Abstract

Mobile ad hoc networks are the “spontaneous networks” which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure network. Each device in this network works as a router to develop end-to-end communication connections and move independently in any direction. Mostly, mobile ad hoc networks use the IEEE 802.11b protocol with carrier-sense multiple access with collision avoidance medium access control layer protocol for sharing a common medium among the nodes simultaneously. Due to this distributed medium, the routing and medium access control layer of the mobile ad hoc network are prone to attacks. Among several attackers, blackhole attacker is the dangerous one which causes the loss of all data packets of devices in the network. Efficient medium access control protocol designs in this respect play a key role in determining channel utilization, network delay, and, more importantly, network security. In the proposed work, preamble information is used with time-division multiple access medium access control. The preamble time-division multiple access uses time synchronization for each time slot and does not assign much time to the blackhole attacker due to a fixed time slot. As a result, blackhole is not stable in all communications and such an attack is effectively defended. Simulation results show that, in the presence of the blackhole attacker, carrier-sense multiple access with collision avoidance has a high packet loss ratio and low network throughput as compared to the proposed preamble time-division multiple access.

Highlights

  • Since decades, the demand of mobile/wireless subscribers has been increasing rapidly due to the extensive use of bandwidth-hungry applications such as video on demand (VoD), on-line gaming, and BitTorrent.[1]

  • The results show that preamble time-division multiple access (TDMA) choice of medium access control (MAC) protocol has any edge over the carrier-sense multiple access with collision avoidance (CSMA/CA) choice of the MAC protocol

  • This article compares the performance of preamble TDMA and CSMA (802.11b) under blackhole attack

Read more

Summary

Introduction

The demand of mobile/wireless subscribers has been increasing rapidly due to the extensive use of bandwidth-hungry applications such as video on demand (VoD), on-line gaming, and BitTorrent.[1]. Due to its nature of the infrastructure-less and open network structure, there are so many issues and limitations in MANET as well,[12,13,14,15] such as challenges related to routing,[16,17] medium access control (MAC),[18,19] transmission range,[20] mobility,[21] energy issues,[22,23,24] location management,[25,26,27,28] and security.[29] Among all, the main issue is the failure of nodes or communication links due to instability observed in this network. This is achieved based on the preallocation of resources to individual nodes An example of such a scheme is time-division multiple access (TDMA).[37] Figure 4 shows some categories of MAC protocols for MANET. STDMA ASTA VeMAC with simulation results; and the final conclusion remarks are presented in section ‘‘Conclusion.’’

Related work
17 StartpacketTranmission
Results and discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call