Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 119 - Number 6
Year of Publication: 2015
Authors:
Mithilesh Izardar
Mohd. Rizwan Khan
Siddhartha Mishra
10.5120/21069-3739

Mithilesh Izardar, Mohd. Rizwan Khan and Siddhartha Mishra. Article: Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network. International Journal of Computer Applications 119(6):3-6, June 2015. Full text available. BibTeX

@article{key:article,
	author = {Mithilesh Izardar and Mohd. Rizwan Khan and Siddhartha Mishra},
	title = {Article: Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {119},
	number = {6},
	pages = {3-6},
	month = {June},
	note = {Full text available}
}

Abstract

A MANET (mobile ad hoc network) is a collection of independent nodes that communicate with each other by organizing a multi-hop radio network by sustaining connections that are decentralized. MANET has open medium, includes dynamically changing topology, absence of centralized monitoring points and less clear lines of defense, and because of this security in a MANET is a critical issue. Ad hoc on- demand distance vector (AODV) is a well-known routing algorithm. It is assailable to attacks like black hole and gray hole. In a black hole attack a malicious node act like ordinary node, but if a data packet passes through malicious node it consumes data packet and never forward it to neighboring nodes, whereas in a gray hole attack the malicious node will forward the data packet with selective data. In this paper we are presenting a defense mechanism for detection of cooperative black hole attack by multiple black hole nodes and the prevention of attack in multiple base stations. The simulation carried out on the proposed mechanism has produced results that elaborate the detection mechanism against the attack while maintaining a level of throughput in MANET.

References

  • C. Perkins, E. Belding-Royer, and S. Das, "Ad-hoc on-demand distance vector (AODV) routing", Internet Draft, RFC 3561, July 2003.
  • H. Deng, H. Li, and D. Agrawal, "Routing security in wireless ad hoc networks", IEEE Communications Magazine, Vol. 40, No. 10, Oct 2002.
  • Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks, In Proceedings of the 8th International Conference on Mobile Computing and Networking (Mobicm 2002), pp. 12-23, ACM, Atlanta, GA, Sept 2002.
  • P. Papadimitratos and Z. Haas, "Secure routing for mobile ad hoc networks", In SCS Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, Jan 2002.
  • K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "A secure routing protocol for ad hoc networks", In International Conference on Network Protocols (ICNP), Paris, France, Nov 2002.
  • J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for mobile ad hoc networks", In International Conference on Network Protocols (ICNP), pp. 251-260, 2001.
  • J. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks", In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2001.
  • F. Stajano and R. Anderson, "The resurrecting duckling", Lecture Notes in Computer Science, Springer-Verlag, 1999.
  • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", In Proceedings of MOBICOM 2000, pp. 255-265, 2000
  • S. Buchegger and J. Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation Of Nodes- Fairness In Dynamic Ad hoc NeTworks", In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, Jun 2002.
  • S. Buchegger and J. Boudec, "The effect of rumor spreading in reputation systems for mobile ad hoc networks", In WiOpt '03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Mar 2003.
  • M. Jakobsson, J. Hubaux, and L. Buttyan, "A micro- payment scheme encouraging collaboration in multi- hop cellular networks", in Proceedings of Financial Crypto 2003.
  • S. Bansal and M. Baker, "OCEAN: Observation- based cooperation enforcement in ad hoc networks", Technical Report, Stanford University, 2003.
  • J. Sen, M. Girish Chandra, P. Balamuralidhar, S. G. Harihara, and H. Reddy, "A distributed protocol for detection of packet dropping attack in mobile ad hoc networks", in Proceedings of IEEE International Conference on Telecommunications (ICT'07), May 2007, Penang, Malaysia.
  • S. Ki, P. Naldurg and R. Kravets, "Security aware ad hoc routing for wireless networks", in Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing, Poster Session, pp 299- 302, Long Beach, California, October 2001.
  • J. Yoon, M. Liu, and B. Noble, "Random waypoint considered harmful", in Proceedings of IEEE INFOCOM, pp. 1312 – 1321, 20