Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure

被引:4
|
作者
Anita, E. A. Mary [1 ]
Vasudevan, V. [2 ]
机构
[1] Anna Univ, Chennai, Tamil Nadu, India
[2] AK Coll Engn, Virudunagar, Tamil Nadu, India
来源
INFORMATION SECURITY JOURNAL | 2009年 / 18卷 / 05期
关键词
authentication; BHS-MAODV; Black Hole; certificate chain; MANET; MAODV;
D O I
10.1080/19393550903324928
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2.
引用
收藏
页码:248 / 256
页数:9
相关论文
共 50 条
  • [1] Overview of Multicast Routing Protocols for Mobile Ad-hoc Networks
    Vijayalakshmi, J.
    Prabu, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 256 - 260
  • [2] Self-Organized Authentication in Mobile Ad-Hoc Networks
    Caballero-Gil, Pino
    Hernandez-Goya, Candelaria
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (05) : 509 - 517
  • [3] Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks
    Dhama, Siddharth
    Sharma, Sandeep
    Saini, Mukul
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2993 - 2996
  • [4] Self-Organized Authentication Architecture for Mobile Ad-hoc Networks
    Caballero-Gil, P.
    Caballero-Gil, C.
    Molina-Gil, J.
    Hernandez-Goya, C.
    2008 6TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1 AND 2, 2008, : 208 - +
  • [5] Routing protocols in Mobile Ad-hoc Networks
    Mikaric, Bratislav
    Rancic, Dejan
    Ilic, Slavisa
    PRZEGLAD ELEKTROTECHNICZNY, 2020, 96 (08): : 106 - 111
  • [6] Performance Evaluation of Multicast Routing Protocols in Ad-Hoc Networks
    Devi, Usha G.
    Banu, Wahida R. S. D.
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 757 - 761
  • [7] Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks
    Zhao Min
    Zhou Jiliu
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 26 - +
  • [8] Mitigating effects of Black hole Attack in Mobile Ad-hoc Networks: Military Perspective
    Singh, Bikramjeet
    Srikanth, Dasari
    Kumar, C. R. Suthikshn
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 810 - 814
  • [9] Self-Organized Hash Based Secure Multicast Routing Over Ad Hoc Networks
    Chopra, Amit
    Kumar, Rajneesh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 155 - 163
  • [10] Black Hole Attack's Effect Mobile Ad-hoc Networks (MANET)
    Sardana, Anjali
    Saini, Akanksha
    Bedwal, Tushina
    Tayal, Radhika
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 966 - 970