Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks

被引:27
作者
Elmahdi, Elbasher [1 ]
Yoo, Seong-Moo [1 ]
Sharshembiev, Kumar [1 ]
机构
[1] Univ Alabama Huntsville, Elect & Comp Engn, 301 Sparkman Dr NW, Huntsville, AL 35899 USA
关键词
Mobile ad hoc network security; Secure message transmission; Blackhole attack; ROUTING PROTOCOL; DETECTION SCHEME; WIRELESS;
D O I
10.1016/j.jisa.2019.102425
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad hoc network (MANET) is a dynamic wireless network without any infrastructures. It is vulnerable to many types of attacks. Thus, security has turned out to be an important factor to facilitate secured communication between mobile nodes in a wireless environment. Recently, many routing protocols have been established. But most of them do not consider the security criteria in their designing. So, practically any node can maliciously disrupt communication of other nodes. Hence, a new approach is proposed in this paper to provide reliable and secure data transmission in MANETs under possible blackhole attacks based on modified ad-hoc on-demand multipath distance vector (AOMDV) protocol. We divide the message into multiple paths to the destination and use homomorphic encryption scheme for cryptography technique. The performance of the proposed scheme is stable with very high packet delivery ratio while that of AOMDV is found to be vulnerable with the intrusion of malicious nodes in the network. Simulation results show that, compared to the original AOMDV scheme, our proposed scheme improves considerably the packet delivery ratio and network throughput in the presence of malicious nodes. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 23 条
[1]  
Ahirwal R.R., 2013, International Journal of Computer Science and Information Technologies, V4, P363
[2]   An Improved DSDV Routing Protocol For Wireless Ad Hoc Networks [J].
Ahmed, Gulfishan Firdose ;
Barskar, Raju ;
Barskar, Nepal .
2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 :822-831
[3]  
[Anonymous], 2014, International Journal of Computer Applications, DOI DOI 10.5120/15902-5081
[4]  
Chelvan K.C., 2014, Int. J. Innov. Res. Comput. Commun. Eng, V1, P3860
[5]   A Cross-Layer AOMDV Routing Protocol for V2V Communication in Urban VANET [J].
Chen, Yufeng ;
Xiang, Zhengtao ;
Jian, Wei ;
Jiang, Weirong .
2009 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS, 2009, :353-359
[6]  
Chlamtac I., 2003, Ad Hoc Networks, V1, P13, DOI [10.1016/S1570-8705(03)00013-1, DOI 10.1016/S1570-8705(03)00013-1]
[7]  
Das M, 2001, 9 INT C NETW PROT IC
[8]  
Ertaul L, 2007, INT J COMPUT SCI NET, V7, P132
[9]  
Ertaul L, 2007, INT J COMPUT SCI NET, V7, P48
[10]  
Jain G, 2016, 2 INT C CONT COMP IN, DOI [10.1109/IC3I.2016.7917980, DOI 10.1109/IC3I.2016.7917980]