DOI QR코드

DOI QR Code

A Light Weight Non-Cryptographic Solution for Defending Black Hole Attacks in Mobile Ad Hoc Networks

  • M.Mohanapriya (Coimbatore Institute of Technology) ;
  • M.Mohanapriya (Coimbatore Institute of Technology)
  • 투고 : 2024.10.05
  • 발행 : 2024.10.30

초록

Mobile Ad hoc Network (MANET) is a self organizing network in which a group of wireless nodes communicate among themselves without requiring any centralized infrastructure. This important characteristic of mobile ad hoc networks allows the hassle free set up of the network for communications in different emergency situations such as battlefield and natural disaster zones. Multi hop communication in MANET is achieved only by the cooperation of nodes in forwarding data packets. This feature of MANET is largely exploited to launch a security attack called black hole attack. In this paper we propose a light weight non cryptographic solution to defend the network from black hole attack and enables communication even in the presence of the attack. In this scheme, by analyzing only the control packets used for routing in the network, the nodes identify the presence of black hole attack. Based on the collective judgment by the participating nodes in the routing path, a secure route free of black hole nodes is selected for communication by the host. Simulation results validate and ensure the effectiveness of the proposed solution in the presence of attack.

키워드

참고문헌

  1. Lakhtaria KI, "Technological advancements and applications in mobile ad-hoc networks: research trends", IGI Global, 2012. 
  2. A. Mehran, W. Tadeusz, D, "A review of routing protocols for mobile ad hoc networks", Ad Hoc Networks, p.1-22, 2004. 
  3. Von Mulert J, Welch I, Seah WK, "Security threats and solutions in MANETs: a case study using AODV and SAODV, Journal of Networks and Computer Applications, p.1249-1259, 2012. 
  4. Garcia Teodoro P, Sanchez Casado L, Macia Fernandez G, "Taxonomy and holistic detection of security attacks in MANETs", CRC Press, p. 1-12, 2014. 
  5. C. Perkins, E. Royer, "Ad hoc on demand distance vector (AODV) routing", Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), p. 90-100, 1999. 
  6. D.B. Johnson, A.D. Maltz, J. Broch, "DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks", Ad Hoc Networking, Addison-Wesley, p. 139-172, 2001. 
  7. G. Arboit, C. Crepeau, C.R. Davis, M. Maheswaran, "A localized certificate revocation scheme for mobile ad hoc networks", Ad Hoc Networks, Vol. 6, p.17-31,
  8. N.C. Fernandes, M.D.D. Moreira, O.C.M.B. Duarte, "A self-organized mechanism for thwarting malicious access in ad hoc networks", IEEE INFOCOM'10, 2010. 
  9. H. Xia, Z. Jia, L. Ju, and Y. Zhu, "Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory," IET Wireless Sensor System, vol. 1, p. 248-266, 2011. 
  10. I. R. Chen, J. Guo, F. Bao, and J. Cho, "Trust management in mobile ad hoc networks for bias minimization and application performance maximization," Ad Hoc Networks., vol. 19, p. 59-74, 2014. 
  11. L. H. G. Ferraz, P. B. Velloso, and O. C. M. B. Duarte, "An accurate and precise malicious node exclusion mechanism for ad hoc networks", Ad hoc Networks, vol. 19, p. 142-155, 2014. 
  12. Karlof C, Wagner D, "Secure routing in wireless sensor networks: attacks and countermeasures", Ad hoc Networks, Vol. 1, p. 293-315, 2003 [Special Issue on Sensor Network Applications and Protocols]. 
  13. H.Deng, P. Agarwal, "Routing Security in Wireless Ad Hoc Networks", IEEE Communications Magazine, Vol.40, p. 70-75, 2002. 
  14. B.Awerbuch, D. Holmer, C. Nita Rotaru, H. Rubens, "An On-demand Secure Routing Protocol Resilient to Byzantine Failures", ACM Workshop on Wireless Security, p. 21-30, 2002. 
  15. Imran Raza, S.A. Hussain, "Identification of malicious nodes in an AODV pure ad hoc network through guard nodes", Computer Communications, p. 1796-1802, 2008.
  16. Jhaveri, Rutvij H., and Narendra M. Patel, "A sequence number based bait detection scheme to thwart gray hole attack in mobile ad hoc networks", Wireless Networks, Vol. 21, p. 2781-2798, 2015. 
  17. Dorri, Ali, Soroush Vaseghi, and Omid Gharib, "DEBH: detecting and eliminating black holes in mobile ad hoc network", Wireless Networks, Vol. 24, p. 2943-2955, 2018. 
  18. Tarun Varshney, Tushar Sharma, Pankaj Sharma, (2014), Implementation of Watchdog Protocol with AODV in Mobile Ad Hoc Network. 
  19. Adwan Yasin, Mahmoud Abu Zant, "Detecting and Isolating Black-Hole Attacks in MANET using Timer Based Baited Technique", Wireless Communications and Mobile Computing, Vol. 1, 2018.
  20. Lyno Henrique G. Ferraz, Pedro B. Velloso, Otto Carlos M.B. Duarte, "An accurate and precise malicious node exclusion mechanism for ad hoc networks", Adhoc Networks, Vol.19, p.142-155,2014 
  21. Ruo Jun Cai, Xue Jun Li , Peter Han Joo Chong, "An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs", IEEE Transactions On Mobile Computing, Vol. 18, P.42-55, 2019 
  22. P. Zhou, S. Jiang, A. Irissappane, J. Zhang, J. Zhou, and J. C. M. Teo, "Toward energy-efficient trust system through watchdog optimization for WSNs," IEEE Transaction on Information Forensics Security, vol. 10, p. 613-625, 2015. 
  23. W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Transaction on Wireless Communication, vol. 1, p. 660-670, 2002.