Skip to main content
Erschienen in: Wireless Networks 5/2016

01.07.2016

A modified algorithm to improve security and performance of AODV protocol against black hole attack

verfasst von: Sina Shahabi, Mahdieh Ghazvini, Mehdi Bakhtiarian

Erschienen in: Wireless Networks | Ausgabe 5/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Ad Hoc network is a temporal network which is managed by autonomous nodes which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes’ behaviours and loss of specific offensive lines, this type of networks is not supportive against malicious nodes’ attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This article suggests a new algorithm which enhances the security of AODV routing protocol to encounter the black hole attacks. This algorithm tries to identify malicious nodes according to nodes’ behaviours in an Ad Hoc network and delete them from routing. The suggested algorithm is simulated by NS2. The simulation results show some improvements in end-to-end delay and packet delivery rate in the suggested algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nguyen, H. L., & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6, 32–46.CrossRef Nguyen, H. L., & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6, 32–46.CrossRef
2.
Zurück zum Zitat Lima, M. N., dos Santos, A. L., & Pujolle, G. (2009). A survey of survivability in mobile ad hoc networks. Communications Surveys & Tutorials, IEEE, 11(1), 66–77.CrossRef Lima, M. N., dos Santos, A. L., & Pujolle, G. (2009). A survey of survivability in mobile ad hoc networks. Communications Surveys & Tutorials, IEEE, 11(1), 66–77.CrossRef
3.
Zurück zum Zitat Ebinger, P., & Parsons, M. (2009). Measuring the impact of attacks on the performance of mobile ad hoc networks. In Proceedings of the 6th ACM symposium on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, Tenerife, Canary Islands, Spain (pp. 163–164). Ebinger, P., & Parsons, M. (2009). Measuring the impact of attacks on the performance of mobile ad hoc networks. In Proceedings of the 6th ACM symposium on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, Tenerife, Canary Islands, Spain (pp. 163–164).
4.
Zurück zum Zitat Liu, X. J. H., Wan, P., & Liu, X. (2007). A distributed and efficient flooding scheme using 1-hop information in mobile adhoc networks. IET Journals & Magazines, 18, 658–671. Liu, X. J. H., Wan, P., & Liu, X. (2007). A distributed and efficient flooding scheme using 1-hop information in mobile adhoc networks. IET Journals & Magazines, 18, 658–671.
5.
Zurück zum Zitat Maurya, P. K., Sharma, G., Sahu, V., Roberts, A., Srivastava, M., Scholar, M., et al. (2012). An overview of AODV routing protocol. International Journal of Modern Engineering Research (IJMER), 2, 728–732. Maurya, P. K., Sharma, G., Sahu, V., Roberts, A., Srivastava, M., Scholar, M., et al. (2012). An overview of AODV routing protocol. International Journal of Modern Engineering Research (IJMER), 2, 728–732.
6.
Zurück zum Zitat Chhabra, M., Gupta, B., & Almomani, A. (2013). A novel solution to handle DDOS attack in MANET. Journal of Information Security, 4(3), 165–179.CrossRef Chhabra, M., Gupta, B., & Almomani, A. (2013). A novel solution to handle DDOS attack in MANET. Journal of Information Security, 4(3), 165–179.CrossRef
7.
Zurück zum Zitat Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security, 5, 338–346. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security, 5, 338–346.
8.
Zurück zum Zitat Jamali, S. B. S. (2015). A survey over black hole attack detection in mobile ad hoc network. International Journal of Computer Science and Network Security (IJCSNS), 15, 44. Jamali, S. B. S. (2015). A survey over black hole attack detection in mobile ad hoc network. International Journal of Computer Science and Network Security (IJCSNS), 15, 44.
9.
Zurück zum Zitat Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18, 1234–1247.CrossRef Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18, 1234–1247.CrossRef
10.
Zurück zum Zitat Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: disclosing the locations of IP spoofers from path backscatter. Information Forensics and Security, IEEE Transactions on, 10, 471–484.CrossRef Yao, G., Bi, J., & Vasilakos, A. V. (2015). Passive IP traceback: disclosing the locations of IP spoofers from path backscatter. Information Forensics and Security, IEEE Transactions on, 10, 471–484.CrossRef
11.
Zurück zum Zitat Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
12.
Zurück zum Zitat Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. Information Forensics and Security, IEEE Transactions on, 9, 436–450.CrossRef Liu, B., Bi, J., & Vasilakos, A. V. (2014). Toward incentivizing anti-spoofing deployment. Information Forensics and Security, IEEE Transactions on, 9, 436–450.CrossRef
13.
