We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Implementation of Black Hole Security Attack using Malicious Node for Enhanced - DSR Routing Protocol of MANET

by Rooshabh Kothari, Deepak Dembla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 18
Year of Publication: 2013
Authors: Rooshabh Kothari, Deepak Dembla
10.5120/10731-5504

Rooshabh Kothari, Deepak Dembla . Implementation of Black Hole Security Attack using Malicious Node for Enhanced - DSR Routing Protocol of MANET. International Journal of Computer Applications. 64, 18 ( February 2013), 1-8. DOI=10.5120/10731-5504

@article{ 10.5120/10731-5504,
author = { Rooshabh Kothari, Deepak Dembla },
title = { Implementation of Black Hole Security Attack using Malicious Node for Enhanced - DSR Routing Protocol of MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 18 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number18/10731-5504/ },
doi = { 10.5120/10731-5504 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:16:45.434554+05:30
%A Rooshabh Kothari
%A Deepak Dembla
%T Implementation of Black Hole Security Attack using Malicious Node for Enhanced - DSR Routing Protocol of MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 18
%P 1-8
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad hoc Network (MANET) is a group of movable hosts with wireless network interfaces that structure a temporary network without the support of any permanent infrastructure or central administration. A MANET is also referred as an infrastructure less network because the mobile nodes in the network dynamically locate paths among themselves to transfer packets provisionally. Due to the dynamic network topology in ad hoc network nodes are exchanging plenty of routing packets for creating communication which intern increase network overhead and also increase collision in network. This brings about the matter of security in an ad hoc network. Security is core concern in routing protocol of MANET and affects the performance. In this paper, a innovative request forwarding mechanism is proposed in which source node generates route request packet and broadcast packet to other neighbor nodes to locate destination by implementing black hole attack. Proposed EM-DSR (Enhanced Malicious DSR) is implemented on NS-2 and results shown significant improvement over original DSR in terms of various performance metrics. it has been found that on dense network certain numbers of malicious nodes are supportive to reducing communication overhead and because of density negative effect of malicious attacks which is proposed EM-DSR that is able to reduce. Hence result shows proposed EM-DSR will be helpful to decrease communication overhead.

References
  1. Ashish T. Bhole, Prachee N. Patil," Study Of Black hole Attack in MANET" , International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 4 pp 99-102, October 2012
  2. Mahesh Kumar Yadav, Ram Kishan Khola and Deepak Dembla, " Modeling, Analysis & Implementation of Improved AODV Routing Protocol in MANETs, International Journal of Computer Applications(0975-8887) Volume 41-No. 21 pp 37-42 ,September-2012
  3. Deepak Dembla, Dr. Yogesh Chaba,"Modeling and Analysis of an intelligent AODV Routing Protocol based on Route Request Retransmission Strategy in MANETs", International Journal of Computer Applications (0975-8887) Volume 30-No. 11 pp 6-13, September-2011
  4. RajenderNath, Pankaj Kumar Sehgal, Atul Kumar Sethi, "Effect of Routing Misbehavior in Mobile Ad Hoc Network" ISBN 978-1-4244-4791-6/10, IEEE 2010.
  5. Elizabeth M. Royer, C-K Toh. "A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks", 168-175, 2004, ISSN 1682-6027 pp 46-55, IEEE 2009.
  6. N. Bhalaji, Dr. A. Shanmugam,"Association between nodes to combat black hole attack in DSR based MANET", 978-1-4244-3474-9/09/ pp 403-407, IEEE 2009
  7. Dinesh Mishra1, Yogendra Kumar Jain, Sudhir Agrawal," Behavior Analysis of Malicious Node in the Different Routing Algorithms in Mobile Ad Hoc Network (MANET)", 978-0-7695-3915-7/ pp 621-623 , IEEE 2009
  8. Samba Sesay, Zongkai Yang and Jianhua He, "A Survey on Mobile Ad Hoc Wireless Network", Information Technology Journal 3 (2): 168-175, 2004, ISSN 1682-6027 2004 Asian Network for Scientific Information, pp 169-175.
  9. Latha Tamilselvan, Dr. V Sankaranarayanan," Prevention of Black hole Attack in MANET", the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007) 0-7695-2842-2/07 ,pp 6-11.
  10. B. Wu, J. Chen, J. Wu, and M. Cardei, "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks in Wireless/Mobile Network Security", Springer 2008.
  11. Mon Bo Su, Xiao Hannan, A. Adereti, J. A. Malcolm, B. Christianson, "A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack", Proc. of Third International Symposium on Information Assurance and Security, 'IAS 2007', pp. 50-55, Aug. 2007.
  12. K. Biswas and Md. Liaqat Ali, "Security threats in Mobile Ad-Hoc Network", March 2007
  13. Bing Wu, Jianmin Chen, Jie Wu, MihaelaCardei "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", Wireless Mobile Network Security pp 1-38, Springer 2006.
  14. Dow CR, Lin PJ, Chen SC, Lin JH, Hwang SF," A Study of Recent Research Trends and Experimental Guidelines in Mobile Ad-hoc Networks". IEEE 19th International Conference on Advanced Information Networking and Applications, Tamkang University, Taiwan pp 72-77, 28-30 March 2005.
  15. D B. Johnson, D A. Maltz, and Y. Hu. "The dynamic source routing protocol for mobile ad hoc network," IETF, pp 43-53, April 2003.
  16. Ioannis Chatzigiannakis, Elena Kaltsat and Sotiris Nikoletseas, "on the effect of user mobility and density on the performance of ad-hoc mobile networks", 12th IEEE International Conference on Networks, 2004, pp 336-341. (ICON 2004) Proceedings.
  17. Xiao Yang Zhang, Yuji Sekiya and Yasushi Wakahara, "Proposal of a Method to Detect Black Hole Attack in MANET ", Autonomous Decentralized System 2009 pp 1-6 ,ISADS'09
  18. Mohammad AI-Shurrnan et al: "Black Hole Attack in Mobile Ad Hoc Network", ACMSE' 04, (April 2004)
  19. Yi-Chun Hu, Adrian Perrig, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security and Privacy, 1540- 7993/04/,2004 IEEE pp 28-39 , May/June 2004.
Index Terms

Computer Science
Information Sciences

Keywords

DSR EM-DSR (Enhanced Malicious DSR) Secured Routing Black hole attack malicious nodes Selfish nodes Ad hoc network