received his MS (S<strong>of</strong>tware System) degreefrom BITS Pilani, India and his B.Tech from Panjab TechnicalUniversity, Jalandhar, India. He has been engaged <strong>in</strong> researchon mobile adhoc network and he has enhanced algorithm <strong>of</strong>AODV protocol. He has been work<strong>in</strong>g <strong>in</strong> GTBIET, Malout,India s<strong>in</strong>ce 2003. Two <strong>of</strong> his papers has been published <strong>in</strong>National Conferences.1) Communication technology on UBI Quietestcomput<strong>in</strong>g2) Successful implementation <strong>of</strong> recruisiteimplementation <strong>of</strong> e-governance© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!