Zurück zum Zitat Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20, 2481–2501.CrossRef Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20, 2481–2501.CrossRef
14.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software‐defined networking. Security and Communication Networks, 8(13). doi:10.1002/sec.1243. Yan, Z., Zhang, P., & Vasilakos, A. V. (2015). A security and trust framework for virtualized networks and software‐defined networking. Security and Communication Networks, 8(13). doi:10.​1002/​sec.​1243.
15.
Zurück zum Zitat Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100, 3172–3186.CrossRef Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100, 3172–3186.CrossRef
16.
Zurück zum Zitat Nagrath, P., Aneja, S., Gupta, N., & Madria, S. (2015). Protocols for mitigating blackhole attacks in delay tolerant networks. Wireless Networks, 21(2), 1–12. doi:10.1007/s11276-015-0959-3. Nagrath, P., Aneja, S., Gupta, N., & Madria, S. (2015). Protocols for mitigating blackhole attacks in delay tolerant networks. Wireless Networks, 21(2), 1–12. doi:10.​1007/​s11276-015-0959-3.
17.
Zurück zum Zitat Changela, H., & Lathigara, A. (2015). A survey on different existing technique for detection of black hole attack in MANETs. International Journal of Science and Research (IJSR), 4(1), 415–419. Changela, H., & Lathigara, A. (2015). A survey on different existing technique for detection of black hole attack in MANETs. International Journal of Science and Research (IJSR), 4(1), 415–419.
18.
Zurück zum Zitat Abdelshafy, M. A., & King, P. J. B. (2014). AODV and SAODV under attack: Performance comparison. In Ad hoc, Mobile, and Wireless Networks, Springer International Publishing (pp. 318–331). Abdelshafy, M. A., & King, P. J. B. (2014). AODV and SAODV under attack: Performance comparison. In Ad hoc, Mobile, and Wireless Networks, Springer International Publishing (pp. 318–331).
19.
Zurück zum Zitat Abdelshafy, M. A., & King, P. J. (2014). Resisting flooding attacks on AODV. SECURWARE, 2014, 25. Abdelshafy, M. A., & King, P. J. (2014). Resisting flooding attacks on AODV. SECURWARE, 2014, 25.
20.
Zurück zum Zitat Tamilselvan, L., & Sankaranarayanan, V. (2008). Prevention of co-operative black hole attack in MANET. Journal of Networks, 3, 13–20.CrossRef Tamilselvan, L., & Sankaranarayanan, V. (2008). Prevention of co-operative black hole attack in MANET. Journal of Networks, 3, 13–20.CrossRef
21.
Zurück zum Zitat Ramaswamy, S., Fu, H., & Sreekantaradhya, M., Dixon, J., & Nygard, K. E. (2003). Prevention of cooperative black hole attack in wireless ad hoc networks. In International conference on wireless networks. Ramaswamy, S., Fu, H., & Sreekantaradhya, M., Dixon, J., & Nygard, K. E. (2003). Prevention of cooperative black hole attack in wireless ad hoc networks. In International conference on wireless networks.
22.
Zurück zum Zitat Hesiri Weerasinghe, H. W., & Huirong Fu, H. F. (2008). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In International journal of software engineering and its applications (IJSEIA) (Vol. 2, pp. 39–54). Hesiri Weerasinghe, H. W., & Huirong Fu, H. F. (2008). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In International journal of software engineering and its applications (IJSEIA) (Vol. 2, pp. 39–54).
23.
Zurück zum Zitat Ioannis, K., Dimitriou, T., & Freiling, F. C. (2007). Towards intrusion detection in wireless sensor networks. In Proceedings of the 13th European wireless conference. Ioannis, K., Dimitriou, T., & Freiling, F. C. (2007). Towards intrusion detection in wireless sensor networks. In Proceedings of the 13th European wireless conference.
24.
Zurück zum Zitat Su, M. Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34, 107–117.CrossRef Su, M. Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34, 107–117.CrossRef
25.
Zurück zum Zitat Khemariya, N., & Khuntetha, A. (2013). An efficient algorithm for detection of blackhole attack in AODV based MANETs. International Journal of Computer Applications, 66(18), 18–24. Khemariya, N., & Khuntetha, A. (2013). An efficient algorithm for detection of blackhole attack in AODV based MANETs. International Journal of Computer Applications, 66(18), 18–24.
26.
