Modified DSR protocol for detection and removal of selective black hole attack in MANET

被引:65
作者
Mohanapriya, M. [1 ]
Krishnamurthi, Ilango [1 ]
机构
[1] Sri Krishna Coll Engn & Technol, Coimbatore 641008, Tamil Nadu, India
关键词
COOPERATIVE BLACK; ROUTING SECURITY; HOC; SCHEME;
D O I
10.1016/j.compeleceng.2013.06.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A black hole attack in ad hoc network refers to an attack by malicious nodes, which forcibly acquires the route from a source to destination by falsely advertising shortest hop count to reach the destination node. In this paper, we present a Modified Dynamic Source Routing Protocol (MDSR) to detect and prevent selective black hole attack. Selective black hole attack is a special kind of black hole attack where malicious nodes drop the data packets selectively. We proposed an Intrusion Detection System (IDS) where the IDS nodes are set in promiscuous mode only when required, to detect the abnormal difference in the number of data packets being forwarded by a node. When any anomaly is detected, the nearby IDS node broadcast the block message, informing all nodes on the network to cooperatively isolate the malicious node from the network. The proposed technique employs Glomosim to validate the effectiveness of proposed intrusion detection system. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:530 / 538
页数:9
相关论文
共 25 条
[1]  
Abolhasan M., 2004, AD HOC NETW, V2, P1, DOI DOI 10.1016/S1570-8705(03)00043-X
[2]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[3]  
[Anonymous], P IEEE INT C NETW PR
[4]  
Banerjee S, 2008, LECT NOTES ENG COMP, P337
[5]   A Context Adaptive Intrusion Detection System for MANET [J].
Cheng, Bo-Chao ;
Tseng, Ryh-Yuh .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :310-318
[6]   Routing security in wireless ad hoc networks [J].
Deng, HM ;
Li, W ;
Agrawal, DP .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) :70-75
[7]   An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol [J].
Djahel, Soufine ;
Nait-Abdesselam, Farid ;
Khokhar, Ashfaq .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :2780-2785
[8]   Performance analysis of ad-hoc networks under black hole attacks [J].
Dokurer, Semih ;
Erten, Y. M. ;
Acar, Can Erkin .
PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, :148-153
[9]   A Novel Gray Hole attack detection scheme for Mobile Ad-Hoc Networks [J].
Gao Xiaopeng ;
Chen Wei .
2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, :209-214
[10]  
Hu Y., 2002, PROC 8 ACM INT C MOB, P12