CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network

by Mithilesh Izardar, Mohd. Rizwan Khan, Siddhartha Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 119 - Number 6
Year of Publication: 2015
Authors: Mithilesh Izardar, Mohd. Rizwan Khan, Siddhartha Mishra
10.5120/21069-3739

Mithilesh Izardar, Mohd. Rizwan Khan, Siddhartha Mishra . Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network. International Journal of Computer Applications. 119, 6 ( June 2015), 3-6. DOI=10.5120/21069-3739

@article{ 10.5120/21069-3739,
author = { Mithilesh Izardar, Mohd. Rizwan Khan, Siddhartha Mishra },
title = { Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 119 },
number = { 6 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 3-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume119/number6/21069-3739/ },
doi = { 10.5120/21069-3739 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:03:18.332343+05:30
%A Mithilesh Izardar
%A Mohd. Rizwan Khan
%A Siddhartha Mishra
%T Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 119
%N 6
%P 3-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A MANET (mobile ad hoc network) is a collection of independent nodes that communicate with each other by organizing a multi-hop radio network by sustaining connections that are decentralized. MANET has open medium, includes dynamically changing topology, absence of centralized monitoring points and less clear lines of defense, and because of this security in a MANET is a critical issue. Ad hoc on- demand distance vector (AODV) is a well-known routing algorithm. It is assailable to attacks like black hole and gray hole. In a black hole attack a malicious node act like ordinary node, but if a data packet passes through malicious node it consumes data packet and never forward it to neighboring nodes, whereas in a gray hole attack the malicious node will forward the data packet with selective data. In this paper we are presenting a defense mechanism for detection of cooperative black hole attack by multiple black hole nodes and the prevention of attack in multiple base stations. The simulation carried out on the proposed mechanism has produced results that elaborate the detection mechanism against the attack while maintaining a level of throughput in MANET.

References
  1. C. Perkins, E. Belding-Royer, and S. Das, "Ad-hoc on-demand distance vector (AODV) routing", Internet Draft, RFC 3561, July 2003.
  2. H. Deng, H. Li, and D. Agrawal, "Routing security in wireless ad hoc networks", IEEE Communications Magazine, Vol. 40, No. 10, Oct 2002.
  3. Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks, In Proceedings of the 8th International Conference on Mobile Computing and Networking (Mobicm 2002), pp. 12-23, ACM, Atlanta, GA, Sept 2002.
  4. P. Papadimitratos and Z. Haas, "Secure routing for mobile ad hoc networks", In SCS Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, Jan 2002.
  5. K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "A secure routing protocol for ad hoc networks", In International Conference on Network Protocols (ICNP), Paris, France, Nov 2002.
  6. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for mobile ad hoc networks", In International Conference on Network Protocols (ICNP), pp. 251-260, 2001.
  7. J. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks", In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2001.
  8. F. Stajano and R. Anderson, "The resurrecting duckling", Lecture Notes in Computer Science, Springer-Verlag, 1999.
  9. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", In Proceedings of MOBICOM 2000, pp. 255-265, 2000
  10. S. Buchegger and J. Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation Of Nodes- Fairness In Dynamic Ad hoc NeTworks", In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, Jun 2002.
  11. S. Buchegger and J. Boudec, "The effect of rumor spreading in reputation systems for mobile ad hoc networks", In WiOpt '03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Mar 2003.
  12. M. Jakobsson, J. Hubaux, and L. Buttyan, "A micro- payment scheme encouraging collaboration in multi- hop cellular networks", in Proceedings of Financial Crypto 2003.
  13. S. Bansal and M. Baker, "OCEAN: Observation- based cooperation enforcement in ad hoc networks", Technical Report, Stanford University, 2003.
  14. J. Sen, M. Girish Chandra, P. Balamuralidhar, S. G. Harihara, and H. Reddy, "A distributed protocol for detection of packet dropping attack in mobile ad hoc networks", in Proceedings of IEEE International Conference on Telecommunications (ICT'07), May 2007, Penang, Malaysia.
  15. S. Ki, P. Naldurg and R. Kravets, "Security aware ad hoc routing for wireless networks", in Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing, Poster Session, pp 299- 302, Long Beach, California, October 2001.
  16. J. Yoon, M. Liu, and B. Noble, "Random waypoint considered harmful", in Proceedings of IEEE INFOCOM, pp. 1312 – 1321, 20
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc network (MANET) Black Hole malicious node Gray Hole Routing AODV.