Secure dynamic source routing protocol for defending black hole attacks in mobile Ad hoc networks

Wireless Ad Hoc Network is a dynamically organized network on emergency situations, in which a group of wireless devices send data among themselves without requiring any base stations for forwarding data. Here the nodes itself perform the functions of routing. This important characteristic of mobile ad hoc networks allows the hassle free set up of the network for communications in different crisis such as battlefield and natural disaster zones. Multi hop communication in MANET is achieved by the cooperation of nodes in forwarding data packets. This feature of MANET is largely exploited to launch a security attack called black hole attack. A light weight solution called SEC-DSR is proposed to defend the network from black hole attack and enables communication among nodes even in the presence of attackers. In this scheme, by analyzing only the control packets used for routing in the network, the compromised nodes launching the attack are identified. From the collective judgment by the participating nodes in the routing path, a secure route free of black hole nodes is selected for communication by the host. Simulation results validate and ensure the effectiveness of the proposed solution tested on an ad hoc network with compromised black hole nodes.

[1]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[2]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[3]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[4]  Ali Dorri,et al.  DEBH: detecting and eliminating black holes in mobile ad hoc network , 2018, Wirel. Networks.

[5]  Winston Khoon Guan Seah,et al.  Security threats and solutions in MANETs: A case study using AODV and SAODV , 2012, J. Netw. Comput. Appl..

[6]  Otto Carlos Muniz Bandeira Duarte,et al.  A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Edwin Hsing-Mean Sha,et al.  Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks , 2016, J. Netw. Comput. Appl..

[8]  Peng Zhou,et al.  Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.

[9]  Pankaj Sharma,et al.  Implementation of Watchdog Protocol with AODV in Mobile Ad Hoc Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[10]  Otto Carlos Muniz Bandeira Duarte,et al.  An accurate and precise malicious node exclusion mechanism for ad hoc networks , 2014, Ad Hoc Networks.

[11]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.

[12]  Zhiping Jia,et al.  Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory , 2011, IET Wirel. Sens. Syst..

[13]  Adwan Yasin,et al.  Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique , 2018, Wirel. Commun. Mob. Comput..

[14]  Xue Jun Li,et al.  An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs , 2019, IEEE Transactions on Mobile Computing.

[15]  Muthucumaru Maheswaran,et al.  A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[16]  Rutvij H. Jhaveri,et al.  A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.

[17]  Syed Asad Hussain,et al.  Identification of malicious nodes in an AODV pure ad hoc network through guard nodes , 2008, Comput. Commun..

[18]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[19]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[20]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[21]  Gurveen Vaseer,et al.  A Neighbor Trust-Based Mechanism to Protect Mobile Networks , 2019, IEEE Potentials.

[22]  Gabriel Maciá-Fernández,et al.  Taxonomy and Holistic Detection of Security Attacks in MANETs , 2014 .

[23]  Jia Guo,et al.  Trust management in mobile ad hoc networks for bias minimization and application performance maximization , 2014, Ad Hoc Networks.