Black Hole Attack Prevention in Mobile Ad-hoc Network (MANET) Using Ant Colony Optimization Technique
Keywords:Black Hole Attack, Ant Colony Optimization, Reactive Routing Protocol, Secured ad-hoc network
The Mobile ad-hoc networks are auto configured systems where hubs can travel towards any direction. It doesn’t rely on any other frame to build the framework. Because of its versatility, the black hole is a real security issue to be settled. It occurs once a malignant hub referred to as black hole goes into the framework. Black hole center point exhibits its fake lead among the methodology after all disclosure. Currently, varied strategies are made arrangements for Mobile ad-hoc networks. Regardless, at interims seeing Black hole or fake hubs, the entire Mobile ad-hoc frameworks are exposed to various sorts of assaults or network attacks. Among these issues, a black hole center points plugs itself of getting a most nearest targeted hub, whose data packet must be constrained to drop. In this flooding procedures, if the communication from the genuine hub accomplishes later than the fake hub reply as requested by the standard hub. A false communication path is framed through a fake center hub. A perfect method is one in which the package reach to target with less delay and lesser overhead. In this paper we'll talk about the implementation of Ant Colony Optimization Technique and Repetitive Route Configuration with Reactive Routing Protocol for obstruction of black hole Attack in Mobile ad-hoc networks.
Copyright terms are indicated in the Republic of Lithuania Law on Copyright and Related Rights, Articles 4-37.