Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure

被引:4
|
作者
Anita, E. A. Mary [1 ]
Vasudevan, V. [2 ]
机构
[1] Anna Univ, Chennai, Tamil Nadu, India
[2] AK Coll Engn, Virudunagar, Tamil Nadu, India
来源
INFORMATION SECURITY JOURNAL | 2009年 / 18卷 / 05期
关键词
authentication; BHS-MAODV; Black Hole; certificate chain; MANET; MAODV;
D O I
10.1080/19393550903324928
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2.
引用
收藏
页码:248 / 256
页数:9
相关论文
共 50 条
  • [21] Efficient Flooding using Prefetching in On-Demand Routing Protocols for Mobile Ad-hoc Networks
    Shobha, K. R.
    Shetty, Karthik
    Rajanikanth, K.
    2011 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON), 2011, : 13 - 18
  • [22] A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks
    Sarkar, Sajal
    Datta, Raja
    AD HOC NETWORKS, 2016, 37 : 209 - 227
  • [23] Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET)
    Kamlesh Chandra Purohit
    Sushil Chandra Dimri
    Sanjay Jasola
    Wireless Personal Communications, 2017, 97 : 5099 - 5114
  • [24] Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm
    Kumar, Ankit
    Varadarajan, Vijayakumar
    Kumar, Abhishek
    Dadheech, Pankaj
    Choudhary, Surendra Singh
    Kumar, V. D. Ambeth
    Panigrahi, B. K.
    Veluvolu, Kalyana C.
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [25] A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks
    Borkar, Gautam M.
    Mahajan, A. R.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 24 (01) : 23 - 57
  • [26] Novel gray hole attack detection scheme for mobile ad-hoc networks
    Chen, Wei
    Long, Xiang
    Gao, Xiaopeng
    Bai, Yuebin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (08): : 1371 - 1377
  • [27] Multicast routing in mobile ad hoc networks by using a multiagent system
    Manvi, S. S.
    Kakkasageri, M. S.
    INFORMATION SCIENCES, 2008, 178 (06) : 1611 - 1628
  • [28] Detection and Isolation of Black Hole attack in Mobile Ad Hoc Networks - A Review
    Nagasubramanian, Gayathri
    Sakthivel, Rakesh Kumar
    Patan, Rizwan
    Ehtemami, Anahid
    Meyer-Baese, Anke
    Tahmassebi, Amirhessam
    Gandomi, Amir H.
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES IV, 2020, 11419
  • [29] A Review of Black-Hole Attack Mitigation Techniques and its Drawbacks in Mobile Ad-hoc Network
    Gurung, Shashi
    Chauhan, Siddhartha
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2379 - 2385
  • [30] A Comprehensive Performance Comparison of On-Demand Routing Protocols in Mobile Ad-Hoc Networks
    Khan, Jahangir
    Hayder, Syed Irfan
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 354 - 369