Mitigate Black Hole Attack using Trust with AODV in MANET

被引:0
|
作者
Keerthika, V. [1 ]
Malarvizhi, N. [2 ]
机构
[1] Er Perumal Manimekalai Coll Engn, Dept CS, Hosur, Tamil Nadu, India
[2] Veltech Dr RR & Dr SR Tech Univ, Dept CSE, Madras, Tamil Nadu, India
关键词
Mobile Adhoc Network (MANET); Security; Direct Trust; Normalized Route Reply Misbehavior Factor; Link Quality; Adhoc On-demand Distance Vector (AODV); Weighted Trust Adhoc On Demand Distance Vector(WTAODV);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile Adhoc Networks (MANETs) are unstable and vulnerable to attack and so their security issues are critical and tougher to design and implement than for wired networks. Though various encryption methods are available to ensure authentication and authorization, they are relatively ineffective in MANET's due to their high computational requirement. To overcome this various trust based mechanisms have been proposed in literature. This work proposed Weighted Trust. Adhoc On Demand Distance Vector (WTAODV) in which a trust model is implemented over AODV to mitigate black hole attack in MANET. Direct/indirect trust is computed using normalized Route Reply misbehavior factor, link quality and neighborhood trust. Simulations show improved Packet Delivery Ratio of over 15% for different scenarios.
引用
收藏
页码:470 / 474
页数:5
相关论文
共 50 条
  • [41] Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing
    Naveena, S.
    Senthilkumar, C.
    Manikandan, T.
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1222 - 1227
  • [42] Evaluation of black hole attack with avoidance scheme using AODV protocol in VANET
    Kumar, Manish
    Jain, Vanita
    Jain, Achin
    Bisht, Uttam Singh
    Gupta, Neha
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (02): : 277 - 291
  • [43] Honeypot Based Black-Hole Attack Confirmation in a MANET: Black-Hole Attack Confirmation
    Tiruvakadu D.S.K.
    Pallapa V.
    [J]. International Journal of Wireless Information Networks, 2018, 25 (4) : 434 - 448
  • [44] Technique for Detection of Cooperative Black Hole Attack in MANET
    Wahane, Gayatri
    Lonare, Savita
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [45] Proposal of a Method to Detect Black Hole Attack in MANET
    Zhang, XiaoYang
    Sekiya, Yuji
    Wakahara, Yasushi
    [J]. ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 149 - 154
  • [46] Detection of Single and Collaborative Black Hole Attack in MANET
    Sathish, M.
    Arumugam, K.
    Pari, S. Neelavathy
    Harikrishnan, V. S.
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 2040 - 2044
  • [47] Trust and Reputation Based Seurity of MANET by Worm Hole Attack
    Parbin, Shabina
    Mahor, Leeladhar
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (06): : 41 - 54
  • [48] Detection As Well As Removal Of Black hole And Gray hole Attack In MANET
    Sharma, Neha
    Bisen, Anand Singh
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3736 - 3739
  • [49] Identifying and detecting black hole and gray hole attack in MANET using gray wolf optimization
    Vatambeti, Ramesh
    Supriya, Kola Sangeetha
    Sanshi, Shridhar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (18)
  • [50] Effect of Single and Cooperative Black Hole Attack in MANET using OLSR protocol
    Nabou, Abdellah
    Driss Laanaoui, My
    Ouzzif, Mohammed
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,