CFP last date
20 May 2024
Reseach Article

SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET

by Jitendra Kumar Rout, Sourav Kumar Bhoi, Sanjaya Kumar Panda
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 4
Year of Publication: 2013
Authors: Jitendra Kumar Rout, Sourav Kumar Bhoi, Sanjaya Kumar Panda
10.5120/10623-5343

Jitendra Kumar Rout, Sourav Kumar Bhoi, Sanjaya Kumar Panda . SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET. International Journal of Computer Applications. 64, 4 ( February 2013), 27-32. DOI=10.5120/10623-5343

@article{ 10.5120/10623-5343,
author = { Jitendra Kumar Rout, Sourav Kumar Bhoi, Sanjaya Kumar Panda },
title = { SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 4 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number4/10623-5343/ },
doi = { 10.5120/10623-5343 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:31.803926+05:30
%A Jitendra Kumar Rout
%A Sourav Kumar Bhoi
%A Sanjaya Kumar Panda
%T SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 4
%P 27-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.

References
  1. Andel, T. R. , and Yasinsac, A. 2007. Surveying Security Analysis Techniques in MANET Routing Protocols. IEEE Communications Surveys and Tutorials 9, 4 70-84.
  2. Abusalah, L. , Khokhar, A. , and Guizani, M. 2008. A Survey of Secure Mobile Ad Hoc Routing Protocols. IEEE Communications Surveys and Tutorials 10, 4 78-93.
  3. Bala, A. , Bansal, M. , and Singh, J. 2009. Performance Analysis of MANET under Blackhole Attack. First International Conference on Networks and Communications 141-145.
  4. Balakrishnan, V. , Varadharajan, V. , and Tupakula, U. K. 2006. Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. 10th IEEE / IFIP Network Operations and Management Symposium (Apr. 2006).
  5. Bhalaji, N. , and Shanmugam, A. 2009. Association Between Nodes to Combat Blackhole Attack in DSR based MANET. IFIP International Conference on Wireless and Optical Communications Networks (Apr. 2009).
  6. Burmester, M. , and Medeiros, B. D. 2009. On the Security of Route Discovery in MANETs. IEEE Transaction on Mobile Computing 8, 9 (Sep. 2009), 1180-1188.
  7. Ford, R. , and Howard, M. 2008. Security in Mobile Ad Hoc Networks. IEEE Security and Privacy 72- 75.
  8. Kannhavong, B. , Nakayama, H. , Nemoto, Y. , and Kato, N. 2007. A Survey of Routing Attacks in Mobile Ad Hoc Networks. IEEE Wireless Communications (Oct. 2007) 85-91.
  9. Lima, M. N. , Santos, A. L. , and Pujolle, G. 2009. A Survey of Survivability in Mobile Ad Hoc Networks. IEEE Communications Surveys and Tutorials 11, 1 66-77.
  10. Lima, M. N. , Silva, H. W. , Santos, A. L. , and Pujolle, G. 2008. Requirements for survivable routing in MANETs. 3rd International Symposium on Wireless Pervasive Computing (May. 2008), 441-445.
  11. Medadian, M. , Yektaie, M. H. and Rahmani, A. M. 2009. Combat with Black Hole Attack in AODV routing protocol in MANET. First Asian Himalayas International Conference on Internet (Nov. 2009).
  12. Papadimitratos, P. , and Haas, Z. J. 2006. Secure Data Communication in Mobile Ad Hoc Networks. IEEE Journalon Selected Area in Communications 24, 2 (Feb. 2006), 343-356.
  13. Purohit, N. , Sinha, R. , and Maurya, K. 2011. Simulation study of Black hole and Jellyfish attack on MANET using NS3. IEEE International Conference on Current Trends in Technology (Dec. 2011), 1-5.
  14. Sharma, N. , and Sharma, A. 2012. The Black-hole node attack in MANET. Second International Conference on Advanced Computing and Communication Technologies 546-550.
  15. Tamilselvan, L. , and Sankaranarayanan V. 2007. Prevention of Blackhole Attack in MANET. The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications IEEE.
  16. Tsou, P. , Chang, J. , Lin, Y. , Chao, H. , and Chen, J. 2011. Developing a BDSR Scheme to Avoid Black Hole Attack Based on Proactive and Reactive Architecture in MANETs. ICACT (Feb. 2011), 755-760, ISBN= 978-89-5519-155-4.
  17. Zhang, X. Y. , Sekiya, Y. , and Wakahara, Y. 2009. Proposal of a Method to Detect Black Hole Attack in MANET. International Symposium on Autonomous Decentralized Systems (Mar. 2009).
Index Terms

Computer Science
Information Sciences

Keywords

SFTP Node Connection Algorithm Route Discovery Algorithm Blackhole DSR