Secure co-operative neighbour-based approach for detection and prevention of black hole attack in wireless mobile ad-hoc networks

被引:0
|
作者
Bhardwaj S. [1 ]
Kumar V. [1 ]
机构
[1] Department of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar, Uttarakhand
关键词
AODV; Black hole attack; Cooperative neighbour-based detection mechanism; MANET;
D O I
10.1504/IJWMC.2020.109268
中图分类号
学科分类号
摘要
Mobile ad-hoc networks are infrastructure-less, temporary networks which are exposed to routing attacks. Black hole attack is a routing attack formed by dropping all the received packets by a malicious node. To ensure the security and strength of MANETs a secure and effective mechanism is obligatory. This paper presents Secure Cooperative Neighbour-Based Approach in AODV to perceive and circumvent the black hole attack from the start of the network. This approach enables every node to exchange information with its neighbour using a secure, efficient and quick detection process against routing attacks by taking an alternative route on finding an attacker. This approach is able to avoid the black hole nodes and improve the performance of the system as observed in the simulations under ns2. © 2020 Inderscience Enterprises Ltd.. All rights reserved.
引用
收藏
页码:62 / 72
页数:10
相关论文
共 50 条
  • [41] A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks
    Borkar, Gautam M.
    Mahajan, A. R.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 24 (01) : 23 - 57
  • [42] Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
    Schweitzer, Nadav
    Stulman, Ariel
    Margalit, Roy David
    Shabtai, Asaf
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (08) : 2174 - 2183
  • [43] Grouped Black hole Attacks Security Model (GBHASM) for Wireless Ad-Hoc Networks
    Bajwa, Shahid Shehzad
    Khan, Muhammad Khalid
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 756 - 760
  • [44] Reputation based selfishness prevention techniques for mobile ad-hoc networks
    Rodriguez-Mayol, Alberto
    Gozalvez, Javier
    TELECOMMUNICATION SYSTEMS, 2014, 57 (02) : 181 - 195
  • [45] Reputation based selfishness prevention techniques for mobile ad-hoc networks
    Alberto Rodriguez-Mayol
    Javier Gozalvez
    Telecommunication Systems, 2014, 57 : 181 - 195
  • [46] Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks
    Jhaveri, Rutvij H.
    Patel, Narendra M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (07)
  • [47] An Efficient Black Hole Detection Method using an Encrypted Verification Message in Mobile Ad Hoc Networks
    Ahmed, Firoz
    Yoon, Seok Hoon
    Oh, Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 179 - 184
  • [48] Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
    Su, Ming-Yang
    COMPUTER COMMUNICATIONS, 2011, 34 (01) : 107 - 117
  • [49] Securing Data from Black Hole Attack Using AODV Routing for Mobile Ad Hoc Networks
    Kamatchi, V.
    Mukesh, Rajeswari
    Rajakumar
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 365 - 373
  • [50] Analytical Termination of Malicious Nodes (ATOM): An Intrusion Detection System for Detecting Black Hole attack in Mobile Ad Hoc Networks
    S. Sivanesh
    V. R. Sarma Dhulipala
    Wireless Personal Communications, 2022, 124 : 1511 - 1524