Open Access   Article

Hetnet Security Solution for Black Hole Attack In Millimeter Range Mobile Communication

D.V. Chikhale1 , S.B. Deosarkar2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 37-42, Jun-2018


Online published on Jun 30, 2018

Copyright © D.V. Chikhale, S.B. Deosarkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library


IEEE Style Citation: D.V. Chikhale, S.B. Deosarkar, “Hetnet Security Solution for Black Hole Attack In Millimeter Range Mobile Communication”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.37-42, 2018.

MLA Style Citation: D.V. Chikhale, S.B. Deosarkar "Hetnet Security Solution for Black Hole Attack In Millimeter Range Mobile Communication." International Journal of Computer Sciences and Engineering 6.6 (2018): 37-42.

APA Style Citation: D.V. Chikhale, S.B. Deosarkar, (2018). Hetnet Security Solution for Black Hole Attack In Millimeter Range Mobile Communication. International Journal of Computer Sciences and Engineering, 6(6), 37-42.

118 146 downloads 38 downloads


Abstract— In the world of network security, hetnet security is upcoming task in the era of evolution of fifth generation around 2020. The mobile device usage to handle cellular data which needs high level of security is increasing day by day.This data is used for various applications in different fields extensively, hence the attacks in an attempt to break security breach is also increasing. It is essential to provide security for network formed by small cells like picocell, femtocell and microcell. This paper deals with one of the approach to provide security to heterogeneous network from black hole kind of attack based on performance evolution using simulation of various network parameters in matlab to provide end to end authentication and security. The security to femtocell or picocell in hetnet not only help to send data at high speed in millimeter range but also increase coverage, capacity and efficiency of the network and reduce power requirement up to the greater extent. The heterogeneous network security solution focuses on how data level and network level security can be achieved by improving hetnet parameters to reduce the level of security breach and to achieve desired security.

Key-Words / Index Term

HetNet, Communication node, Attacks, Routing Protocol, Security


[1] Rose Hu,Yi Qian,Sastri Kota, Giovanni Giambene, “Hetnets- a new paradigm for increasing cellular capacity and coverage” IEEE Journel and Magazine, Vol-18,Issue-3,pp-8-9,June-2011.
[2] Pradeepkumar Sharma, Shivlal Mewada,Pratiksha Nigam,”Investigation based performance of Black and Gray Hole Attack in Mobile Adhoc Network” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue 4, pp.8-11, Sep.-2013.
[3] Leena Pal,Pradeep Sharma,Netram Kaurav,and Shivlal Mewda “Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.1, No.5, pp.1-4, Nov. 2013.
[4] Elamathi N, Dr. S. Jayshree, “Security For Green Communication in Heterogeneous Wireless Networks” International Journel of Innovative Research in Computer and Communication Engineering, Vol. 2, Jan. 2014.
[5] Abderrahmane Baadache, Alibelmehdi, “ Struggling against simple and cooperative blackhole attacks in multihop wireless adhoc networks” ScienceDirect Journel of Computer Networks, Vol-73, pp-173-184,November 2014.
[6] Meenakshi Sharma, GNDE RC Jalandhar, “Future Trends in the Cell Site Planning For Capacity Enhancement” International Journel of Engineering Research and Management Technology, Vol. 2, March 2015.
[7] Sumant Kumohapatra, BiswaRanjan Swain, Pravanjan Das, “Comprehensive Survey of Possible Security Issues on 4G Networks” International Journal of Network Security and Its Applications, Vol. 7, No.2, March 2015.
[8] Xianbin Wang, Peng Hao, Lajos Hanzo, “Physical Layer Authentication for Wireless Enhancement: Current Challenges and Future Developments”, IEEE Journel and Communications Magazine, 2016.
[9] Javed Ahmad Shaheen, “ Wireless Network Architecture an Overview and Security Issues on 4G” International Journel of Future Green Communication and Networking, Vol. 10, No. 1, pp 15-24, 2017.
[10] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[11] Muhammad Omer Farooq Cormac J Sreenan and Kenneth N. Brown,“Research Challenges in 5G Networks : a Hetnets Perspective” International ICIN conference, Paris, March 2016.
[12] Makato Ando, Miao Zhang, Jiro Hirokawa, Kei Saka Guchi, Toru Taniguchi, Makoto Noda, Akira Yamaguchi, “ Demonstration of mmWave Systems and Networks for the Hetnet in 5G Mobile Communication” URSI International Symposium on Electromagnetics Theory (EMTS), 2016.
[13] Hakima Chaouchi, Maryline Laurent-Maknavicius , “Wireless and Mobile Network Security:Security in On the shelf and Emerging Technologies.” JohnWiley and Sons Publication, UK, pp. 409-435, 2010.
[14] Kan Zheng, Long Zhao, Jie Mei, Mischa Dohler, Wei xiang, Yuexing Peng, “10Gbs/s, HetsNets with Millimeter-Wave Communications Access and Networking – Challenges and Protocols.” IEEE Communications Magazine , Jan. 2015.
[15] Silvere Mavoungou, Georges Kaddoum, Mostafa Taha, Georges Matar, “ Survey on Threats and Attacks on Mobile Networks” IEEE Access, Vol. 4, 2016.