Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure

被引:4
|
作者
Anita, E. A. Mary [1 ]
Vasudevan, V. [2 ]
机构
[1] Anna Univ, Chennai, Tamil Nadu, India
[2] AK Coll Engn, Virudunagar, Tamil Nadu, India
来源
INFORMATION SECURITY JOURNAL | 2009年 / 18卷 / 05期
关键词
authentication; BHS-MAODV; Black Hole; certificate chain; MANET; MAODV;
D O I
10.1080/19393550903324928
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2.
引用
收藏
页码:248 / 256
页数:9
相关论文
共 50 条
  • [11] PERFORMANCE EVALUATION OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS
    Nigam, Pratiksha
    Tiwari, Ajay
    ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2021, 20 (07): : 1305 - 1317
  • [12] Secure routing protocols for mobile ad-hoc wireless networks
    Pirzada, AA
    McDonald, C
    ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 : 57 - 80
  • [13] Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks
    Noguchi, Taku
    Hayakawa, Mayuko
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 539 - 544
  • [14] A Misleading active Routing Attack in Mobile Ad-hoc Networks
    Kandah, F.
    Singh, Y.
    Zhang, W.
    Wang, T.
    International Journal of Security and Networks, 2012, 7 (01) : 17 - 29
  • [15] A Comparative Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks
    Khudayer, Baidaa Hamza
    Alzabin, Lial Raja
    Anbar, Mohammed
    Tawafak, Ragad M.
    Wan, Tat-Chee
    AlSideiri, Abir
    Malik, Sohail Iqbal
    Al-Amiedy, Taief Alaa
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 438 - 446
  • [16] THE EFFECTIVENESS OF MOBILE AD HOC ROUTING PROTOCOLS UNDER A GRAY HOLE ATTACK
    Mahlous, Ahmed Redha
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (01): : 59 - 72
  • [17] Effect of the black-hole attack in Vehicular Ad-Hoc Networks
    Mastouri, Mohamed Anis
    Hasnaoui, Salem
    2021 26TH IEEE ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS {APCC), 2021, : 205 - 210
  • [18] Clustering of Mobile Ad Hoc Networks: An Approach for Black Hole Prevention
    Sayner, Jitendra
    Gupta, Vinit
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 361 - 365
  • [19] Prevention of cooperative black hole attack in wireless ad hoc networks
    Ramaswamy, S
    Fu, HR
    Sreekantaradhya, M
    Dixon, J
    Nygard, K
    ICWN'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2003, : 570 - 575
  • [20] Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET)
    Purohit, Kamlesh Chandra
    Dimri, Sushil Chandra
    Jasola, Sanjay
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (04) : 5099 - 5114