Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach

被引:0
|
作者
Rana K.G. [1 ,2 ]
Yongquan C. [3 ]
Azeem M. [3 ]
Ditta A. [4 ]
Yu H. [5 ]
Khuhro S.A. [6 ]
机构
[1] College of Computer Science and Technology, Beijing University of Technology, Beijing
[2] Institute of Information Technology, Quaid-i-Azam University Islamabad, Islamabad
[3] College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing
[4] Division of Science and Technology, University of Education, College Road, Township, Lahore
[5] College of Computer Science, Beijing University of Technology, Beijing
[6] School of Computer Science and Technology, University of Science and Technology, Hefei
关键词
Ad hoc networks; AODV-BDR; Black hole attack; Gratuitous route reply; Neighbour list; Next hope node; NHN; PHN; Previous hop node; Validation packet;
D O I
10.1504/IJWMC.2018.090007
中图分类号
学科分类号
摘要
Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing. © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:16 / 24
页数:8
相关论文
共 50 条
  • [31] Increasing throughput of CDMA-based ad hoc network by multiuser detection
    Qian, XC
    Zheng, BY
    Cui, JW
    2005 Asia-Pacific Conference on Communications (APCC), Vols 1& 2, 2005, : 43 - 47
  • [32] Effect of NTT on Performance of AODV in a Grid Topology-Based Wireless Ad Hoc Network
    Sharma S.
    Singh A.
    Srivastava R.K.
    Journal of Computing Science and Engineering, 2022, 16 (03): : 143 - 152
  • [33] Detecting Denial of Service attacks using cross layer based intrusion detection system in wireless ad hoc networks
    Bose, S.
    Kannan, A.
    ICSCN 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING COMMUNICATIONS AND NETWORKING, 2008, : 182 - 188
  • [34] Organizing power efficient cluster-based network architectures for wireless ad hoc networks
    Tseng, Chih-Cheng
    Chen, Kwang-Cheng
    Liang, Yu-Jia
    Tuan, Zhi-Wei
    2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 114 - 118
  • [35] On power managed multiple access control in an IEEE 802.11 based ad hoc wireless network
    Lin, XH
    Kwok, YK
    Lau, VKN
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2004, 20 (03) : 491 - 515
  • [36] Secure communications for cluster-based ad hoc networks using node identities
    Lee, Jung-San
    Chang, Chin-Chen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (04) : 1377 - 1396
  • [37] Securing Multipath Routing protocol using Authentication approach for Wireless Sensor Network
    Gulhane, Gaurav
    Mahajan, Nikita V.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 729 - 733
  • [38] Integrating Wireless Cellular and Ad-Hoc Networks Using Fuzzy Logic Considering Node Mobility and Security
    Inaba, Takaaki
    Elmazi, Donald
    Liu, Yi
    Sakamoto, Shinji
    Barolli, Leonard
    Uchida, Kazunori
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 54 - 60
  • [39] Design and Evaluation of a Failure Detection Algorithm for Large Scale Ad Hoc Networks Using Cluster Based Approach
    Khilar, Pabitra Mohan
    Singh, Jitendra Kumar
    Mahapatra, Sudipta
    ICIT 2008: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 153 - +
  • [40] An Intrusion Detection Method for Ad hoc network Based on Class Association Rules Mining
    Ma, Chuan-xiang
    Fang, Ze-ming
    Chen, Rui
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 666 - 671