Black Hole Attack Detection in MANET Using Mobile Trust Points with Clustering

被引:8
|
作者
Singh, Manjeet [1 ]
Singh, Prabhdeep [1 ]
机构
[1] Guru Nanak Dev Univ, Dept Comp Sci & Engn, Amritsar, Punjab, India
关键词
MANET; Clustering; Black hole; Mobile trust points;
D O I
10.1007/978-981-10-3433-6_68
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
MANET is a set of mobile nodes in which communication occurs between them using wireless links. Infrastructure less, dynamical topology and Lack of central communication of nodes makes it vulnerable to various kinds of attacks. One of the major security problems is Black Hole attack in which node silently drops the packets in the network. In this paper, we propose a solution to mitigate this attack in MANET using mobile trust points with clustering. The proposed method uses some mobile trust points which monitor the activities of cluster heads to detect the attack and then generate alert in the network if any black hole node detected.
引用
收藏
页码:565 / 572
页数:8
相关论文
共 50 条
  • [21] QoS of MANet Through Trust Based AODV Routing Protocol by Exclusion of Black Hole Attack
    Bar, Radha Krishna
    Mandal, Jyotsna Kumar
    Singh, Moirangthem Marjit
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 530 - 537
  • [22] Trust Based Mechanism with AODV Protocol for Prevention of Black-Hole Attack in MANET Scenario
    Jain, Apurva
    Prajapati, Urmila
    Chouhan, Piyush
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [23] Securing AODV Routing Protocol against Black hole Attack in MANET using Outlier Detection Scheme
    Yadav, Sakshi
    Trivedi, Munesh Chandra
    Singh, Vikash Kumar
    Kolhe, Mohal L.
    2017 4TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ELECTRONICS (UPCON), 2017, : 1 - 4
  • [24] Honeypot Based Black-Hole Attack Confirmation in a MANET: Black-Hole Attack Confirmation
    Tiruvakadu D.S.K.
    Pallapa V.
    International Journal of Wireless Information Networks, 2018, 25 (4) : 434 - 448
  • [25] Mitigate Black Hole Attack Using Hybrid Bee Optimized Weighted Trust with 2-Opt AODV in MANET
    Keerthika, V.
    Malarvizhi, N.
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 621 - 632
  • [26] Mitigate Black Hole Attack Using Hybrid Bee Optimized Weighted Trust with 2-Opt AODV in MANET
    V. Keerthika
    N. Malarvizhi
    Wireless Personal Communications, 2019, 106 : 621 - 632
  • [27] Proposal of a Method to Detect Black Hole Attack in MANET
    Zhang, XiaoYang
    Sekiya, Yuji
    Wakahara, Yasushi
    ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 149 - 154
  • [28] Secure AODV to Combat Black Hole Attack in MANET
    Narayanan, S. Sankara
    Radhakrishnan, S.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 447 - 452
  • [29] Trust and Reputation Based Seurity of MANET by Worm Hole Attack
    Parbin, Shabina
    Mahor, Leeladhar
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (06): : 41 - 54
  • [30] Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network
    Arulkumaran, G.
    Gnanamurthy, R. K.
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (02): : 386 - 393