PDA: Proactive Defense Approach for Black-Hole and DOS Attack Free Optimal Routing in Mobile Ad-Hoc Networks
Kondeboina Srinivasa Kumar1, M. Akkalakshmi2

1Kondeboina Srinivasa Kumar, Research Scholar, Rayalaseema University, Kurnool (Andhra Pradesh), India.
2Dr. M. Akkalakshmi, Professor, GITAM University, Hyderabad (Telangana), India.
Manuscript received on 07 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript published on 30 April 2019 | PP: 1195-1201 | Volume-8 Issue-6, April 2019 | Retrieval Number: F3745048619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The scope of the intrusions in mobile ad hoc networks is considerably proportionate to the growth of the mobile ad hoc network scope in the use of technology in general strategic facilities of the human life. The intruders intended to downgrade the performance scope of the target network often performs black hole attacks. The other frequent method of intrusion in ad hoc networks is denial of service, which is often evincing through the gray hole and warm hole attacks. The nodes compromised to perform these attacks are insensitive to identify. This manuscript contributed a novel evolutionary approach to establish an optimal route between source and target nodes that eliminates the scope of the nodes compromised to denial of service attacks through performing black hole, gray-hole and warm-hole activities. The performance of the contribution is scaled by comparing the experimental results of the proposal with other contemporary models.
Keyword: Wireless Networks, Intrusion Detection System, Mobile ad Hoc Network, RDIDS-WMAN, Fine Grain Analysis.
Scope of the Article: Mobile Networks & Wireless LAN