CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

DDBA-DSR: Detection of Deep Black Hole Attack in DSR

by Mamta, Suman Deswal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 21
Year of Publication: 2013
Authors: Mamta, Suman Deswal
10.5120/13016-0037

Mamta, Suman Deswal . DDBA-DSR: Detection of Deep Black Hole Attack in DSR. International Journal of Computer Applications. 73, 21 ( July 2013), 9-15. DOI=10.5120/13016-0037

@article{ 10.5120/13016-0037,
author = { Mamta, Suman Deswal },
title = { DDBA-DSR: Detection of Deep Black Hole Attack in DSR },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 21 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number21/13016-0037/ },
doi = { 10.5120/13016-0037 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:42.376169+05:30
%A Mamta
%A Suman Deswal
%T DDBA-DSR: Detection of Deep Black Hole Attack in DSR
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 21
%P 9-15
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network and mobile nodes are free to move in any network. Due to their lack of centralized control, and dynamic topology, MANETs are vulnerable to many attacks. From a security design perspective, there is no built-in security. So, security is one of the main concerns in ad hoc networks. In this paper, a technique DDBA-DSR is presented to protect against the deep black hole attack. Deep black hole is an extended black hole attack that advertises fake RREQ in response to received RREQ as well as overheard RREPs. In this present work, a hybrid mechanism is presented that will perform the detection as well as the prevention to these kind of attacks. Our work is performed in two phases: first, setting criteria for such nodes and secondly, to perform communication along a safer path. NS2 is used for simulation and evaluation of the network parameters.

References
  1. Yih-chun huand Adrian Perrig, David. B. Jhonson "Ariadne: A Secure On-Dem-and Routing Protocol for Ad Hoc Networks" 2005 Springer Science+ Business Media, Inc. Manufactured in The Netherlands.
  2. A. Perrig, R. Canetti, D. Song and J. D. Tygar, Efficient and secure source authentication for multicast, in: Proceedings of the Network and Distributed System Security Symposium, NDSS'01 (February 2001) p. 35–46.
  3. C. E. Perkins (Ed. ), Ad Hoc Networking, Addison-Wesley Longman, 2000.
  4. A. Perrig, R. Canetti, J. D. Tygar and D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: Proceedings of the IEEE Symposium on Security and Privacy (May 2000) pp. 56–73.
  5. Ani1 Rawat, P. D. Vyavahare, A. K Ramani, "Evaluation of Rushing Attack on Secured Message Transmission (SMT/SRP)protocol for Mobile Ad Hoc Networks", 0-7803-8964- 6/05/$20. M1 Q z IEEE.
  6. Huabing Yang, Xingyuan Zhang, and Yuanyuan Wang "A Correctness Proof of the SRP Protocol" 1L-4244-0054-6/06/$20. 00 ©2006 IEEE
  7. Shayan Ghazizadeh, Okhtay Ilghami, Evren Sirin, Fusun Yaman "Security Aware Adaptive Dynamic Source Routing Protocol" Proceedings of the 27th Annual IEEE conference on Local Computer Networks (LCN. 02) 0742-1303/02 $17. 00 © 2002 IEEE
  8. Djamel Djenouril, Othmane Mahmoudil, Mohamed Bouamamal, David Llewellyn-Jones, and Madjid Merabti "On Securing MANET Routing Protocol Against Control Packet Dropping" 1-4244-1326-51071$25. OOI©B2007 IEEE.
  9. A. F. A. Abidin, N. S. M. Usop "An Analysis on Endaira: A Provably Secure On-Demand Source Routing Protocol" A. F. A. Abidin et al. / (IJCSE) international Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, 437-442
  10. David B. Johnson, "Routing in Ad Hoc Networks of Mobile Hosts". In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, pages158-163, December 1994.
  11. P. Papadimitratos and Z. J. Haas, "Secure message transmission in mobile Ad hoc Networks", Elsevier Ad Hoc Networks Journal, vol. 1, no. 1, pp. 193-209, July 2003.
  12. S R Afzal, Subir Biswas, J. B Koh, Taqi Raza, Gunhee Lee, and Dong-kyoo Kim, "RSRP: A Robust Secure Routing Protocol for Mobile Ad hoc Networks" 1525-3511/08/$25. 00 ©2008 IEEE.
  13. V. Ramesh, Dr. P. Subbaiah, N. Sandeep and C. P. Bhaktavastalam, "Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive DSR for Secured Route Discovery", international Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol. 1, No. 3, September 2010.
  14. Abdalla Mahmoud, Ahmed Sameh Sherif El-Kassas" Reputed Authenticated Routing for Ad Hoc Networks Protocol (Reputed-ARAN)" 0-7803-9466-6/05/$20. 00 ©2005 IEEE
  15. Davide Benetti Massimo Merro Luca Vigan`o "Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA" 978-0-7695-4153 -2/10 $26. 00 © 2010 IEEE DOI 10. 1109/SEFM. 2010. 24
  16. José Luis Tornos, Joan Josep Piles and José Luis Salazar "DSR: Authenticated DSR" 2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS) 978-1-4577-1891 5/11/$26. 00 ©2011 IEEE
  17. Ajay Jangra, Shalini "e-ARAN: Enhanced Authenticated Routing for Ad Hoc Networks to handle Selfish Nodes" IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012
  18. R. Sudha, S. Lecturer, CSE, Dr. D. Sivakumar "A Temporal table Authenticated Routing Protocol for Ad hoc networks" 978-1-4577-18946/11/$26. 00©2011 IEEE
  19. Seema Mehla et. al. / (IJCSE) International Journal on Computer Science and EngineeringVol. 02, No. 03, 2010, 664-668
  20. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks". Proceedings of MOBICOM, August 2000.
  21. S. Bansal and M. Baker. Observation-based Cooperation Enforcement in Ad Hoc Networks. http://arxiv. org/pdf/cs. NI/0307012,July 2003
  22. Mahmood Salehi, Hamed Samavati and Mehdi Dehghan, "Evaluation of DSR Protocol under a New Black hole Attack", 20th Iranian Conference on Electrical Engineering, (lCEE2012), May 15-17,2012, Tehran, Iran, 978-1-4673-1148-9/12/$31. 00©2012IEEE
  23. Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi and Mohammad S. Obaidat, "Detecting Blackhole Attacks on DSR-based Mobile Ad Hoc Networks" 978-1-4673-1550-0/12/$31. 00 ©2012 IEEE
Index Terms

Computer Science
Information Sciences

Keywords

MANET DSR routing protocol deep black hole attack