Removal of Selective Black Hole Attack inMANET by AODV Protocol

Mobile AdHoc networks are self-configuring and self-organizing multi-hop wireless networks. A mobile Adhoc Network (MANET) is a collection of autonomous mobile users communicating over bandwidth constrained wireless links. Due to the mobile nodes, the topology of the network keeps changing unpredictably and rapidly over time. A selective black hole attack on MANET refers to an attack by a malicious node, which forcibly acquires the route from source to a destination by the falsification of sequence number and hop count of the routing message. As selective black hole is a node that can optimally and alternately perform a selective black hole attack or perform as a normal node. In this paper, we propose a method of activating the promiscuous mode and hence further data packet loss is prevented. Finally, we analyze the performance of the nodes after the inclusion of promiscuous mode.

[1]  Soufiene Djahel,et al.  An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol , 2008, 2008 IEEE International Conference on Communications.

[2]  Marjan Kuchaki Rafsanjani,et al.  Identifying Monitoring Nodes with Selection of Authorized Nodes in Mobile Ad Hoc Networks , 2008 .

[3]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[4]  L. Tamilselvan,et al.  Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[5]  王淑卿,et al.  An Optimal Solution for Byzantine Agreement under a Hierarchical Cluster-oriented Mobile Ad-hoc Network , 2010 .

[6]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[7]  Bo-Chao Cheng,et al.  A Context Adaptive Intrusion Detection System for MANET , 2011, Comput. Commun..

[8]  Sukla Banerjee Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .

[9]  Sandeep Lalasaheb Dhende,et al.  Detection/Removal of Black Hole Attack in Mobile Ad-Hoc Networks , 2012 .

[10]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[11]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[12]  R.A. Raja Mahmood,et al.  A survey on detecting black hole attack in AODV-based mobile ad hoc networks , 2007, 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies.

[13]  Hossam S. Hassanein,et al.  Routeguard: an intrusion detection and response system for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[14]  Lei Guo,et al.  Routing security scheme based on reputation evaluation in hierarchical ad hoc networks , 2010, Comput. Networks.

[15]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[16]  Christos Douligeris,et al.  Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.