A New Approach for Detecting and Eliminating Cooperative Black hole Nodes in MANET

被引:0
作者
Dorri, Ali [1 ]
Nikdel, Hamed [1 ]
机构
[1] Islamic Azad Univ, Mashhad Branch, Dept Comp Engn, Mashhad, Iran
来源
2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT) | 2015年
关键词
component; Security; Mobile Ad hoc Network (MANET); Cooperative Black hole Nodes; AODV;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile Ad hoc Network (MANET) is a kind of Ad hoc network with mobile nodes. Special features like hop-by-hop communications and dynamic topology made routing protocols vulnerable against a variety of attacks. Black hole attack is one of the widely used attacks against routing protocols. In this attack, malicious nodes inject fault routing information to the network and lead all data packets toward them-selves, then drop them all. In this paper, a new mechanism is presented for detecting and eliminating cooperative malicious nodes in MANET based on Ad hoc On Demand Distance Vector (AODV) routing protocol. In our approach source node checks both Next_Hop_Nodes (NHN) and Pervious_Hop_Nodes (PHN) of Route Reply generator in order to check the safety of path. By using a Data Routing Information (DRI) table all malicious nodes eliminated from the network. Simulation results show that our approach decreased the processing time and packet overhead in compare with another work. In addition, our approach detects all malicious nodes in a path in each run with no false positive detection.
引用
收藏
页数:6
相关论文
共 13 条
[1]  
[Anonymous], ARXIV12063764
[2]  
[Anonymous], 2014, ICAETR
[3]  
dorri A, 2014, COMPUTER SCI INFORM, P13
[4]  
Dorri A, 2015, INT J COMPUTER SCI E, V6
[5]   Introduction to reactive protocol [J].
Kalwar S. .
IEEE Potentials, 2010, 29 (02) :34-35
[6]   Light-weight trust-based routing protocol for mobile ad hoc networks [J].
Marchang, N. ;
Datta, R. .
IET INFORMATION SECURITY, 2012, 6 (02) :77-83
[7]  
Mehto A., 2013, 4 INT C COMP COMM NE, P1
[8]  
Nath I., 2012, INT J ADV RES COMPUT, V2, P113
[9]  
Sen J., 2011, 2 INT C INT SYST MOD
[10]  
Singh P. K., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P902, DOI 10.1109/TrustCom.2012.78