CFP last date
22 April 2024
Reseach Article

A Secured Data Transmission Method using Enhanced Proactive Secret Sharing Scheme to Prevent Blackhole Attack in Manets- A Review

by Jasmeen Kaur, Tanupreet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 10
Year of Publication: 2015
Authors: Jasmeen Kaur, Tanupreet Singh
10.5120/21104-3827

Jasmeen Kaur, Tanupreet Singh . A Secured Data Transmission Method using Enhanced Proactive Secret Sharing Scheme to Prevent Blackhole Attack in Manets- A Review. International Journal of Computer Applications. 119, 10 ( June 2015), 20-28. DOI=10.5120/21104-3827

@article{ 10.5120/21104-3827,
author = { Jasmeen Kaur, Tanupreet Singh },
title = { A Secured Data Transmission Method using Enhanced Proactive Secret Sharing Scheme to Prevent Blackhole Attack in Manets- A Review },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 10 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number10/21104-3827/ },
doi = { 10.5120/21104-3827 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:41.840117+05:30
%A Jasmeen Kaur
%A Tanupreet Singh
%T A Secured Data Transmission Method using Enhanced Proactive Secret Sharing Scheme to Prevent Blackhole Attack in Manets- A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 10
%P 20-28
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad Hoc Networks are the collection of Self-organizing, Independent nodes that can interact with one another by creating radio network. In multi-hop wireless ad hoc networks, the nodes not in direct range rely/dependent upon intermediate nodes to interact. For securing its limited resources or to organize Denial of Service (DoS) attack, the middle node for instance the intermediary node drops all the packets going through it instead to forward them to its Descendant. This review paper can deal with the misbehavior called Blackhole Attack which is one of the Security Attacks and occurs in the Network Layer. Nodes interact with each other without any access point. It is a Dynamic network having the capabilities of real time network. Due to mobility of nodes network is easily affected by many types of attacks. In particular Blackhole attack the it can cause packet dropping and misrouting the information from source to destination. To reduce the impact of this attack, the new approach has been proposed i. e. New Enhanced Proactive Secret Sharing Scheme (NEPSSS) to detect the Blackhole nodes and to verify the Data Authenticity, Data Confidentiality and Data Integrity. This proposed algorithm divided into two phases. The first phase is the Detection of Blackhole Attack achieved using Trust Active and Recommendation of the Nodes. In the second phase the New Proactive Secret Sharing Scheme is used to provide the data authenticity and data integrity. The simulation results shows that the proposed algorithm achieves the better packet delivery ratio, misbehavior detection efficiency, fewer packet overhead and low end to end delay than the existing schemes.

References
  1. Mr. Golok Panda, Mr. Gouri Shankar Mishra & Mr. Ashok Kumar Sahoo, "Prevention of Black hole Attack in AODV protocols for Mobile Ad Hoc Network by Key Authentication. " IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol. 2, No. 3, June 2012
  2. Neelam Khemariya & Ajay Khuntetha, "An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs" International Journal of Computer Applications (0975 – 8887) Volume 66– No. 18, March 2013
  3. Firoz Ahmed, Seok Hoon Yoon and Hoon Oh, "An Efficient Black Hole Detection Method using an Encrypted Verification Message in Mobile Ad Hoc Networks" International Journal of Security and Its Applications Vol. 6, No. 2, April, 2012.
  4. Nirali Modi & Vinit Kumar Gupta, "Prevention Of Black hole Attack using AODV Routing Protocol in MANET" (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 3254 – 3258.
  5. Nabarun Chatterjee, Jyotsna Kumar Mandal, "Detection of Blackhole Behaviour using Triangular Encryption in NS2" 1st International Conference on Computational Intelligence: Modeling Techniques and Applications(CIMTA- 2013) Procedia Technology 10 ( 2013 ) 524 – 529, Available online at Sciencedirect. com.
  6. Amol Bhosle, Yogadhar Pandey, "Review of authentication and digital signature methods in Mobile ad hoc network" ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 3, March 2013.
  7. Rashmi, Ameeta Seehra, "A Novel Approach for Preventing Black-Hole Attack in MANETs"" International Journal of Ambient Systems and Applications (IJASA) Vol. 2, No. 3, September 2014.
  8. Abderrahmane Baadache ?, Ali Belmehdi, "Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks", available online 20 August 2014 available at ScienceDirect.
  9. T. Prasanna Venkatesan, P. Rajakumar, A. Pitchaikkannu, "An Effective Intrusion Detection System for MANETs" International Journal of Computer Applications® (IJCA) (0975 – 8887) International Conference on Advances in Computer Engineering & Applications (ICACEA-2014) at IMSEC,GZB.
  10. Payal N. Raj and Prashant B. Swadas, "DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET" IJCSI International Journal of Computer Science Issues, Vol. 2, 2009.
  11. Djamel Djenouri, Nadjib Badache, "Struggling Against Selfishness and Black Hole Attacks in MANETs", wireless communication Mobile computing. (WCMC) 8 (6) (2008)689-704.
  12. Djamel Djenouri , Nadjib Badache, "On eliminating packet droppers in MANET: A modular solution" Ad Hoc Networks 7 (2009) 1243–1258, Available online at www. sciencedirect. com.
  13. Satyendra Tiwari, Anurag Jain and Gajendra Singh Chowhan, "Migrating Packet Dropping in Adhoc Network Based on Modified ACKbased Scheme Using FSA" International Journal on Emerging Technologies 2(2): 102-105(2011).
  14. K. Selvavinayaki ,Dr. E. Karthikeyan , "A secured data transmission method using enhanced proactive secret sharing scheme to prevent black hole attacks in manets" Journal of Theoretical and Applied Information Technology 30th September 2014. Vol. 67 No. 3;
  15. IRSHAD ULLAH & SHOAIB UR REHMAN, "Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols", Master Thesis, Electrical Engineering, and Thesis no: MEE 10:62 June, 2010
  16. C. Wei, L. Xiang, B. yuebin and G. Xiaopeng, "A New Solution for Resisting Gray Hole Attack in Mobile Ad-Hoc Networks," Second International Conference on Communications and Networking in china, pp. 366-370, Aug, 2007.
  17. Wenjia Li and Anupam Joshi, "Security Issues in Mobile Ad Hoc Network- A Survey", Department of Computer Science and Electrical Engineering , University of Maryland, Baltimore County Available: http://www. csee. umbc. edu/~wenjia1/699_report. pdf
  18. Aarti, "Study of MANET: Characteristics, Challenges, Application and Security Attacks", International Journal of Advanced Research in Computer Science and Software Engineering,volume-3, Issue 5, May 2013, pp. 252-257.
  19. MANET (Mobile ad hoc network)- Characteristics and Features. http://www. eexploria. com/manet-mobile-ad-hoc-network-characteristics-and-features/
  20. http://www. slideshare. net/sunitasahu101/attacks-in manet#btnNext Last Visited- 22, May, 2014
  21. C. Perkins, E. B. Royer, S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing, RFC: 3561 (Experimental), IETF, July, 2003.
  22. Vidyapathi, Sundar, Harshita, Komal, "Securing MANET From BlackHole And WormHole Attacks", International Journal of Engineering and Technology" Vol. 5, No 3, Jun-Jul, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Blackhole Attack AOMDV Proactive Secret Sharing Scheme Public Key Private Key