Interception of Black- Hole Attacks in Mobile AD-HOC Networks

被引:0
|
作者
Balachandra [1 ]
Shetty, Nisha P. [1 ]
机构
[1] Manipal Univ, Manipal Inst Technol, Dept Informat & Commun Technol, Manipal, Karnataka, India
关键词
SAODV; Watch dog; wireless networks; Random way Point model; Denial of service attack; ROUTING PROTOCOLS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Mobile Ad-hoc network (MANET), is one of the ideal means for communication using mobile devices, as the devices here can configure themselves without a strict interference by the network administrators. Providing apt security for such networks is a challenging task and this area has proved itself as a vital field for researchers. MANET s are more susceptible to network attacks because of their dynamic network topology, absence of centralized monitoring, unavailability of sufficient resources to support their changing environment and restricted power supply. In this paper, we scrutinize one among the denial of service attacks known as the black hole attack. In this attack, a malicious node broadcasts a false route via itself as the most compact and valid path to the destination [ 1]. Using this fabricated route the malignant node schemes to intercept and consume all data packets intended for the destination node. An approach employing SAODV (secure ad-hoc on demand distance vector) routing algorithm is advocated in this paper to reveal and intercept black hole attacks in mobile networks. Here we use watchdog mechanism as an add-on in SAODV routing algorithm for detection and prevention of the black hole nodes in the MANET. The proposed methodology enhances the packet delivery ratio and performance in the presence of multiple black hole nodes in Mobile ad hoc networks.
引用
收藏
页码:5 / 9
页数:5
相关论文
共 50 条
  • [1] Performance analysis of ad-hoc networks under black hole attacks
    Dokurer, Semih
    Erten, Y. M.
    Acar, Can Erkin
    [J]. PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 148 - 153
  • [2] A survey of black hole attacks in wireless mobile ad hoc networks
    Tseng, Fan-Hsun
    Chou, Li-Der
    Chao, Han-Chieh
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2011, 1 : 1 - 16
  • [3] An Approach to detect Gray-hole Attacks on Mobile ad-hoc Networks
    Sachan, Kusumlata
    Lokhande, Manisha
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [4] An Approach to Prevent Gray-hole Attacks on Mobile ad-hoc Networks
    Sachan, Kusumlata
    Lokhande, Manisha
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [5] Effects of Malicious Attacks in Mobile Ad-hoc Networks
    Kanthe, Ashok M.
    Simunic, Dina
    Prasad, Ramjee
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 1 - 5
  • [6] Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks
    Dhama, Siddharth
    Sharma, Sandeep
    Saini, Mukul
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2993 - 2996
  • [7] Black Hole Attack's Effect Mobile Ad-hoc Networks (MANET)
    Sardana, Anjali
    Saini, Akanksha
    Bedwal, Tushina
    Tayal, Radhika
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 966 - 970
  • [8] Grouped Black hole Attacks Security Model (GBHASM) for Wireless Ad-Hoc Networks
    Bajwa, Shahid Shehzad
    Khan, Muhammad Khalid
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 756 - 760
  • [9] Invincible AODV to detect black hole and gray hole attacks in mobile ad hoc networks
    Venu, Vasantha Sandhya
    Avula, Damodaram
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (06)
  • [10] Securing Energy Routing Protocol Against Black Hole Attacks in Mobile Ad-Hoc Network
    Rajendra Prasad P.
    Shankar S.
    [J]. Recent Advances in Computer Science and Communications, 2021, 14 (09) : 2843 - 2853