scispace - formally typeset
Journal ArticleDOI

Prevention of Co-operative Black Hole Attack in MANET

Latha Tamilselvan, +1 more
- 05 Jan 2008 - 
- Vol. 3, Iss: 5, pp 13-20
TLDR
Computer simulation using GLOMOSIM shows that the proposed protocol provides better security and also better performance in terms of packet delivery than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.
Abstract
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc On demand Distance Vector) protocol. The security of the AODV protocol is compromised by a particular type of attack called ‘Black Hole’ attack In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. Our approach to combat the Black hole attack is to make use of a ‘Fidelity Table’ wherein every participating node will be assigned a fidelity level that acts as a measure of reliability of that node. In case the level of any node drops to 0, it is considered to be a malicious node, termed as a ‘Black hole’ and is eliminated. Computer simulation using GLOMOSIM shows that our protocol provides better security and also better performance in terms of packet delivery than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.

read more

Citations
More filters
Journal ArticleDOI

Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems

TL;DR: This study employs ns2 to validate the effect of the proposed IDS deployment, as IDS nodes can rapidly block a malicious node, without false positives, if a proper threshold is set.
Journal ArticleDOI

Modified DSR protocol for detection and removal of selective black hole attack in MANET

TL;DR: A Modified Dynamic Source Routing Protocol (MDSR) to detect and prevent selective black hole attack and an Intrusion Detection System (IDS) where the IDS nodes are set in promiscuous mode only when required, to detect the abnormal difference in the number of data packets being forwarded by a node.
Posted Content

Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks

TL;DR: A secure mechanism, which consists in checking the good forwarding of packets by an intermediate node, was proposed, which avoids the black hole and the cooperative black hole attacks.
Journal ArticleDOI

BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map

TL;DR: A secure MANET routing protocol called BP-AODV is proposed to overcome the security breaches related to the SAODV protocol along with the original A ODV protocol and can effectively fight the blackhole attack achieved by a malicious node or cooperative malicious nodes during the routing process.
Proceedings ArticleDOI

Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET

TL;DR: The simulation results show that the proposed solution for detecting and avoiding black hole attacks and ensuring secure packet transmission along with efficient resource utilization of mobile hosts at the same time provides good performance in terms of throughput, secure routing, and efficient resource usage.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Proceedings ArticleDOI

Ariadne: a secure on-demand routing protocol for ad hoc networks

TL;DR: a secure on-demand routing protocol for ad hoc networks that can be used to connect ad-hoc networks to each other without disrupting existing networks.
Book ChapterDOI

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks

TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Related Papers (5)