An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network

被引:26
作者
Kumar, Vimal [1 ]
Kumar, Rakesh [1 ]
机构
[1] Madan Mohan Malaviya Univ Technol, Dept Comp Sci & Engn, Gorakhpur 273010, Uttar Pradesh, India
来源
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015) | 2015年 / 48卷
关键词
Black hole attack; Secure AODV; Mobile Ad hoc network;
D O I
10.1016/j.procs.2015.04.122
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security is an essential component for mobile ad hoc network (MANET). In order to provide security against attacker, researchers are working specifically on the security challenges in MANETs, and many techniques are proposed for secure routing protocols within the networks. Our proposed work presents a more efficient solution for detecting a black hole attack with less communication cost in the MANET, which is particularly vulnerable compared to infrastructure-based networks due to its mobility and shared broadcast nature. As an adversary can successfully deploy black hole attack in the network. It can be seen that proposed work is more secure than the existing solutions. We also compared its performance to standard AODV routing protocol. The experimental results show that the proposed approach is better than standard AODV.
引用
收藏
页码:472 / 479
页数:8
相关论文
共 10 条
[1]  
Banerjee Sukla, P WORLD C ENG COMP S
[2]  
Castelluccia Claude, 2001, P ELS COMP NETW, P143
[3]   A survey of secure wireless ad hoc routing [J].
Hu, YC ;
Perrig, A .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :28-39
[4]  
Ming-Yang Su, 2010, 2010 International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010), P162, DOI 10.1109/ISPA.2010.74
[5]  
Mistry Nital, P IMECS 2010 HONGK
[6]  
Saetang W., 2012, INT C COMPUTER NETWO, P63
[7]  
Sen J., 2011, Proceedings of the 2011 2nd International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2011), P338, DOI 10.1109/ISMS.2011.58
[8]  
Sharma S, 2009, J ENG SCI TECHNOL, V4, P243
[9]  
Tamilselvan Latha, 2008, Journal of Networks, V3, P13, DOI 10.4304/jnw.3.5.13-20
[10]  
Zhou Lidong, P IEEE NETW COMP COM, V211, P24