On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks

Authors

  • Umesh Kumar Singh School of Engineering & Technology, Vikram University, Ujjain (M.P.) India
  • Jalaj Patidar School of Engineering & Technology, Vikram University, Ujjain (M.P.) India
  • Kailash Chandra Phuleriya School of Engineering & Technology, Vikram University, Ujjain (M.P.) India

Keywords:

MANETs, Black Hole, Routing, SAODV, DSR

Abstract

Wireless or Mobile ad hoc Networks (MANETs) emerged to replace the wired networks. MANETs are extensively used in military and civilian applications. The wireless and dynamic nature of MANETs makes them more vulnerable to security attacks when compared with fixed networks. The existing routing protocols are optimized to perform the routing process without considering the security problems. In this paper, we have examined the effect of black holes attacks on the networks. We have also presented a protocol to identify multiple black holes collaborating with each other and a solution to determine a safe route to protect our network on cooperative black hole attack, while showing the future aspects.

 

References

Umesh Kumar Singh, Kailash Phuleriya, Shailja Sharma, D.N. Goswami, A Comparative study of Collaborative Attacks on Mobile Ad-Hoc Networks, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 8, pp.183-187, August 2014.

Umesh Kumar Singh, Lokesh Laddhani and Kailash Chandra Phuleriya, An Analysis of MANET Routing Protocols with Effective Resource Management, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 6, pp. 724-729, June 2014.

Umesh Kumar Singh, Kailash Chandra Phuleriya, Shailja Sharma, and D.N. Goswami, On Protocols to Prevent Black Hole Attacks in Mobile Ad Hoc Networks, International Journal of Electronics Communication and Computer Engineering Volume 6, Issue 1, pp. 55-60, year 2015.

Pooja Jaiswal and Dr. Rakesh Kumar, Prevention of Black Hole Attack in MANET, IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.2, No5, pp. 599-606, October 2012.

Hongmei Deng, Wei Li, and Dharma P. Agarwal, “Routing Security in Wireless Ad Hoc Networks”, University of Cincinnati, IEEE Communications magazine,Vol.40, no.10, October 2002.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks. In mobile Computing and Networking (MOBICOM), pages 255–265, 2000.

P. Michiardi and R. Molva. Preventing denial of service and selfishness in adhoc networks. In Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland, June 2002.

Deng H., Li W. and Agrawal, D. P., "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol.40, no.10, pp. 70- 75, October 2002.

Payal N. Raj1 and Prashant B. Swadas2, “DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009.

Charles E. Perkins, and Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector (AODV) routing,” Internet Draft, November 2002.

C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Computer Communications Review, pp. 234-244, October 1994.

D.Johnson, Y. Hu, and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4", RFC 4728, 2007.

Perkins C.E., Elizabeth M., Royer & Samir R., “Ad hoc On- Demand Distance Vector Routing, IEFT MANET Draft, Charles E. Perkins, Ad Hoc Networking, ISBN 0-201-30976-9, 2003.

Raja L., & Santhosh B., “Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA) in MANET”, International Journal of Engineering and Computer Science, Volume 2 Issue 3, PP. 707-718, 2013.

Bing Wu, Jianmin Chen, Jie Wu & Mihaela Cardei, A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, WIRELESS/MOBILE NETWORK SECURITY Y. Xiao, X. Shen, and D.-Z. Du (Eds.), Springer, pp. 1-38, 2006.

Nagpal C., Kumar C., Bhushan B. & Gupta S., A Study of Black Hole Attack on MANET Performance, I. J. Modern Education and Computer Science, pp. 47-53, 2012.

Manickam P. ,Baskar T &.Manimegalai D., “Performance Comparisons Of Routing Protocols In Mobile Ad Hoc Networks”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 1, pp. 98-106, 2011.

Johnson D. B., Maltz D. & Broch J., “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad hoc Network”, C.E. Perkins, Ed., Addison-Wesley, pp.139-172, 2001.

Prateek K., Arvind N.& Alaria S., “MANET-Evaluation of DSDV, AODV andDSR Routing Protocol”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2 Issue 1, pp.-99-104, 2013.

The network simulator. (http://www.isi.edu/nsnam/ns/).

Umesh Kumar Singh, Kailash Chandra Phuleriya and Rakhi Sunhare, Wireless Sensor Networks: Comparative Study and Analysis of MAC Protocols, International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC), Vol. 4, Issue 2, pp. 107-114, Apr 2014.

Downloads

Published

2015-02-28

How to Cite

[1]
U. K. Singh, J. Patidar, and K. C. Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 3, no. 1, pp. 11–15, Feb. 2015.

Issue

Section

Research Article

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.