Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Back Bone Node Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks
Authors: Nidhi Gupta, Sanjoy Das, Khushal Singh
Abstract:
Mobile Ad hoc Network is a set of self-governing nodes which communicate through wireless links. Dynamic topology MANETs makes routing a challenging task. Various routing protocols are there, but due to various fundamental characteristic open medium, changing topology, distributed collaboration and constrained capability, these protocols are tend to various types of security attacks. Black hole is one among them. In this attack, malicious node represents itself as having the shortest path to the destination but that path not even exists. In this paper, we aim to develop a routing protocol for detection and prevention of black hole attack by modifying AODV routing protocol. This protocol is able to detect and prevent the black hole attack. Simulation is done using NS-2, which shows the improvement in network performance.Keywords: Ad hoc, AODV, Back Bone, routing, Security.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1338406
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2163References:
[1] S. Basagni, M. Conti, S. Giordano, I. Stojmenovi, “Mobile Ad Hoc Networking”, IEEE Press and John Wiley & Sons, Inc., 2004.
[2] M.S. Corson and A. Ephremides, “A distributed routing Algorithm for Mobile Wireless Network”, ACM J. Wireless Networks, 1(1), Jan. 1995.
[3] C. E. Perkins and E. M. Royer, “Ad-Hoc On-Demand Distance Vector Routing,” Proc. 2nd IEEE Mobile Computer Systems and Applications, 1999, pp. 90–100.
[4] P.V.Jani, “Security within Ad-Hoc Networks”, Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
[5] K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesi , Blekinge Institute of Technology Sweden, 22nd March 2007.
[6] B. Wu, J. Chen, J. Wu, M. Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless Network Security. On Signals and Communication Technology, Springer, New York, 2009.
[7] Vishnu K and Amos J Paul, “Detection and Removal of Cooperative Black/Gray hole attack in Mobile ADHOC Networks”, International Journal of Computer Applications (0975 - 8887), 2010, Volume 1, No. 22, pp. 38-42.
[8] H. Deng, W. Li and D.P. Agrawal, "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol.40, no.10, October 2002, pp. 70- 75.
[9] Nidhi Gupta, Sanjoy Das, Khushal Singh, "A Comprehensive Survey and Comparative Analysis of Black Hole Attack in Mobile Ad Hoc Network", World Academy of Science Engineering and Technology, International Journal of Computer, Information Science and Engineering, vol. 8, no. 1, 2014.
[10] M. Medadian, A. Mebadi, E. Shahri, "Combat with Black Hole attack in AODV routing protocol", Communications (MICC), 2009 IEEE 9th Malaysia International Conference on, vol., no., Dec.2009, pp.530-535, 15-17.
[11] B. Sun, Y. Guan, J. Chen, U.W. Pooch , “ Detecting Black-hole Attack in Mobile Ad Hoc Networks”. 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22-25 April 2003.
[12] S. Banerjee “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks” Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
[13] P.C. Tsou, J. M. Chang, L, H. C. Chao, J. L. Chen , “ Developing a BDSR Scheme to Avoid Black Hole Attack Based on Proactive and Reactive Architecture in MANETs”, 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, Feb. 2011, pp. 13-16.
[14] W. Saetang and S. Charoenpanyasak, “CAODV Free Blackhole Attack in Ad Hoc Networks” Conference on Computer Networks and Communication Systems, IPCSIT vol.35, 2012, pp. 63- 68.
[15] P. Agrawal, R. K. Ghosh, Sajal K. Das, Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks In Proceedings of the 2nd international conference on Ubiquitous information management and communication, Suwon, Korea, 2008, Pages 310-314.
[16] S. Indrasinghe, R. Pereira, J. Haggerty, “Conflict Free Address Allocation Mechanism International for Mobile Ad Hoc Networks”, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[17] M. Mohsin and R. Prakash,”IP Address Assignment in a mobile ad hoc network”, The University of Texas at Dallas Richardson, TX Kaixin Xu, Xiaoyan Hong, Mario Gerla Computer Science Department at UCLA, Los Angeles, CA 90095 project under contract N00014-01-C-0016.
[18] The Network Simulator - NS-2 (http://www.isi.edu/nsnam/ns/build.html).