Enhanced Detection and Elimination Mechanism from Cooperative Black Hole Threats in MANETs

Malicious node invasion as black hole attack is a burning issue in MANETs. Black hole attacks with a single malicious node is easy to detect and prevent. The collaborative attacks with multiple cooperative malicious node is a challenging issue in security of MANETs as it is difficult to figure out due to its complex and sophisticated mechanism. This study proposed a novel signature-based technique to detect and handle the cooperative black hole attack in MANETs. For this purpose, diverse type of simulation scenarios are used with increasing number of nodes. The parameters such as average throughput, average packet drop, average end to end delay, average processing time and malicious node detection rate are used to measure the impact of signature-based malicious node detection scheme. AODV is used as routing protocol in this study. This study revealed that the performance of MANETs degrades with an increase in a number of malicious nodes. The average throughput of MANETs decreases with increase in average end to end delay and average packet drop. Signature-based malicious nodes detection mechanism is used to counter the cooperative black hole attack. The signature-based technique has enhanced the detection and elimination of cooperative black hole attack in MANETs. This helps in comparatively an increase in average throughput and decrease in packet delay and packet drop.

[1]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[2]  Toor Gul,et al.  Improving Energy Conservation in Wireless Sensor Network Using Energy Harvesting System , 2018 .

[3]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Abolghasem Sadeghi-Niaraki,et al.  Ubiquitous sensor network simulation and emulation environments: A survey , 2017, J. Netw. Comput. Appl..

[6]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[7]  Guoyou He Destination-Sequenced Distance Vector ( DSDV ) Protocol , 2002 .

[8]  Mohit Jain,et al.  The Intelligent Network , 1989, Springer Berlin Heidelberg.

[9]  Ali Dorri,et al.  A new approach for detecting and eliminating cooperative black hole nodes in MANET , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).

[10]  K. Gowri Raghavendra Narayan,et al.  A Study on Certificate-Based Trust in MANETs , 2018 .

[11]  Samiullah Khan,et al.  QoS Based Evaluation of Multipath Routing Protocols in Manets , 2017 .

[12]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .

[13]  R. Saravanan,et al.  A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.

[14]  D. Sathiya,et al.  Improved security and routing path learning in MANETs using Beer–Quiche game theoritical model in cloud computing , 2018, Cluster Computing.

[15]  Samiullah Khan,et al.  Comparative Analysis of Controlled Delay (CoDel) with Deficit Round Robin (DRR) to Overcome Bufferbloat Problem in Wired Network , 2015 .

[16]  Consolee Mbarushimana,et al.  Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[17]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[18]  Sandeep Gupta,et al.  EMAODV: Technique to Prevent Collaborative Attacks in MANETs , 2015 .

[19]  Samiullah Khan,et al.  An Efficient and Reliable Core-Assisted Multicast Routing Protocol in Mobile Ad-Hoc Network , 2016 .

[20]  Abderrahmane Baadache,et al.  Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks , 2010, ArXiv.

[21]  D. Manimegalai,et al.  Performance Comparisons of Routing Protocols in Mobile Ad Hoc Networks , 2011, ArXiv.

[22]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[23]  Matiullah,et al.  Effect of Increasing Number of Nodes on Performance of SMAC, CSMA/CA and TDMA in MANETs , 2018 .

[24]  Samiullah Khan,et al.  Deterministic Time Markov Chain Modelling of Simultaneous Multipath Transmission Schemes , 2017, IEEE Access.

[25]  Shailendra Kumar Shrivastava,et al.  Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks , 2018 .

[26]  Isaac Woungang,et al.  Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks , 2012, FPS.

[27]  J. K. Mandal,et al.  Effect of Black Hole Attack on MANET Reliability in DSR Routing Protocol , 2018 .

[28]  Matiullah,et al.  Quality of Service Impact on Deficit Round Robin and Stochastic Fair Queuing Mechanism in Wired-cum-Wireless Network , 2018 .

[29]  William Kozma,et al.  REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits , 2009, WiSec '09.

[30]  Ali Dorri,et al.  An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET , 2017, Wirel. Networks.

[31]  Padmalaya Nayak,et al.  Impact of Random Mobility Models for Reactive Routing Protocols over MANET , 2016 .

[32]  Klaus Wehrle,et al.  Modeling and Tools for Network Simulation , 2010, Modeling and Tools for Network Simulation.

[33]  Dhaval Dave,et al.  An effective Black hole attack detection mechanism using Permutation Based Acknowledgement in MANET , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[34]  Vrinda Tokekar,et al.  Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[35]  Dilraj Singh,et al.  Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks , 2015, Future Internet.

[36]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[37]  S. Kalwar Introduction to reactive protocol , 2010, IEEE Potentials.

[38]  Sukhbir Singh,et al.  Implementation of Routing Security Aspects in AODV , 2010 .

[39]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[40]  J. Premalatha,et al.  Performance amelioration of MANETs using cooperative routing with cross-layer design , 2017, Int. J. Bus. Intell. Data Min..

[41]  Shailendra Narayan Singh,et al.  Wormhole attacks in MANET , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).

[42]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[43]  Jiann-Liang Chen,et al.  Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[45]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[46]  Fawad Ali Khan,et al.  ADAPTIVE FAST RETRANSMISSION WITH RESPECT TO RECEIVER BUFFER (RBUF) SPACE IN SIMULTANEOUS MULTIPATH TRANSMISSION (SMT) , 2018 .

[47]  Raja Datta,et al.  Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..