Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach

被引:0
|
作者
Rana K.G. [1 ,2 ]
Yongquan C. [3 ]
Azeem M. [3 ]
Ditta A. [4 ]
Yu H. [5 ]
Khuhro S.A. [6 ]
机构
[1] College of Computer Science and Technology, Beijing University of Technology, Beijing
[2] Institute of Information Technology, Quaid-i-Azam University Islamabad, Islamabad
[3] College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing
[4] Division of Science and Technology, University of Education, College Road, Township, Lahore
[5] College of Computer Science, Beijing University of Technology, Beijing
[6] School of Computer Science and Technology, University of Science and Technology, Hefei
关键词
Ad hoc networks; AODV-BDR; Black hole attack; Gratuitous route reply; Neighbour list; Next hope node; NHN; PHN; Previous hop node; Validation packet;
D O I
10.1504/IJWMC.2018.090007
中图分类号
学科分类号
摘要
Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing. © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:16 / 24
页数:8
相关论文
共 50 条
  • [41] An energy-based self-formation approach for ad-hoc wireless networks
    Lu, Ning H.
    Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006, : 54 - 59
  • [42] Optimal cluster-based routing scheme using node mobility in ad hoc networks
    Im, Ji-Hyuk
    Wu, Hyuk
    Lee, Dong-Jun
    WIRELESS NETWORKS, 2011, 17 (04) : 921 - 935
  • [43] Optimal cluster-based routing scheme using node mobility in ad hoc networks
    Ji-Hyuk Im
    Hyuk Wu
    Dong-Jun Lee
    Wireless Networks, 2011, 17 : 921 - 935
  • [44] Network coding for MPR-based flooding in ad hoc wireless networks under mobility conditions
    Kadi, Nour
    Al Agha, Khaldoun
    ANNALS OF TELECOMMUNICATIONS, 2011, 66 (5-6) : 319 - 329
  • [45] An interference elimination method for decentralized slot synchronization in TDMA-based wireless ad hoc network
    Yang, Qi
    Shi, Jianghong
    2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 272 - 275
  • [46] A new network layer for mobile ad hoc wireless networks based on Assignment Router Identity Protocol
    Peng, Chaorong
    Chen, Chang Wen
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 786 - 791
  • [47] Network coding for MPR-based flooding in ad hoc wireless networks under mobility conditions
    Nour Kadi
    Khaldoun Al Agha
    annals of telecommunications - annales des télécommunications, 2011, 66 : 319 - 329
  • [48] Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA
    Joseph, John Felix Charles
    Lee, Bu-Sung
    Das, Amitabha
    Seet, Boon-Chong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) : 233 - 245
  • [49] Wireless Ad-Hoc Networks: Using Fuzzy Trust Approach to Improve Security between Nodes
    Hallani, H.
    Hellany, A.
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 359 - +
  • [50] PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES
    Azer, Marianne Amir
    El-Kassas, Sherif Mohammed
    El-Soudani, Mady Saiid
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 69 - +