Secure co-operative neighbour-based approach for detection and prevention of black hole attack in wireless mobile ad-hoc networks

被引:0
|
作者
Bhardwaj S. [1 ]
Kumar V. [1 ]
机构
[1] Department of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar, Uttarakhand
关键词
AODV; Black hole attack; Cooperative neighbour-based detection mechanism; MANET;
D O I
10.1504/IJWMC.2020.109268
中图分类号
学科分类号
摘要
Mobile ad-hoc networks are infrastructure-less, temporary networks which are exposed to routing attacks. Black hole attack is a routing attack formed by dropping all the received packets by a malicious node. To ensure the security and strength of MANETs a secure and effective mechanism is obligatory. This paper presents Secure Cooperative Neighbour-Based Approach in AODV to perceive and circumvent the black hole attack from the start of the network. This approach enables every node to exchange information with its neighbour using a secure, efficient and quick detection process against routing attacks by taking an alternative route on finding an attacker. This approach is able to avoid the black hole nodes and improve the performance of the system as observed in the simulations under ns2. © 2020 Inderscience Enterprises Ltd.. All rights reserved.
引用
收藏
页码:62 / 72
页数:10
相关论文
共 50 条
  • [31] Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks
    Thanuja, R.
    Umamakeswari, A.
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2018, 13 (05) : 2086 - 2098
  • [32] Black Hole Attack Prevention in Mobile Ad-hoc Network (MANET) Using Ant Colony Optimization Technique
    Khan, Dost Muhammad
    Aslam, Talal
    Akhtar, Nadeem
    Qadri, Salman
    Khan, Noman Ameer
    Rabbani, Imran Mujaddid
    Aslam, Muhammad
    INFORMATION TECHNOLOGY AND CONTROL, 2020, 49 (03): : 308 - 319
  • [33] Intrusion detection in mobile ad-hoc networks: A mobile agent approach
    Kaur, Upinder
    Patel, R. B.
    ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 77 - +
  • [34] An Improved Blackhole Attack Detection and Prevention Method for Wireless Ad-hoc Network
    Bendale, Gayatri
    Shrivastava, Sameeksha
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [35] A Review of Black-Hole Attack Mitigation Techniques and its Drawbacks in Mobile Ad-hoc Network
    Gurung, Shashi
    Chauhan, Siddhartha
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2379 - 2385
  • [36] A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks
    Mahmood, R. A. Raja
    Khan, A. I.
    2007 INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES, 2007, : 122 - 127
  • [37] Quality Control Chart for Detecting the Black Hole Attack in Vehicular Ad-hoc Networks
    Cherkaoui, Badreddine
    Beni-Hssane, Abderrahim
    Erritali, Mohammed
    8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 : 170 - 177
  • [38] A Survey over Black hole Attack Detection in Mobile Ad hoc Network
    Behzad, Shahram
    Jamali, Shahram
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (03): : 44 - 51
  • [39] Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure
    Anita, E. A. Mary
    Vasudevan, V.
    INFORMATION SECURITY JOURNAL, 2009, 18 (05): : 248 - 256
  • [40] Variable control chart for detecting black hole attack in vehicular ad-hoc networks
    Badreddine Cherkaoui
    Abderrahim Beni-hssane
    Mohammed Erritali
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 5129 - 5138