Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks

Identifying a trusted and secure route in an un-trusted environment is always a challenging problem. Lack of centralized infrastructure and dependence on other nodes for routing data, always pose security threats in ad hoc networks. So routing in ad hoc networks demands a secure end-to-end route that is free of malicious nodes for reliable packet forwarding. In this paper, we have designed a routing solution called Trust Based Dynamic Source Routing that enables the Dynamic Source Routing (DSR) Protocol to find a secure end-to-end route free of black hole nodes with cooperation from the neighbors. Also our solution can be able to protect the network in the presence of colluding attackers without the need of promiscuous monitoring the neighbor nodes. Extensive simulation has been carried out to evaluate the design of our protocol. The experiment results show that our protocol is able to achieve routing security with 42 % increase in packet delivery ratio and 37 % reduction in packet loss rate when compared to standard DSR under cooperative black hole attack.

[1]  Kien A. Hua,et al.  A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[2]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[3]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[4]  Mario Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .

[5]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[6]  N. Bhalaji,et al.  Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet , 2010, BAIP.

[7]  Djamel Djenouri,et al.  A gradual solution to detect selfish nodes in mobile ad hoc networks , 2010, Int. J. Wirel. Mob. Comput..

[8]  Shukor Abd Razak,et al.  A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks , 2012 .

[9]  Jung-Shian Li,et al.  Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks , 2006, Comput. Commun..

[10]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[11]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[12]  Rahmat Budiarto,et al.  A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority , 2011 .

[13]  Junhai Luo,et al.  Black hole attack prevention based on authentication mechanism , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[14]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[17]  Syed Asad Hussain,et al.  Identification of malicious nodes in an AODV pure ad hoc network through guard nodes , 2008, Comput. Commun..

[18]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..