STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET

Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes connecting directly without a top-down network architecture or central controller. Absence of base stations in MANET force the nodes to rely on their adjacent nodes in transmitting messages. The dynamic nature of MANET makes the relationship between nodes untrusted due to mobility of nodes. A malicious node may start denial of service attack at network layer to discard the packets instead of forwarding them to destination which is known as black hole attack. In this paper a secure and trust based approach based on ad hoc on demand distance vector (STAODV) has been proposed to improve the security of AODV routing protocol. The approach isolates the malicious nodes that try to attack the network depending on their previous information. A trust level is attached to each participating node to detect the level of trust of that node. Each incoming packet will be examined to prevent the black hole attack.

[1]  Sukla Banerjee Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .

[2]  Joseph P. Macker,et al.  Internet-Based Mobile Ad Hoc Networking , 1999, IEEE Internet Comput..

[3]  Mohammad S. Obaidat,et al.  A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks , 2016, Secur. Commun. Networks.

[4]  Ahmed Tamtaoui,et al.  MLP Neural Network to improve Digital Watermark detection in gray scale images , 2012 .

[5]  Fan Wu,et al.  Building smartphone Ad-Hoc networks with long-range radios , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[6]  A. Khatkar,et al.  Performance Evaluation of Hybrid Routing Protocols in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  S. S. Tyagi Study of MANET: Characteristics, Challenges, Application and Security Attacks , 2013 .

[9]  Rutvij H. Jhaveri,et al.  Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs - ERRATA , 2012 .

[10]  Irshad Ullah,et al.  Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .

[11]  Rob J. van Glabbeek,et al.  Modelling and verifying the AODV routing protocol , 2015, Distributed Computing.

[12]  Chita R. Das,et al.  Cache invalidation strategies for internet-based mobile ad hoc networks , 2007, Comput. Commun..

[13]  Raj Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[14]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[15]  Upendra Singh,et al.  Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm , 2015, 2015 International Conference on Computer, Communication and Control (IC4).

[16]  A. Laouiti,et al.  Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..

[17]  Parveen Kakkar,et al.  Traffic Pattern based performance comparison of Reactive and Proactive protocols of Mobile Ad-hoc Networks , 2010 .

[18]  Hannes Hartenstein,et al.  Stochastic Properties of the Random Waypoint Mobility Model , 2004, Wirel. Networks.

[19]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[20]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[21]  Jiannong Cao,et al.  Gossip-Based Cooperative Caching for Mobile Phone Games in IMANETs , 2011, 2011 IEEE 17th International Conference on Parallel and Distributed Systems.

[22]  R. H. Jhaveri,et al.  MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[23]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[24]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[25]  Keecheon Kim,et al.  Secure Route Discovery for preventing black hole attacks on AODV-based MANETs , 2013, 2013 International Conference on ICT Convergence (ICTC).

[26]  Umang Singh,et al.  Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption , 2010, IET Commun..

[27]  Ingrid Moerman,et al.  An overview of mobile ad hoc networks: applications and challenges , 2004 .

[28]  Kefei Cheng,et al.  Smart Phone for Mobile Communication Community , 2013 .