Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach

被引:0
|
作者
Rana K.G. [1 ,2 ]
Yongquan C. [3 ]
Azeem M. [3 ]
Ditta A. [4 ]
Yu H. [5 ]
Khuhro S.A. [6 ]
机构
[1] College of Computer Science and Technology, Beijing University of Technology, Beijing
[2] Institute of Information Technology, Quaid-i-Azam University Islamabad, Islamabad
[3] College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing
[4] Division of Science and Technology, University of Education, College Road, Township, Lahore
[5] College of Computer Science, Beijing University of Technology, Beijing
[6] School of Computer Science and Technology, University of Science and Technology, Hefei
关键词
Ad hoc networks; AODV-BDR; Black hole attack; Gratuitous route reply; Neighbour list; Next hope node; NHN; PHN; Previous hop node; Validation packet;
D O I
10.1504/IJWMC.2018.090007
中图分类号
学科分类号
摘要
Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing. © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:16 / 24
页数:8
相关论文
共 50 条
  • [21] Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution
    Hamieh, Ali
    Ben-Othman, Jalel
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 4831 - 4836
  • [22] Detection of selfish behavior in wireless ad hoc networks based on CUSUM algorithm
    Liu C.
    Shu Y.
    Yang O.
    Li M.
    Transactions of Tianjin University, 2010, 16 (02) : 104 - 108
  • [23] AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks
    Zhang, Yu
    Lazos, Loukas
    Kozma, William Jr.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (08) : 1893 - 1907
  • [24] An Intrusion Detection System in Ad Hoc Networks: A Social Network Analysis Approach
    Wang, Wei
    Man, Hong
    Liu, Yu
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 825 - 829
  • [25] Detection of Selfish Behavior in Wireless Ad Hoc Networks Based on CUSUM Algorithm
    刘春凤
    舒炎泰
    YANG Oliver
    李明远
    Transactions of Tianjin University , 2010, (02) : 104 - 108
  • [26] Location Based Transmission Using a Neighbour Aware-Cross Layer MAC for Ad Hoc Networks
    Marchang, Jims
    Ghita, Bogdan
    Lancaster, David
    WIRED/WIRELESS INTERNET COMMUNICATIONS, WWIC 2016, 2016, 9674 : 15 - 27
  • [27] A Cross-Layer based Hidden Marko(C-HMM) Model for Detection and Prevention of Malicious Attacks in Wireless Ad-hoc Networks
    Jagadeesan, S.
    Manjula, R.
    Johnpeter, T.
    2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [28] Node Application and Time Based Fairness in Ad-Hoc Networks: An Integrated Approach
    Mishra, Tapas Kumar
    Tripathi, Sachin
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 231 - 238
  • [29] Auto rate MAC protocol based on congestion detection for wireless Ad Hoc networks
    Wu, Wei
    Zhang, Zhongzhao
    Sha, Xuejun
    He, Chenguang
    Information Technology Journal, 2009, 8 (08) : 1205 - 1212
  • [30] A flocking-based approach to maintain connectivity in mobile wireless ad hoc networks
    Konak, Abdullah
    Buchert, George E.
    Juro, James
    APPLIED SOFT COMPUTING, 2013, 13 (02) : 1284 - 1291