Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach

被引:0
|
作者
Rana K.G. [1 ,2 ]
Yongquan C. [3 ]
Azeem M. [3 ]
Ditta A. [4 ]
Yu H. [5 ]
Khuhro S.A. [6 ]
机构
[1] College of Computer Science and Technology, Beijing University of Technology, Beijing
[2] Institute of Information Technology, Quaid-i-Azam University Islamabad, Islamabad
[3] College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing
[4] Division of Science and Technology, University of Education, College Road, Township, Lahore
[5] College of Computer Science, Beijing University of Technology, Beijing
[6] School of Computer Science and Technology, University of Science and Technology, Hefei
关键词
Ad hoc networks; AODV-BDR; Black hole attack; Gratuitous route reply; Neighbour list; Next hope node; NHN; PHN; Previous hop node; Validation packet;
D O I
10.1504/IJWMC.2018.090007
中图分类号
学科分类号
摘要
Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing. © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:16 / 24
页数:8
相关论文
共 50 条
  • [11] Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks
    Lee, WJ
    Sriborrirux, W
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 925 - 934
  • [12] Detection of Black hole Attack in Mobile Ad hoc Network using Adaptive Approach
    Baghel, Lokesh
    Mishra, Prakash
    Samvatsar, Makrand
    Singh, Upendra
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 626 - 630
  • [13] A node quality based clustering algorithm in wireless mobile Ad Hoc networks
    Aissa, Mohamed
    Belghith, Abdelfettah
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 174 - 181
  • [14] Selfish node detection in ad hoc networks based on fuzzy logic
    Homa Hasani
    Shahram Babaie
    Neural Computing and Applications, 2019, 31 : 6079 - 6090
  • [15] Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks
    Qureshi, Kashif Naseer
    Nafea, Hanaa
    Tariq Javed, Ibrahim
    Zrar Ghafoor, Kayhan
    IEEE ACCESS, 2024, 12 : 95390 - 95401
  • [16] Selfish node detection in ad hoc networks based on fuzzy logic
    Hasani, Homa
    Babaie, Shahram
    NEURAL COMPUTING & APPLICATIONS, 2019, 31 (10) : 6079 - 6090
  • [17] Achievable Communication Rates in Ad hoc Wireless Networks Using Local Node Cooperation
    Nagaraj, Sumeeth
    Truhachev, Dmitri
    Schlegel, Christian
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 4052 - 4058
  • [18] Secure and Efficient Approach to Prevent Ad hoc Network Attacks using Intrusion Detection System
    Vegda, Hiral
    Modi, Nimesh
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 129 - 133
  • [19] An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network
    Kumar, Vimal
    Kumar, Rakesh
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 472 - 479
  • [20] TimSim: A Timestep-based Wireless Ad-hoc Network Simulator
    Yan, Chong
    Jia, Zhiping
    Ju, Lei
    Xia, Hui
    Xu, Huaqiang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1741 - 1753