CFP last date
20 May 2024
Reseach Article

A Prevention Scheme against Blackhole Attack for Securing MANET

by Shaloopriya Jain, Ruchika Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 4
Year of Publication: 2017
Authors: Shaloopriya Jain, Ruchika Mishra
10.5120/ijca2017915377

Shaloopriya Jain, Ruchika Mishra . A Prevention Scheme against Blackhole Attack for Securing MANET. International Journal of Computer Applications. 174, 4 ( Sep 2017), 16-21. DOI=10.5120/ijca2017915377

@article{ 10.5120/ijca2017915377,
author = { Shaloopriya Jain, Ruchika Mishra },
title = { A Prevention Scheme against Blackhole Attack for Securing MANET },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 174 },
number = { 4 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number4/28394-2017915377/ },
doi = { 10.5120/ijca2017915377 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:15.020041+05:30
%A Shaloopriya Jain
%A Ruchika Mishra
%T A Prevention Scheme against Blackhole Attack for Securing MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 4
%P 16-21
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network (MANET) has emerged as a new frontier of technology to provide anywhere, anytime communication. Due to its deployment nature, MANETs are more vulnerable to The blackhole attack is packet dropping attack behaves like normal node at the time of connection establishment and after forward false reply of destination to sender drops all the data packets. In this attack one or more than one malicious nodes create a secure environment with the presence of other normal nodes. The proposed IDS (Intrusion Detection System) is identified the nodes those are not forwarded the data packets continuously abut node exist in network and provides the secure communication in dynamic network. The attacker is only the nodes which are not forwarded packets to destination and also attacker/s is being a part of communication with each and every sender. The proposed IDS are not detecting single blackhole but also able to handle multiple blackhole. The attacker nodes dropping are very harmful that dump actual performance of network. The routing protocol is not able to defend the network from malicious activities. The black hole attacker is network layer routing attack and the proposed scheme is surely removes the attacker infection from the dynamic network and improves network performance.

References
  1. C.Siva Ram Murthy and B S Manoj, "Mobile Ad Hoc Networks-Architecture and Protocols", Pearson Education, ISBN 81-317-0688-5, 2004.
  2. Yongguang Zhang and Wenke Lee, "Security in Mobile Ad-Hoc Networks, in Book Ad Hoc Networks Technologies and Protocols", Springer, 2005.
  3. M. A. Shurman, S. M. Yoo, and S. Park, "Black hole attack in Wireless Ad Hoc Networks", in ACM 42nd Southeast Conference (ACMSE’04), pp. 96-97, April. 2004.
  4. Monis Akhlaq, M. Noman Jafri, Muzammil A. Khan and Barber Aslam,"Addressing Security Concerns of Data Exchange in AODV Protocol", World Academy of Science, Engineering and Technology 16, pp. 29-33, 2006.
  5. Mohd Anuar Jaafar and Zuriati Ahmad Zukarnain, “Performance Comparisons of AODV, Secure AODV and Adaptive Secure AODV Routing Protocols in Free Attack Simulation Environment”, European Journal of Scientific Research, pp. 430-443, 2009.
  6. Pradip M. Jawandhiya, Mangesh M. Ghonge, Dr. M.S.Ali, Prof. J.S. Deshpande, "A Survey of Mobile Ad Hoc Network Attacks", International Journal of Engineering Science and Technology, Vol. 2(9), pp. 4063-4071, 2010.
  7. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", Wireless/Mobile Network Security, Y. Xiao, X. Shen, and D.-Z. Du (Eds.) pp. 1-38, @ 2006 Springer.
  8. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-demand Secure Routing Protocol Resilient to Byzantine Failures", Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, 2002.
  9. Khin Sandar Win, "Analysis of Detecting Wormhole Attack in Wireless Networks", World Academy of Science, Engineering and Technology 48, pp. 422-428, 2008.
  10. Sathish, Arumugam, S.Neelavathy Pari, Harikrishnan V," Detection of Single and Collaborative Black Hole Attack in MANET", This full-text paper was peer-reviewed and accepted to be presented at the IEEE WiSPNET 2016 conference.
  11. V. Keerthika, N. Malarvizhi, "Migrating Blackhole Attack using Trust with AODV in MANET", IEEE, 2016
  12. Raquel Lacuesta, Jaime Lloret, Miguel Garcia and Lourdes Penalver, "A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation", IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 4, 629-641, April 2013.
  13. Raj PN, Swadas PB, "DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET', International Journal of Computer Science Issue, Vol. 2, pp 54-59, 2009.
  14. D. B. Johnson, D.A. Maltz, and J. Broch, DSR, "The dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks", Ad Hoc Networking, pp. 139-172, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Blackhole MANET Routing Security IDS Malicious nodes