Prevention of Black Hole Attacks in MANETs

An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. One of the principal routing protocols used in ad hoc networks is AODV (ad hoc on demand distance vector) protocol. This is anticipated to offer a range of flexible services to mobile and nomadic users by means of integrated homogeneous architecture. Energy constrained node, low channel bandwidth, node mobility, high channel error rates, channel variability and packet loss are some of the limitations of MANETs. The security of the AODV protocol is compromised by a particular type of attack called 'Black Hole attack'. Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. This paper shows simulation results, provides fast message verification, identifies black hole and discovers the safe routing and avoiding the black hole attack.

[1]  Dhaval J. Rana,et al.  Survey on Black Hole Detection and Prevention in MANET , 2014 .

[2]  Keecheon Kim,et al.  Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET , 2014, Int. J. Networked Distributed Comput..

[3]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[4]  Nisha P. John,et al.  Prevention and Detection of Black Hole Attack in AODV based Mobile Ad-hoc Networks - A Review , 2012 .

[5]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[6]  Ingrid Moerman,et al.  An overview of mobile ad hoc networks: applications and challenges , 2004 .

[7]  Amitabh Mishra,et al.  Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.

[8]  Mohit Kumar,et al.  An Overview of MANET: History, Challenges and Applications , 2012 .

[9]  Peter Ebinger,et al.  Measuring the impact of attacks on the performance of mobile ad hoc networks , 2009, PE-WASUN '09.

[10]  Xia Wang,et al.  Feature Selection in Intrusion Detection System over Mobile Ad-hoc Network , 2005 .

[11]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[12]  Hidehisa Nakayama,et al.  Performance of AODV against Black Hole Attacks in Mobile ad-hoc Networks , 2012 .

[14]  Asst . Prof,et al.  STUDY OF DIFFERENT ATTACKS ON MULTICAST MOBILE AD HOC NETWORK , 2009 .

[15]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[16]  S. Dokurer,et al.  Performance analysis of ad-hoc networks under black hole attacks , 2007, Proceedings 2007 IEEE SoutheastCon.

[17]  Yibeltal Fantahun Alem,et al.  Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection , 2010, 2010 2nd International Conference on Future Computer and Communication.

[18]  Rahul Kulkarni,et al.  A Review - Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs , 2014 .

[19]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[20]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[21]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[22]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[23]  Guru Nanak,et al.  A Novel Approach for Preventing Black-Hole Attack in MANETs , 2014 .

[24]  Kwok-Yan Lam,et al.  SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.

[25]  Shiuh-Jeng Wang,et al.  Two-tier authentication for cluster and individual sets in mobile ad hoc networks , 2007, Comput. Networks.

[26]  Rituparna Chaki,et al.  A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.