EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks

被引:2
作者
Kancharakuntla, Deepika [1 ]
El-Ocla, Hosam [1 ]
机构
[1] Lakehead Univ, Dept Comp Sci, Thunder Bay, ON P7B 5E1, Canada
关键词
wireless; MANET; blackhole; attack; routing; round trip time; time to live; congestion; PERFORMANCE ANALYSIS; CONGESTION CONTROL; HOLE ATTACKS; MANETS; SCHEME; AODV; TCP;
D O I
10.3390/electronics11213480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The presence of malevolent nodes in mobile ad hoc networks (MANETs) would lead to genuine security concerns. These nodes may disturb the routing process or deform the pattern of the data packets passing through the network. The MANET is extremely liable to attacks, owing to its characteristics of the network framework, such as the absence of infrastructure, moveable topology, and a centralized control unit. One of the most common attacks in MANETs is the blackhole attack. MANET nodes are susceptible to spectacular degradation of network performance in the presence of such attacks. In this regard, detecting or preventing deceitful nodes that will launch blackhole attacks is a challenge in MANETs. In this paper, we propose an Enhanced Blackhole Resistance (EBR) protocol to identify and resist nodes that are responsible for blackhole attacks. EBR can avoid congested traffic by passing the data packets through a safe route with the minimum RTT. The EBR protocol uses a combination of time to live (TTL) and round trip time (RTT), which is also called a TR mechanism, to detect the blackhole attacks. Our algorithm does not require any cryptographic or authentication mechanisms. Simulation results prove that EBR behaves better than other protocols in terms of throughput, end-to-end delay, packet delivery ratio, energy, and routing overhead.
引用
收藏
页数:19
相关论文
共 49 条
  • [1] Abdelshafy Mohamed A., 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), P1048, DOI 10.1109/CCNC.2016.7444935
  • [2] Abdelshafy MA, 2014, LECT NOTES COMPUT SC, V8487, P318
  • [3] A Survey of Secure Mobile Ad Hoc Routing Protocols
    Abusalah, Loay
    Khokhar, Ashfaq
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04): : 78 - 93
  • [4] MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks
    Adil, Muhammad
    Khan, Rahim
    Almaiah, Mohammed Amin
    Al-Zahrani, Mohammed
    Zakarya, Muhammad
    Amjad, Muhammad Saeed
    Ahmed, Rehan
    [J]. IEEE ACCESS, 2020, 8 (08): : 44459 - 44469
  • [5] Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoT
    Akhtar, Nousheen
    Khan, Muazzam A.
    Ullah, Ata
    Javed, Muhammad Younus
    [J]. IEEE ACCESS, 2019, 7 : 71459 - 71471
  • [6] iTCP: an intelligent TCP with neural network based end-to-end congestion control for ad-hoc multi-hop wireless mesh networks
    Al Islam, A. B. M. Alim
    Raghunathan, Vijay
    [J]. WIRELESS NETWORKS, 2015, 21 (02) : 581 - 610
  • [7] CARTEE: congestion avoidance with reliable transport and energy efficiency for multimedia applications in wireless sensor networks
    Benyahia, Abderrezak
    Bilami, Azeddine
    Sedrati, Maamar
    [J]. WIRELESS NETWORKS, 2020, 26 (03) : 1803 - 1822
  • [8] An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs
    Cai, Ruo Jun
    Li, Xue Jun
    Chong, Peter Han Joo
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (01) : 42 - 55
  • [9] Chakeres ID, 2004, 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, P698, DOI 10.1109/icdcsw.2004.1284108
  • [10] Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
    Chang, Jian-Ming
    Tsou, Po-Chun
    Woungang, Isaac
    Chao, Han-Chieh
    Lai, Chin-Feng
    [J]. IEEE SYSTEMS JOURNAL, 2015, 9 (01): : 65 - 75