Loading

Novel Preventive Detection Technique for Black-Hole Malware Attack in Wireless Mobile Ad-Hoc Network (WMANET)
Arun Kumar1, Abhishek Kumar2, Prashant Johri3, Shiv Prakash4, Tarun Kumar5
1Dr. Arun Kumar, Assistant Professor in Centre for Advanced Studies Lucknow, India.
2Abhishek Kumar, Assistant professor atAdwita Mission Institute of Technology (AMIT), Shivdham (Bihar) India.
3Dr. Prashant Johri, Professor in School of Computing Science & Engineering, Galgotias University, Greater Noida, India..
4Dr. Shiv Prakash, M.Tech. and Ph.D. School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India.
5Tarun Kumar, Assistant Professor in School of Computing Science & Engineering, Galgotias University, Greater Noida, India.

Manuscript received on November 19, 2019. | Revised Manuscript received on November 29 2019. | Manuscript published on 30 November, 2019. | PP: 9203-9210 | Volume-8 Issue-4, November 2019. | Retrieval Number: D9113118419/2019©BEIESP | DOI: 10.35940/ijrte.D9113.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A wireless mobile ad-hoc network (WMANET) is endless self-organizing, infrastructure-less collection of movable devices which are connected by using a wireless communication system. In other word’s WMANET is an autonomous, decentralized, dynamic topology, provisional network system having wireless movable devices (nodes) moving randomly without an infrastructure of the network. Furthermore, the nodes communicate with every supplementary node, through forwarding data-packets toward other nodes in the WMANET. The node finds a path to the destination node by applying routing techniques. Due to the dynamic topology of movable nodes wireless mobile network is more vulnerable to security and unprotected to attacks by the malicious node. One of the attacks is Blackhole malware Attack, a malicious-node wrongly advertises shortest to the destination node among an intention of disrupting the network communication. Because the data packets did not arrive at the destination node due to this attack data is lost. In the literature, researchers have been proposed various preventive detection techniques. These techniques used to detect and prevent the black-hole malware attacks. Furthermore, in this paper Novel Detection and Prevention mechanism (INCMAODV) has been simulated the black-hole attack in WMANET scenario. The proposed technique tried to find quality of service (QoS) parameters for instance throughput (Th), packet delivery ratio (PDR) and delay of the network and compared with the state of the art.
Keywords: Wireless Mobile ad-hoc network (WMANET), Security Attacks, Black-hole, Malicious-node, Security, Authentication, QoS Parameters, Throughput, Delay and Packet Data Ratio.
Scope of the Article: Mobile & Broadband Wireless Internet.