Secure route discovery in AODV in presence of blackhole attack

Springer Science and Business Media LLC - Tập 3 - Trang 91-98 - 2016
Jaspal Kumar1, M. Kulkarni2, Daya Gupta3, S. Indu4
1Panipat Institute of Engineering and Technology, Panipat, India
2National Institute of Technology, Surathkal, India
3Delhi College of Engineering, University of Delhi, New Delhi, India
4Delhi Technological University, New Delhi, India

Tóm tắt

In recent years, there has been tremendous increase in mobile adhoc networks applications ranging from military and rescue operations to collaborative and distributed computing, therefore secure data transmission has become one of the critical issue in MANET. A mobile adhoc network is genrally established without relying on centralized and dedicated servers. Attackers exploit the loopholes of route discovery process to carry out their malicious intent as it is an inevitable process in reactive protocols. Blackhole is one such popular attack that sends forged routing information to fool source node and drops all the data packets after introducing itself in the route between source node to destination. In this paper, damage caused to AODV in presence of blackhole node has been evaluated and solution to defend against blackhole attack has been proposed and simulated on Ns-2 to prove its efficiency and reliability. The packet processing technique of normal AODV is enhanced to detect routing misbehavior and alert other nodes using default AODV control message, HELLO messages to reduce additional overhead.

Tài liệu tham khảo

Kumar MJ, Rajesh RS (2009) Performance analysis of MANET routing protocols in different mobility models. Proc Int J Comput Sci Netw Secur IJCSNS 9(2):22–29 Boukerche A, Turgut B, Aydin N, Ahmad MZ, Boloni L, Turgut D (2011) Routing protocols in ad hoc networks: a survey. Comput Netw 55(13):3032–3080 Carvalho and Marco (2008) Security in mobile ad hoc networks. Secur Priv IEEE 6(2):72–75 Bhatia T, Verma AK (2013) Security issues in MANET: a survey on attacks and defense mechanisms. Int J Adv Res Comput Sci Softw Eng 3(6):1382–1394 Jhaveri RH, Patel SJ, Jinwala DC (2012) Dos attacks in mobile ad hoc networks: a survey. In: 2012 second international conference on advanced computing and communication technologies (ACCT), IEEE, pp 535–541 Dong D, Li M, Liu Y, Li XY, Liao X (2011) Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Trans Netw 19(6):1787–1796 Sharma G, Bala S, Verma AK, Tej S (2010) Security in wireless sensor networks using frequency hopping. Int J Comput Appl (0975–8887) 12(6):1–5 Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of 6th annual international conference on mobile computing and networking, pp 255–265 Alem YF, Xuan ZC (2010) Preventing black hole attack in mobile ad-hoc networks using anomaly detection. In: 2010 2nd international conference on future computer and communication (ICFCC), vol 3, 21–24 May 2010, pp V3-672–V3-676 Himral L, Vig V, Chand N (2011) Preventing AODV routing protocol from black hole attack. Int J Eng Sci Technol 3(5):3927–3932 Tamilselvan L, Sankaranarayanan V (2007) Prevention of blackhole attack in MANET. Paper presented at the 2nd international conference on wireless broadband and ultra wideband communications, Sydney, Australia, 27–30 Aug 2007 Kozma W, Lazos L (2009) REAct: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. Paper presented at the second ACM conference on wireless network security, Zurich, Switzerland, 16–18 Mar 2009 Min Z, Jiliu Z (2009) Cooperative black hole attack prevention for mobile ad hoc networks. In: International symposium on information engineering and electronic commerce, IEEC ‘09, 16–17 May 2009, pp 26–30 Su M-Y (2011) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34(1):107–117 Perkins C, Royer E, Das S (2003) Ad hoc on-demand distance vector (AODV) routing. In: IETF, RFC 3561 Kumar S, Sharma SC, Suman B (2011) Classification and evaluation of mobility metrics for mobility model movement patterns in mobile ad-hoc networks. Int J Appl Graph Theory Wirel Ad Hoc Netw Sens Netw 3(3):25 Usha and Bose (2012) Understanding black hole attack in MANET. Eur J Sci Res 83(3):383–396 Madhusudhananagakumar KS, Aghila G (2011) A survey on black hole attacks on AODV Protocol in MANET. Int J Comput Appl 34(5):23–30 Fall K, Varadhan K (eds) (2013) ns notes and documentation, 1999. Accessed on 14 Mar 2013 Camp T, Boleng J, Davies V (2002) A survey of mobility models for ad hoc network research. Wirel Commun Mob Comput Spec Issue Mobile Ad Hoc Netw Res Trends Appl 2(5):483–502