EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks

被引:1
|
作者
Kancharakuntla, Deepika [1 ]
El-Ocla, Hosam [1 ]
机构
[1] Lakehead Univ, Dept Comp Sci, Thunder Bay, ON P7B 5E1, Canada
关键词
wireless; MANET; blackhole; attack; routing; round trip time; time to live; congestion; PERFORMANCE ANALYSIS; CONGESTION CONTROL; HOLE ATTACKS; MANETS; SCHEME; AODV; TCP;
D O I
10.3390/electronics11213480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The presence of malevolent nodes in mobile ad hoc networks (MANETs) would lead to genuine security concerns. These nodes may disturb the routing process or deform the pattern of the data packets passing through the network. The MANET is extremely liable to attacks, owing to its characteristics of the network framework, such as the absence of infrastructure, moveable topology, and a centralized control unit. One of the most common attacks in MANETs is the blackhole attack. MANET nodes are susceptible to spectacular degradation of network performance in the presence of such attacks. In this regard, detecting or preventing deceitful nodes that will launch blackhole attacks is a challenge in MANETs. In this paper, we propose an Enhanced Blackhole Resistance (EBR) protocol to identify and resist nodes that are responsible for blackhole attacks. EBR can avoid congested traffic by passing the data packets through a safe route with the minimum RTT. The EBR protocol uses a combination of time to live (TTL) and round trip time (RTT), which is also called a TR mechanism, to detect the blackhole attacks. Our algorithm does not require any cryptographic or authentication mechanisms. Simulation results prove that EBR behaves better than other protocols in terms of throughput, end-to-end delay, packet delivery ratio, energy, and routing overhead.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Obaidat, Mohammad S.
    Peddi, Rajender Dheeraj
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 420 - 428
  • [2] BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks
    Luong, Ngoc T. T.
    Hoang, Doan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1547 - 1566
  • [3] BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks
    Ngoc T. Luong
    Doan Hoang
    [J]. International Journal of Information Security, 2023, 22 : 1547 - 1566
  • [4] Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks
    Moudni, Houda
    Er-Rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, IMAGING AND VISUALIZATION (CGIV), 2016, : 385 - 389
  • [5] A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks
    Lakshmi, G. Vidhya
    Vaishnavi, P.
    [J]. JOURNAL OF ENGINEERING RESEARCH, 2024, 12 (03): : 379 - 386
  • [6] Routing attacks and solutions in mobile ad hoc networks
    Geng Peng
    Zou Chuanyun
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 806 - +
  • [7] A survey of routing attacks in mobile Ad Hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Nemoto, Yoshiaki
    Kato, Nei
    Jamalipour, Abbas
    [J]. IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 85 - 91
  • [8] Securing Data Forwarding against Blackhole Attacks in Mobile Ad Hoc Networks
    Elmahdi, Elbasher
    Yoo, Seong-Moo
    Sharshembiev, Kumar
    [J]. 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 463 - 467
  • [9] A Proposal Mechanism Against the Attacks: Cooperative Blackhole, Blackmail, Overflow and Selfish in Routing Protocol of Mobile Ad Hoc Network
    Konate, Karim
    Gaye, Abdourahime
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2011, 4 (02): : 69 - 80
  • [10] Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    [J]. 2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 245 - 250