ADAPTIVE METHOD FOR DETECTION AND PREVENTION OF COOPERATIVE BLACK HOLE ATTACK IN MANETs

نویسنده

  • P. S. HIREMATH
چکیده

The Mobile adhoc networks (MANETs) networks that are defined as the wireless self configuring networks that are capable of operating without the support of any fixed infrastructure and a central coordinator which makes the routing a complicated task. One of the main challenges in MANET is to design robust security solution that can protect MANET from various routing attacks. MANET is vulnerable to different types of attacks such as black hole, sybill attack, wormhole attack, gray hole attack and so on. Among them black hole is considered to be a major attack which affects the entire network performance based on routing, packet delivery ratio, throughput and end to end delay of packets. The communication takes place between two parties by sharing their information like from-node to nexthop-node’s information. In this paper, an adaptive method for detection and prevention of black hole attack in a MANET is proposed based on Data Access Table (DAT), which is an array [ ] [ ] that maintains from-node to nexthop-node’s information. We choose AODV as routing protocol and NS2 as simulator tool. The results are compared with threshold based algorithm for detection and prevention of cooperative black hole attack in a MANET. The adaptive method gives better performance than the threshold based algorithm, in terms of throughput, packet delivery ratio and end-to-end delay.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Comparison of Cluster based and Threshold based Algorithms for Detection and Prevention of Cooperative Black Hole Attack in MANETs

-------------------------------------------------------------------ABSTRACT-------------------------------------------------------------In mobile ad-hoc networks (MANET), the movement of the nodes may quickly change the networks topology resulting in the increase of the overhead message in topology maintenance. The nodes communicate with each other by exchanging the hello packet and constructin...

متن کامل

Protection of MANETs from a range of attacks using an intrusion detection and prevention system

Mobile ad hoc networks (MANETs) are well known to be vulnerable to various attacks due to their lack of centralized control, and their dynamic topology and energy-constrained operation. Much research in securing MANETs has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole, rushing or sybil attacks. In this paper we propose a...

متن کامل

A study of Black Hole Attack and its Recent Prevention Techniques in MANET

A mobile ad hoc network (MANETs) is a self-organizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. MANETs nodes can communicate directly if they are in each other transmission range; else the relay nodes are forwarding the packets to neighbors or receivers. This connec...

متن کامل

A Novel Approach for Preventing Black-Hole Attack in MANETs

A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes, which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the detection and prevention of black-hole attack in MANETs. In this approach every member of t...

متن کامل

An Implementation of Black hole Detection and Prevention Method using AODV Routing Protocol in MANET Environment

Network security is a pathetic link in wired and wireless network systems. A mobile ad hoc network (MANET) is a compilation of self-sufficient nodes that converse with every further by forming a multi-hop radio network and maintaining associations in a decentralized manner. Security remains a main challenge for these networks owing to their features of open medium, animatedly changing topologie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015