Secure co-operative neighbour-based approach for detection and prevention of black hole attack in wireless mobile ad-hoc networks

被引:1
|
作者
Bhardwaj S. [1 ]
Kumar V. [1 ]
机构
[1] Department of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar, Uttarakhand
关键词
AODV; Black hole attack; Cooperative neighbour-based detection mechanism; MANET;
D O I
10.1504/IJWMC.2020.109268
中图分类号
学科分类号
摘要
Mobile ad-hoc networks are infrastructure-less, temporary networks which are exposed to routing attacks. Black hole attack is a routing attack formed by dropping all the received packets by a malicious node. To ensure the security and strength of MANETs a secure and effective mechanism is obligatory. This paper presents Secure Cooperative Neighbour-Based Approach in AODV to perceive and circumvent the black hole attack from the start of the network. This approach enables every node to exchange information with its neighbour using a secure, efficient and quick detection process against routing attacks by taking an alternative route on finding an attacker. This approach is able to avoid the black hole nodes and improve the performance of the system as observed in the simulations under ns2. © 2020 Inderscience Enterprises Ltd.. All rights reserved.
引用
收藏
页码:62 / 72
页数:10
相关论文
共 50 条
  • [31] A Role-Based Approach to Secure Routing in Wireless Ad-Hoc Networks
    Shcherba, E. V.
    Nikonov, V. I.
    2016 INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS (SIBCON), 2016,
  • [32] Performance Evaluation of Time-Based Black Hole Attack Detection in Mobile Ad Hoc Networks
    Mahmood, R. A. Raja
    Hussin, M.
    Manshor, N.
    Khan, A. I.
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST), 2014,
  • [33] Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
    Noguchi, Taku
    Hayakawa, Mayuko
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 539 - 544
  • [34] Detection of Black hole Attack in Mobile Ad hoc Network using Adaptive Approach
    Baghel, Lokesh
    Mishra, Prakash
    Samvatsar, Makrand
    Singh, Upendra
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 626 - 630
  • [35] Black Hole Attack Prevention Method Using Dynamic Threshold in Mobile Ad Hoc Networks
    Noguchi, Taku
    Yamamoto, Takaya
    PROCEEDINGS OF THE 2017 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2017, : 797 - 802
  • [36] Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks
    Poongodi, T.
    Karthikeyan, M.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 1039 - 1050
  • [37] Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks
    T. Poongodi
    M. Karthikeyan
    Wireless Personal Communications, 2016, 90 : 1039 - 1050
  • [38] Interception of Black- Hole Attacks in Mobile AD-HOC Networks
    Balachandra
    Shetty, Nisha P.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 5 - 9
  • [39] Detecting Black Hole Attack in Wireless Ad Hoc Networks Based On Learning Automata
    Soleimani, Mohammad Taqi
    Ghasemi, Abdorasoul
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 514 - 519
  • [40] Active Black Holes Detection in Ad-Hoc Wireless Networks
    Wang, Chun-Hsin
    Li, Yang-Tang
    2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 94 - 99