GNB-AODV: Guard Node Based –AODV to Mitigate Black Hole Attack in MANET

نویسندگان

  • A. R. Rajeswari
  • K. Kulothungan
  • A. Kannan
چکیده

In multi-hop wireless ad hoc network, the packets are transmitted through intermediate nodes to reach the destination. In this topological structure, there is no centralized co-ordinating, monitoring or control point. Due to this type of network environment, an intermediate node can act as either selfish or malicious to drop packets. The primary objective of such an untrustworthy behavior of the node is to preserve its own resource such as energy. In this paper, Guard Node Based Ad hoc On Demand Distance Vector Routing scheme has been proposed to detect and prevent the black hole attack on AODV, in Mobile Ad hoc networks. A black hole attack refers to an attack by a malicious node, which forcibly acquire the route from a source to a destination by the falsification of the sequence number and hop count of the routing message. In the proposed system, fixed guard nodes are deployed in the network environment to mitigate black hole attack. These guard nodes are set in promiscuous mode to listen about the transmission within its transmission range. This also calculates the Trust Value of a node, depending upon the abnormal difference between the routing packets transmitted from the node. If the trust value falls below the specified range, guard node will broadcast an alert message, informing all the nodes in the network to isolate the malicious node. The performance and effectiveness of the proposed system outperform the existing protocol in terms of Packet Delivery Ratio, Throughput and Delay.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Black Hole Detection in MANET Using AODV Routing Protocol

Mobile Ad-hoc network (MANET) has become an individual part for communication for mobile device. Therefore, interest in research of Mobile Ad-hoc network has been growing since last few years. Due to the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and lack of management point Mobile Ad-hoc network are highly vulnerable to security attacks compared ...

متن کامل

Detection and Removal of Gray, Black and Cooperative Black Hole Attacks in AODV Technique

Mobile ad hoc network (MANET) is an autonomous self-configuring infrastructure-less wireless network. MANET is vulnerable to a lot of routing security threats due to unreliability of its nodes that are highly involved in the routing process. In this paper, a new technique is proposed to enhance the security of one of the most popular MANET routing protocols that is called Ad hoc on Demand Dista...

متن کامل

Secure Video Transmission Against Black Hole Attack in MANETs

Mobile Adhoc Networks (MANETs) are open to a wide range of attacks due to their unique characteristics like dynamic topology, shared medium, absence of infrastructure, and resource constraints. Data packets sent by a source node may reach destination through a number of intermediate nodes. In the absence of security mechanism, it is easy for an intermediate node to intercept or modify the messa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016