CFP last date
20 December 2024
Reseach Article

Preventing Manets from Blackhole Attack using Blackhole Node Detection Monitoring System

by Parita Jain, Puneet Kumar Aggarwal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 15
Year of Publication: 2012
Authors: Parita Jain, Puneet Kumar Aggarwal
10.5120/6343-8644

Parita Jain, Puneet Kumar Aggarwal . Preventing Manets from Blackhole Attack using Blackhole Node Detection Monitoring System. International Journal of Computer Applications. 44, 15 ( April 2012), 34-37. DOI=10.5120/6343-8644

@article{ 10.5120/6343-8644,
author = { Parita Jain, Puneet Kumar Aggarwal },
title = { Preventing Manets from Blackhole Attack using Blackhole Node Detection Monitoring System },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 15 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 34-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number15/6343-8644/ },
doi = { 10.5120/6343-8644 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:35:40.750156+05:30
%A Parita Jain
%A Puneet Kumar Aggarwal
%T Preventing Manets from Blackhole Attack using Blackhole Node Detection Monitoring System
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 15
%P 34-37
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Adhoc networks are prone to number of security threats due to unavailability of centralized authority. It incorporates various malicious activities within the network. This research focuses on single Blackhole attack but our design principles may be applicable to wide range of attacks. So, this proposed approach of Blackhole comprises of active routing misbehavior and forwarding misbehavior. This can be defined by modifying existing DSR protocol with the functionality of single Blackhole node in highly mobile and sparse network without affecting the overall performance of the network.

References
  1. B. Wu, J. Chen, J. Wu, and M. Cardei. 2008 A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks in Wireless/Mobile Network Security, Springer.
  2. Y. Hu and A. Perrig. 2004 A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy, pp. 28-39.
  3. Moumita Deb. 2008 A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks in WCECS October 22-24 san Francisco, USA.
  4. E. Royer and C. -K. Toh. 1999 A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications Magazine, Vol. 6, No. 2, pp. 46-55.
  5. Mohammad AL-Shurman, Seon-Moo Yoo and Seungiin Park. 2004 Black Hole Attack in Mobile Ad Hoc Networks. ACMSE Huntsville,AL,USA.
  6. Hongmei Deng, Wei Li, and Dharma P. Agrawal. 2009 Routing security in Wireless Ad-hoc Network in University of Cincinnati.
  7. Sonja Buchegger and Jean-Yves Le Boudec. 2002 Performance Analysis of the CINFIDENT Protocol: Cooperation of nodes-fairness in Dynamic Adhoc Networks in Proc of IEEE/ACM MobiHOC.
  8. Santosh Krishna B. V, Mrs. Vallikannu A. L. 2010 Detecting Malicious Nodes for Secure routing in MANETS using Reputation Based Mechanism in IJSER.
  9. Bo Sun,Yong Guan,Jian Chen,Udo W. Pooch. 2003 Detecting Black-hole Attack in Mobile Ad Hoc Network in The institute of Electrical Engineers IEEE.
  10. S. Murthy and J. J. Garcia-Luna-Aceves. 1996 An efficient routing protocol for wireless networks. ACM Mobile Networks and Application, Oct. 183–197, 1996.
  11. F. Kargl, S. Schlott, A. Klenk, A. Geiss, M. Weber. 2004 Securing Ad hoc Routing Protocols", EUROMICRO.
  12. H. Yang, et al. 2006 SCAN: self-organized Network-layer Security in Mobile Adhoc Networks. IEEE Networks, vol. 24 pp. 1-13.
  13. D. Djenouri, A. Derhab, N. Badache. 2006 Ad Hoc Networks Routing Protocols and Mobility". Int. Arab J. Inf. Technol. (IAJIT) 3(2):126-133.
  14. J. Broch, D. B. Johnson, and D. A. Maltz. 1998 The dynamic source routing protocol for mobile ad hoc networks, Internet draft.
  15. B. Wu, J. Chen, J. Wu, and M. Cardei. 20008 A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks," in Wireless/Mobile Network Security, Springer.
  16. Rajib Das et al. 2011 Security Measures for Blackhole Attack in MANET: An Approach. IJEST.
Index Terms

Computer Science
Information Sciences

Keywords

Manets Dsr Routing Protocol Blackhole Attack Blackhole Monitoring System