An efficient approach to circumvent black hole nodes in manets

被引:0
作者
P. Tamilselvi
C. Ganesh Babu
机构
[1] Sri Eshwar College of Engineering,Department of Electronics & Communication Engineering
[2] Bannari Amman Institute of Technology,Department of Electronics & Communication Engineering
来源
Cluster Computing | 2019年 / 22卷
关键词
Manet; Black hole; DSR; PDR; RREQ; RREP;
D O I
暂无
中图分类号
学科分类号
摘要
MANETs are self-configured network. Nodes in Manets need not follow a specific infrastructure. Nodes are connected wirelessly and so nodes can travel to any direction. Manets assure that all its nodes are cooperating with each other. Sometimes, some nodes may not be reliable. These unreliable intermediate nodes participate in the packet forwarding and drop the packets instead of forwarding them to the destination node. This type of security attack is called black hole attack (Baadache and Belmehdi in Int Comput Sci Inf Sec 7(1):1–10, 2010). In this paper, an efficient method of route discovery process is used which bypasses the black hole nodes and uses only the reliable route for transmission. The main advantage of using the proposed method is that there is no need to maintain black hole list. So, there is no need to check the black hole list each time during route discovery. Dynamic source routing (DSR) is used for the transmission of packets. The simulations are done to measure packet delivery ratio, packet drop, average throughput, normalized routing overhead and average end-to-end delay. Simulation results shows that the proposed method improves the packet delivery ratio in presence of black hole and reduces the packet drop. Also the communication overhead is reduced which in turn minimizes the resource utilization in Manets.
引用
收藏
页码:11401 / 11409
页数:8
相关论文
共 27 条
  • [1] Baadache A(2010)Avoiding black hole and cooperative black hole attacks in wireless ad hoc networks Int. J. Comput. Sci. Inf. Sec. 7 1-10
  • [2] Belmehdi A(2012)AMD: audit-based misbehavior detection in wireless ad hoc networks IEEE Trans. Mobile Comput. x 1-14
  • [3] Zhang Y(2013)A secure protocol for spontaneous wireless ad hoc networks creation IEEE Trans. Parallel Distrib. Syst. 24 629-641
  • [4] Lazos L(2011)ALARM: anonymous location-aided routing in suspicious MANETs IEEE Trans. Mobile Comput. 10 1345-1358
  • [5] Jr. Kozma W(2010)Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks Int. J. Comput. Appl. 1 38-42
  • [6] Lloret J(2015)Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach IEEE Syst. J. 91 65-75
  • [7] Garcia M(2003)Secure message transmission in mobile ad hoc networks Ad Hoc Netw. 1 193-209
  • [8] Penalver L(2015)Privacy-preserving and truthful detection of packet dropping attacks in wireles ad hoc network IEEE Trans. Mobile Comput. 14 813-828
  • [9] Defrawy KE(2013)Survey of attacks on wireless network Int. J. Innov. Res. Comput. Commun. Eng. 1 90-100
  • [10] Tsudik G(2011)Defining malicious behaviour of a node and its defensive methods in ad hoc networks Int. J. Comput. Appl. 20 18-21