We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Enhanced Approach for Detecting Black Hole Attacks in MANET

by Pratima Sarkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 6
Year of Publication: 2017
Authors: Pratima Sarkar
10.5120/ijca2017913209

Pratima Sarkar . An Enhanced Approach for Detecting Black Hole Attacks in MANET. International Journal of Computer Applications. 161, 6 ( Mar 2017), 6-9. DOI=10.5120/ijca2017913209

@article{ 10.5120/ijca2017913209,
author = { Pratima Sarkar },
title = { An Enhanced Approach for Detecting Black Hole Attacks in MANET },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 6 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number6/27150-2017913209/ },
doi = { 10.5120/ijca2017913209 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:23.014629+05:30
%A Pratima Sarkar
%T An Enhanced Approach for Detecting Black Hole Attacks in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 6
%P 6-9
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The proposed paper is enhanced version of our previous paper” A cryptographic approach towards Black Hole Attack Detection” accepted in CNSA 2012 gives solution for false reply from a node and confirms reply is coming from destination node in Black Hole attack. This paper proposed an algorithm for detecting malicious node that drops packet and the node that gives false reply to the source node. In this work detection of false reply by a malicious node and also detecting a node that drops the packets. Detection in both the cases is performed locally using the previous node of the attacker. This paper uses two acknowledgements for detecting malicious node. By using this algorithm the security mechanism overhead would be decreased, throughput also increased and reduced end-to-end delay. The graphs at the result section shows improvement in network performances in the presence of black hole attacks and it can do so with a negligible level of additional overhead.

References
  1. Royer E.M.,(1999)“A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”,[J]. IEEE Personal Communication. 4(2) : pp.46-55.
  2. Mishra, A, Nadkarni, K, & Patcha, A,(Feb 2004)“Intrusion Detection in Wireless Ad Hoc Networks”,IEEE Wireless Communications”, VOL.11pp.48-60
  3. Zhou L & Chao H-C (2011)” Multimedia Traffic Security Architecture for the Internet of Things. IEEE Network “25(3):29–34.doi: 10.1109/MNET.2011.5772059
  4. Yang H, Lou H, Ye F & Lu SZhang L (2004)”, Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications “11(1):38–47. doi:10.1109/ MWC.2004.1269716
  5. S, Reddy BVR, & Hoda MN (2010) “Enhanced Intrusion Detection System for Malicious Node Detection in Ad Hoc Routing Protocols using Minimal Energy Consumption. IET Communications”, 4(17):2084–2094. doi: 10.1049/ietcom.2009.0616
  6. Wu B, Chen J, Wu J & Cardei M (2007) “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks “,In: Xiao Y, Shen X, Du D-Z (eds) Wireless Network Security. on Signals and Communication Technology. Springer, New York
  7. Marti S, Giuli TJ, Lai K & Baker M (2000) “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, Paper presented at the 6th annual International Conference on Mobile Computing and Networking, Boston, Massachusetts,
  8. H.Deng, W. Li & D. Agrawal (2002)” Routing security in ad hoc networks. IEEE Communications Magazine”, vol. 40, no. 10, pp. 70-75.
  9. Mehdi Medadian, M.H. Yektaie & A.M Rahmani(2009)” Combat with Black Hole Attack in AODV routing protocol in MANET”,IEEE.
  10. Songbai Lu, Longxuan, Li Kwok-Yan Lam & Lingyan Jia (2009)” SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack”, International Conference on Computational Intelligence and Security.
  11. Lien-Wen Wu & Rui-Feng Yu (2010)” A Threshold-Based Method for Selfish Node Detection in MANET”, IEEE, pp 875-882.
  12. Jaydip Sen, Sripad Koilakonda & Arijit Ukil (2011) “A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, Second International Conference on Intelligent Systems, Modelling and Simulation.
  13. Akanksha Saini & Harish Kumar (December 2010) “Effect Of Black Hole Attack On AODV Routing Protocol In MANET”, IJCST Vol. 1, Issue 2.
  14. Pratima Sarkar & Rituparna Chaki (2012) “A cryptographic approach towards Black Hole Attack Detection” Accepted in CNSA-2012 Chennai.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad hoc Networks Routing Intruder Detection DOS Black Hole Attack