CFP last date
22 April 2024
Reseach Article

Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining

by E. A .Mary Anita, V. Vasudevan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 12
Year of Publication: 2010
Authors: E. A .Mary Anita, V. Vasudevan
10.5120/267-426

E. A .Mary Anita, V. Vasudevan . Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining. International Journal of Computer Applications. 1, 12 ( February 2010), 21-28. DOI=10.5120/267-426

@article{ 10.5120/267-426,
author = { E. A .Mary Anita, V. Vasudevan },
title = { Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 12 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 21-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number12/267-426/ },
doi = { 10.5120/267-426 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:46:33.876734+05:30
%A E. A .Mary Anita
%A V. Vasudevan
%T Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 12
%P 21-28
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in wireless ad-hoc networks is a complex issue. The wireless and dynamic nature of ad-hoc networks makes them more vulnerable to security attacks when compared with fixed networks. The existing routing protocols are optimized to perform the routing process without considering the security problem.. Black hole attack is one of the routing attacks in which, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this paper we propose a certificate based authentication mechanism to counter the effect of black hole attack. Nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme is implemented in two phases: certification phase and authentication phase following the route establishment process of On Demand Multicast Routing Protocol (ODMRP). The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2.

References
  1. D. Djenouri, L. Khelladi and N. Badache, A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, IEEE Communication Surveys & Tutorials, Vol. 7, No. 4, 4th Quarter 2005.
  2. L. Zhou and Z. J. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, Vol. 13, No. 6, Nov./Dec. 1999, pp. 24-30.
  3. E. A. Mary Anita and V. Vasudevan, Black Hole attack on multicast routing protocols, JCIT, Vol.4, No.2, pp. 64-68, 2009.
  4. A. Vasiliou and A. A. Economides, Evaluation of Multicasting Algorithms in Manets, PWASET, vol. 5, April 2005, pp. 94-97.
  5. S.Lee, M.Gerla and C.Chain, "On Demand Multicast Routing protocol-(ODMRP)," Proc. of the IEEE Wireless Communication and Networking Conference (WCNC), September 1999.
  6. Al-Shurman, M. Yoo, S. Park, Black hole attack in Mobile Ad Hoc Networks, ACM Southeast Regional Conference, 2004, pp. 96-97.
  7. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000), Mitigating routing misbehavior in mobile ad-hoc networks, Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), ISBN 1-58113-197-6, pp. 255-265.
  8. S. Buchegger, C. Tissieres, and J. Y. Le Boudec. A test bed for misbehavior detection in mobile ad-hoc networks -how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on:citeseer.ist.psu.edu/645200.html.
  9. P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the 6th IFIP Communications and Multimedia Security Conference, pages 107-121, Portorosz, Slovenia, September 2002.
  10. A. Patcha and A. Mishra, Collaborative security architecture for black hole attack prevention in mobile ad hoc networks, Radio and Wireless Conference, 2003. RAWCON '03, Proceedings, pp. 75-78, 10-13 Aug. 2003.
  11. S. Bansal and M. Baker. Observation-based cooperation enforcement in ad hoc networks, July 2003. Available on: http://arxiv.org/pdf/cs.NI/0307012.
  12. C. Srdjan, B. Levente, and H. Jean-Pierre, Self- Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, vol. 2, pp. 52-64, 2003.
  13. C. Siva Ram Murthy and B. S. Manoj, Ad hoc Wireless Networks- Architectures and Protocols, Pearson Education, 2007
  14. Ruidong Li, Jie Li, Hisao Kameda and Peng Liu, Localized Public Key Management for mobile ad hoc networks, IEEE Communications Society, 2004, 1284-1289
  15. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004), Security in mobile ad hoc networks: Challenges and solutions, IEEE Wireless Communications, 11(1), 38-47.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Black hole ODMRP Certificate Chain BHS-ODMRP