RTO-TV: Routed Tree Optimization and Trust-Value-Based Security Scheme to Prevent Black Hole Attack in MANET

被引:1
作者
Kumari, S. Vadhana [1 ]
Sibi, S. Anslam [2 ]
Selvan, Shano Maria [3 ]
Nadar, Kannan Pauliah [4 ]
机构
[1] Vimal Jyothi Coll Engn, Dept Comp Sci & Engn, Chemperi, Kerala, India
[2] St Josephs Inst Technol, Dept Informat Technol, Chennai, Tamil Nadu, India
[3] Univ Manchester, Adv Comp Sci Artificial Intelligence, Manchester, England
[4] Jigjiga Univ, Dept Elect & Comp Engn, Jijiga, Somali, Ethiopia
关键词
black hole attack; cluster; MANET; relay node; routed tree optimization; security; trust value; ROUTING PROTOCOL;
D O I
10.1155/2024/3363923
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security and privacy of personal data have become a significant concern because of the vulnerability of wireless channels and the theft of sensitive information. Several security measures have been implemented in recent years to address this problem. Nevertheless, most protocols currently employed are insufficiently secure for mobile ad hoc networks (MANETs). This study introduces a routed tree optimization and trust value (RTO-TV) technique to protect data transmission against black hole attacks in MANETs. This technique introduces a modified group optimization approach that enhances energy consumption by achieving efficient load-balanced clustering, and presents an approach called RTO for selecting relay nodes (cluster heads [CH]). Additionally, a security method based on TVs has been suggested as a means of safeguarding against black hole attacks. The proposed RTO-TV protocol was successfully implemented using an network simulator 2 (NS2) simulation tool. The comparative findings demonstrate that the proposed RTO-TV method outperforms existing techniques in terms of delay, packet delivery ratio (PDR), energy consumption, detection rate, and throughput in the presence of a black hole attack.
引用
收藏
页数:11
相关论文
共 32 条
[1]   A Survey of Secure Mobile Ad Hoc Routing Protocols [J].
Abusalah, Loay ;
Khokhar, Ashfaq ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04) :78-93
[2]   An Extensive Review on QoS Enhancement in MANET Using Meta-Heuristic Algorithms [J].
Ahirwar, Gajendra Kumar ;
Agarwal, Ratish ;
Pandey, Anjana .
WIRELESS PERSONAL COMMUNICATIONS, 2023, 131 (02) :1089-1114
[3]   An Access Control Framework in an Ad Hoc Network Infrastructure [J].
Araghi, Tanya Koohpayeh ;
Zamani, Mazdak ;
Manaf, A. A. ;
Araghi, Sagheb Kohpayeh .
ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY, 2015, 315
[4]   Performance Analysis in Reactive Routing Protocols in Wireless Mobile Ad Hoc Networks Using DSR, AODV and AOMDV [J].
Araghi, Tanya Koohpayeh ;
Zamani, Mazdak ;
Mnaf, Azizah B. T. Abdul .
2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, :81-84
[5]   Fuzzy enhanced secure multicast routing for improving authentication in MANET [J].
Brindha, V. ;
Karthikeyan, T. ;
Manimegalai, P. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4) :S9615-S9623
[6]   STACRP: a secure trusted auction oriented clustering based routing protocol for MANET [J].
Chatterjee, Pushpita ;
Sengupta, Indranil ;
Ghosh, S. K. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2012, 15 (03) :303-320
[7]   Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks [J].
Farooq, Muhammad Umar ;
Wang, Xingfu ;
Sajjad, Moizza ;
Qaisar, Sara .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (03) :1330-1347
[8]  
Hiremath P. S., 2014, International Journal of Advanced Networking and Applications, V6, P2352
[9]  
Hiremath P. S., 2016, 2016 INT C INF SCI I
[10]   A secure and efficient cluster based location aware routing protocol in MANET [J].
Jamaesha, S. Syed ;
Bhavani, S. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02) :S4179-S4186