ABC_AODV: ARTIFICIAL BEE COLONY BASED AODV ROUTING IN MANET?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 8)Publication Date: 2014-08-30
Authors : Richa Kalucha; Deepak Goyal;
Page : 566-572
Keywords : MANET; ABC; ACO; PSO;
Abstract
A MANET (Mobile Adhoc Network) is a collection of two or more devices that can communicate with another node that is immediately within their radio range or one that is outside their radio range. Due to flexibility of Ad-hoc networks nodes can join and leave a network easily. As wireless ad-hoc networks lack an infrastructure and are always unreliable, they are exposed to a lot of attacks. Black hole attack is one of the dangerous among them. In the Black Hole attack, a malicious node absorbs all data packets in itself, similar to a hole which sucks in everything. In this way, all packets in the network are dropped. A malicious node dropping all the traffic in the network makes use of the vulnerabilities of the route discovery packets of the on demand protocols, such as AODV. The goal of this work is to study the effects of Black hole attacks on reactive routing protocols i.e. Ad-Hoc on Demand Distance Vector (AODV) and New Ad-Hoc on Demand Distance Vector (nAODV).The proposed process uses the ABC algorithm to detect the Black Hole Attack. The Scout bees are used to search the black hole node. The Employed bee informs the network for the Black Hole node. And Onlooker bees take care of the Black Hole Node is not in the routing. ABC maximizes the lifetime of network and provides an effective multi-path data transmission in efficient manner.
Other Latest Articles
- CONGESTION CONTROL USING ENHANCE AODV (EAODV) ROUTING MECHANISM IN MANET?
- Using the Literature to Develop a Preliminary Conceptual Model for the Student Success Factors in a Programming Course: Java as a Case Study?
- A Review on Compressive Sensing in Synthetic Aperture Radar (SAR)?
- Multicarrier Iterative Generalized Least Squares Data Extraction in Digital Images?
- Providing Security and Efficient Privacy-Preserving Public Auditing?
Last modified: 2014-08-28 01:02:36