Prevention of Co-operative Black Hole Attack in MANET

نویسندگان

  • Latha Tamilselvan
  • V. Sankaranarayanan
چکیده

A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc On demand Distance Vector) protocol. The security of the AODV protocol is compromised by a particular type of attack called ‘Black Hole’ attack [1]. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. To reduce the probability it is proposed to wait and check the replies from all the neighboring nodes to find a safe route. Our approach to combat the Black hole attack is to make use of a ‘Fidelity Table’ wherein every participating node will be assigned a fidelity level that acts as a measure of reliability of that node. In case the level of any node drops to 0, it is considered to be a malicious node, termed as a ‘Black hole’ and is eliminated. Computer simulation using GLOMOSIM shows that our protocol provides better security and also better performance in terms of packet delivery than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead. Index Terms Ad hoc Networks, Routing Protocols, AODV, Black Hole Attack, fidelity level.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Black Hole Detection and Prevention in MANET

Mobile ad hoc network (MANET) is a self-implemented network of mobile nodes formed anytime and anywhere without the help of a centralized management. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared to wired network or infrastructure-based wi...

متن کامل

ADAPTIVE METHOD FOR DETECTION AND PREVENTION OF COOPERATIVE BLACK HOLE ATTACK IN MANETs

The Mobile adhoc networks (MANETs) networks that are defined as the wireless self configuring networks that are capable of operating without the support of any fixed infrastructure and a central coordinator which makes the routing a complicated task. One of the main challenges in MANET is to design robust security solution that can protect MANET from various routing attacks. MANET is vulnerable...

متن کامل

BHAPSC: A New Black Hole Attack Prevention System in Clustered MANET

Black hole attack is one kind of routing disturbing attacks and can bring great damage to all clusters of a MANET. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, and infrastructure-less property. As a result, an efficient algorithm to detect black hole attack is important. This paper proposes and evaluates strategies ...

متن کامل

A Survey on Detection and Prevention Techniques for Gray-Hole Attack in MANET

Mobile Ad Hoc Network (MANET) is a kind of wireless ad hoc network. It is a self-managed network of mobile routers connected by wireless links with no access point. Every mobile device or node in a network is independently controlled in autonomous mode. The mobile devices are free to move randomly and organize themselves arbitrarily. The wireless ad-hoc network is particularly vulnerable due to...

متن کامل

Prevention of Black Hole Attack in Manet Using Genetic Algorithm

ABSTRACT Recently, Wireless ad hoc networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Network Early work in MANET research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resourceconstrained network. At present, several efficient routing protocols have be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2008