CFP last date
20 May 2024
Reseach Article

Enhanced DSR Protocol for Detection and Exclusion of Selective Black Hole Attack in MANET

by Sabarish D, Ranjani C
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 14
Year of Publication: 2015
Authors: Sabarish D, Ranjani C
10.5120/19737-1531

Sabarish D, Ranjani C . Enhanced DSR Protocol for Detection and Exclusion of Selective Black Hole Attack in MANET. International Journal of Computer Applications. 112, 14 ( February 2015), 32-35. DOI=10.5120/19737-1531

@article{ 10.5120/19737-1531,
author = { Sabarish D, Ranjani C },
title = { Enhanced DSR Protocol for Detection and Exclusion of Selective Black Hole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 14 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number14/19737-1531/ },
doi = { 10.5120/19737-1531 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:41.437932+05:30
%A Sabarish D
%A Ranjani C
%T Enhanced DSR Protocol for Detection and Exclusion of Selective Black Hole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 14
%P 32-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-hoc Network (MANET) is a collection of wireless nodes that can be dynamically set anywhere and anytime without using any pre-existing network infrastructure. MANET can operate without fixed infrastructure and can survive rapid changes in the network topology. The nodes in the network are free to move independently in any direction. The DSR protocol is modified to detect and isolate the selective black hole attack in MANETs. Secure Dynamic Source Routing Protocol (SDSR) is proposed to detect and prevent selective black hole attack. Selective black hole attack is a special kind of black hole attack where malicious nodes drop the data packets selectively. An Intrusion Detection System (IDS) is proposed where the IDS nodes are set in promiscuous mode only when required, to detect the abnormal difference in the number of data packets being forwarded by a node. When any anomaly is detected, the nearby IDS node broadcast the block message, informing all nodes on the network to cooperatively isolate the malicious node from the network. The SDSR is simulated using network simulator (NS2).

References
  1. Santhosh kumar and Suveg Moudgil, Detection of selfish node in DSR based MANET using reputation based mechanism, International journal of Research in IT, ISSN 2249-9482.
  2. Adnan Nadeem , Michael P. Howarth(2014)," An intrusion detection & adaptive response mechanism for MANETs", Ad Hoc Networks, vol 13, pp 368–380.
  3. Aikaterini Mitrokotsa , Christos Dimitrakakis(2013), "Intrusion detection in MANET using classification algorithms: The effects of cost and model selection" Ad Hoc Networks, pg no 11, vol 226–237.
  4. Lacey T H, Mills R. F, Mullins B. E, Raines R. A, Oxley M. E, Rogers S. K. (2014)," RIPsec e Using reputation-based multilayer security toprotect MANETs" compute rs & security , 31122 e136.
  5. Mafraa P. M, Fragaa J. S , Santin A. O(2014), "Algorithms for a distributed IDS in MANETs", Journal of Computer and System Sciences, pp 80, vol 554–570.
  6. Manickam, T. Guru Baskar , M. Girija, Dr. D. Manimegalai(2001), 'Performance comparison of routing protocols in mobile ad-hoc networks' International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 1.
  7. Ming-Yang Su(2011)," Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems", Computer Communications ,pp 34, vol 107–117.
  8. Mohanapriya. M, Ilango Krishnamurthi(2014)," Modified DSR protocol for detection and removal of selective black hole attack in MANET", Computers and Electrical Engineering, vol 40, pp530–538.
  9. Yih-Chun Hu, Adrian Perrig, David B. Johnson IEEE,Wormhole Attacks in Wireless Networks, vol 13(6), pp24–30.
  10. Sergio Pastrana a, Aikaterini Mitrokotsa , Agustin Orfila , Pedro Peris-Lopez (2012)," Evaluation of classification algorithms for intrusion detection in MANETs", Knowledge-Based Systems, vol 36, pp217–225.
  11. Abolhasan Mehran, Wysocki Tadeuz. A review of routing protocols for mobile ad hoc networks. Int J Ad hoc Networks 2004;2(1):1–22.
  12. Johnson DB, Maltz DA, Hu Y-C. The dynamic source routing protocol for mobile ad-hoc network (DSR). IETF Internet Draft 2004.
  13. Ming-Yang Su. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 2010.
  14. Anit kumar, Pardeep Mittal, A comparative study of AODV and DSR routing protocols in Mobile ad-hoc networks, ijarcsse, Volume 3, Issue 5, May 2013, ISSN: 2277 128X .
  15. Neha Shrivastava, Anand Motwani, Survey of malicious attacks in MANET, International Journal of Computer Applications (0975 – 8887), Volume 80 – No 14, October 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc network SDSR selective black hole attack IDS