scispace - formally typeset
Journal ArticleDOI

Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks

T. Poongodi, +1 more
- 01 Sep 2016 - 
- Vol. 90, Iss: 2, pp 1039-1050
TLDR
A novel technique using Localized Secure Architecture for MANET (LSAM) routing protocol is proposed to detect and prevent co-operative black hole attack and it is shown that the proposed protocol is more secured and efficient.
Abstract
Black hole attack refers an attack by single or more number of malicious nodes which forcibly captures the route from source to destination by sending reply with largest sequence number and smallest hop count. In this paper, a novel technique using Localized Secure Architecture for MANET (LSAM) routing protocol is proposed to detect and prevent co-operative black hole attack. Security Monitoring Nodes (SMNs) would be activated only if the threshold value is exceeded. If malicious nodes are detected, other SMNs in its proximity area are intimated to isolate the malicious nodes. Network simulator tool is implemented to analyze the network performance of different scenarios with various number of nodes. Packet delivery ratio (PDR), routing overhead, control overhead, packet drop rate, throughput and end-to-end delay (EED) are the factors taken into consideration for performance analysis and it is shown that the proposed protocol is more secured and efficient. PDR is been increased by 27 % in the presence of 40 % misbehaving nodes, while it increases the percentage of overhead on proposed routing protocol from 1 to 4 %. EED is greatly reduced from 0.9 to 0.3 % in LSAM.

read more

Citations
More filters
Journal ArticleDOI

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks

TL;DR: This paper proposes a method for minimizing the gray-hole DoS attack, which assumes no explicit node collaboration, with each node using only internal knowledge gained by routine routing information, and results show a decrease in previously dropped packet effectiveness.
Journal ArticleDOI

Mitigation of Black Hole and Gray Hole Attack Using Swarm Inspired Algorithm With Artificial Neural Network

TL;DR: The protection against dual attacks has been presented for BHA and GHA by using the concept of Artificial Neural Network (ANN) as a deep learning algorithm along with the swarm-based Artificial Bee Colony (ABC) optimization technique.
Journal ArticleDOI

An Authentication Protocol for Future Sensor Networks.

TL;DR: Secure Mobile Sensor Network (SMSN) Authentication Protocol as discussed by the authors is a lightweight and efficient key exchange and authentication protocol suite, which reduces the communication and computational complexity of the authentication process in WSNs.
Journal ArticleDOI

Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET

TL;DR: Classification of denial of service attack is made and the key differences among black hole, sequence number based gray-hole and smartgray-hole attack are highlighted and it is found that the impact of the smart gray- hole attack is low as compared with the sequence numberbased gray-holes attack.
Journal ArticleDOI

A dynamic threshold based approach for mitigating black-hole attack in MANET

TL;DR: A protocol called as Mitigating Black Hole effects through Detection and Prevention (MBDP-AODV) based on a dynamic threshold value of the destination sequence number is proposed and simulation results show that proposed protocol performs better as compared with existing one under black hole attack.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Proceedings ArticleDOI

A secure routing protocol for ad hoc networks

TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Journal ArticleDOI

Routing security in wireless ad hoc networks

TL;DR: This article studies the routing security issues of MANETs, and analyzes in detail one type of attack-the "black hole" problem-that can easily be employed against the MANets, and proposes a solution for the black hole problem for ad hoc on-demand distance vector routing protocol.
Related Papers (5)