We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Novel Approach for Detecting Black Hole Attack in MANET

by Isha Shingari, Sourabh Singh Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 2
Year of Publication: 2013
Authors: Isha Shingari, Sourabh Singh Verma
10.5120/11933-7720

Isha Shingari, Sourabh Singh Verma . A Novel Approach for Detecting Black Hole Attack in MANET. International Journal of Computer Applications. 70, 2 ( May 2013), 10-15. DOI=10.5120/11933-7720

@article{ 10.5120/11933-7720,
author = { Isha Shingari, Sourabh Singh Verma },
title = { A Novel Approach for Detecting Black Hole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 2 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number2/11933-7720/ },
doi = { 10.5120/11933-7720 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:47.369310+05:30
%A Isha Shingari
%A Sourabh Singh Verma
%T A Novel Approach for Detecting Black Hole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 2
%P 10-15
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The communication in Mobile Adhoc Networks play a vital role in situations like natural calamities or military operations, but due to the dynamic nature of the adhoc networks, it is very important to take care of the security issues, one of the major security issues is the detection of compromised node. The calculation of trust values on the neighboring nodes can significantly solve this problem. This paper presents the calculation of trust values based on the threshold value, if trust value of a node goes beyond the predefined threshold, it is considered to be malicious. The trust value of a node is calculated by taking average of all the trust values for the node. The proposed scheme will be able to detect and isolate the compromised node from the network.

References
  1. KannanGovindan,PrasantMohapatra," Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey"
  2. Xia Li, Jill Slay ,Shaokai Yu " Evaluating Trust in Mobile Ad Hoc Networks"
  3. MV Raghavendiran N, M Aaqib M, Vijayan R "An approach for detection of malicious node using fuzzy based trust levels in MANET"
  4. D. F. Macedo, A. L. Santos, J. M. S. Nogueira, and G. Pujolle, "A distributed information repository for autonomic context-aware manets,"IEEE Trans. Netw. Service Management, vol. 6, no. 1, pp. 45-55, Mar. 2009.
  5. Nagi, E. C. H. , M. R. Lyu, and R. T. Chin. "An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks". in Proceedings of 2004 IEEE Aerospace Conference. 2004. Big Sky, MT, United States: IEEE.
  6. Beth, T. , M. Borcherding, and B. Klein. Valuation of Trust in Open Networks. in 3rd European Symposium on Research in Computer Security (ESORICS '94). 1994. Brighton, UK: Springer Verlag.
  7. Pirzada, A. A. and C. McDonald. Trusted Route Discovery with TORA Protocol. in the Second Annual Conference on Communication Networks and Services Research (CNSR'04). 2004. Fredericton, N. B. , Canada: IEEE.
  8. Levien, R. and A. Aiken. "Attack-resistant trust metrics for public key certification". Pro-ceedings of the Seventh USENIX Security Symposium. 1998. San Antonio, TX, USA: USENIX Association.
  9. Zimmermann, P. R. , The Official PGP User's Guide. 1995: MIT Press.
  10. Herzberg, A. , Y. Mass, and J. Michaeli. Access control meets public key infrastructure, or: assigning roles to strangers. in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. 2000. Berkeley, CA, USA: IEEE.
  11. Manchala, D. W. Trust Metrics, Models and Protocols for Electronic Commerce Transac-tions. in Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No. 98CB36183). 1998. Los Alamitos, CA, USA: IEEE Computer Society.
  12. Manchala, D. W. , E-commerce trust metrics and models. IEEE Internet Computing, IEEE 2000. 4(n2): p. p 36-44.
  13. Pirzada, A. A. and C. McDonald. Establishing trust in pure ad-hoc networks. in Proceedings of the 27th conference on Australasian computer science. 2004. Dunedin, New Zealand: Australian Computer Society.
  14. Virendra, M. , et al. Quantifying Trust in Mobile Ad-Hoc Networks. in International Con-ference on Integration of Knowledge Intensive Multi-Agent Systems, 2005 (KIMAS '05). 2005. Waltham, Massachusetts, USA: IEEE.
  15. Charles E. Perkins,Elizabeth M. Royer " Ad-hoc On-Demand Distance Vector Routing"WASA, 2006, pp. 695-710.
  16. A. PravinRenold, R. Parthasarathy" Source based Trusted AODV Routing Protocol for Mobile Ad hoc Networks" ICACCI 12 Proceedings of the International Conference on Advances in Computing, Communications and Informatics. Pp-1271-1275
  17. F. Thachil, KC Shet" A trust based approach for AODV protocol to mitigate black hole attack in MANET" 2012 International Conference on Computing Sciences.
  18. Poonam, K. Garg, M. Misra" Misbehaving Nodes Detection Through Opinion Based Trust Evaluation Model in MANETs" International Conference and Workshop on Emerging Trends in Technology( ICWET 2011)- TCET Mumbai
  19. WenjingLou,Wei Liu YuguangFang"SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks" IEEE INFOCOM 2004
Index Terms

Computer Science
Information Sciences

Keywords

MANET threshold trust trust calculation trust