Zurück zum Zitat Araghi, T. K., Zamani, M., Manaf, A. B. A., Abdullah, S. M., Bojnord, H. S., & Araghi, S. K. (2013). A secure model for prevention of black hole attack in wireless mobile ad hoc networks. In 12th WSEAS international conference on applied computer and applied computational science, Malaysia. Araghi, T. K., Zamani, M., Manaf, A. B. A., Abdullah, S. M., Bojnord, H. S., & Araghi, S. K. (2013). A secure model for prevention of black hole attack in wireless mobile ad hoc networks. In 12th WSEAS international conference on applied computer and applied computational science, Malaysia.
27.
Zurück zum Zitat Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with black hole attack in AODV routing protocol. In Communications (MICC), 2009 IEEE 9th Malaysia international conference on, IEEE (pp. 530–535). Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with black hole attack in AODV routing protocol. In Communications (MICC), 2009 IEEE 9th Malaysia international conference on, IEEE (pp. 530–535).
28.
Zurück zum Zitat Choudhary, N., & Tharani, L. (2015). Preventing black hole attack in AODV using timer-based detection mechanism. In Signal processing and communication engineering systems (SPACES), 2015 international conference on (pp. 1–4). Choudhary, N., & Tharani, L. (2015). Preventing black hole attack in AODV using timer-based detection mechanism. In Signal processing and communication engineering systems (SPACES), 2015 international conference on (pp. 1–4).
29.
Zurück zum Zitat Ahmad, S. J., Reddy, V., Damodaram, A., & Krishna, P. R. (2015). Detection of black hole attack using code division security method. In Emerging ICT for bridging the future-proceedings of the 49th annual convention of the computer society of india CSI volume 2 (pp. 307–314). Ahmad, S. J., Reddy, V., Damodaram, A., & Krishna, P. R. (2015). Detection of black hole attack using code division security method. In Emerging ICT for bridging the future-proceedings of the 49th annual convention of the computer society of india CSI volume 2 (pp. 307–314).
30.
Zurück zum Zitat Nandini, N., & Aggarwal, R. (2015). Prevention of black hole attack by different methods in MANET. Network, 4, 297–300. Nandini, N., & Aggarwal, R. (2015). Prevention of black hole attack by different methods in MANET. Network, 4, 297–300.
31.
Zurück zum Zitat Mandala, S., Jenni, K., Ngadi, M. A., Kamat, M., & Coulibaly, Y. (2014). Quantifying the severity of blackhole attack in wireless mobile adhoc networks. In Security in computing and communications, Springer (pp. 57–67). Mandala, S., Jenni, K., Ngadi, M. A., Kamat, M., & Coulibaly, Y. (2014). Quantifying the severity of blackhole attack in wireless mobile adhoc networks. In Security in computing and communications, Springer (pp. 57–67).
32.
Zurück zum Zitat Gao, H., Wu, R., Cao, M., & Zhang, C. (2014). Detection and defense technology of blackhole attacks in wireless sensor network. In Algorithms and architectures for parallel processing, Springer (pp. 601–610). Gao, H., Wu, R., Cao, M., & Zhang, C. (2014). Detection and defense technology of blackhole attacks in wireless sensor network. In Algorithms and architectures for parallel processing, Springer (pp. 601–610).
33.
Zurück zum Zitat Jaisankar, N., Saravanan, R., & Swamy, K. D. (2010). A novel security approach for detecting black hole attack in MANET. In Information processing and management, Springer (pp. 217–223). Jaisankar, N., Saravanan, R., & Swamy, K. D. (2010). A novel security approach for detecting black hole attack in MANET. In Information processing and management, Springer (pp. 217–223).
34.
Zurück zum Zitat Jain, A. K., & Tokekar, V. (2015). Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In Pervasive computing (ICPC), 2015 international conference on (pp. 1–6). Jain, A. K., & Tokekar, V. (2015). Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In Pervasive computing (ICPC), 2015 international conference on (pp. 1–6).
35.
Zurück zum Zitat Shi, F., Liu, W., Jin, D., & Song, J. (2014). A cluster-based countermeasure against blackhole attacks in MANETs. Telecommunication Systems, 57, 119–136.CrossRef Shi, F., Liu, W., Jin, D., & Song, J. (2014). A cluster-based countermeasure against blackhole attacks in MANETs. Telecommunication Systems, 57, 119–136.CrossRef
36.
Zurück zum Zitat Rashmi, A. S. (2014). Detection and prevention of black-hole attack in MANETS. International Journal of Computer Science Trends and Technology (IJCST)-Volume, 2, 204–209. Rashmi, A. S. (2014). Detection and prevention of black-hole attack in MANETS. International Journal of Computer Science Trends and Technology (IJCST)-Volume, 2, 204–209.
37.
Zurück zum Zitat Tseng, F.-H., Chou, L.-D., & Chao, H.-C. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-Centric Computing and Information Sciences, 1, 1–16.CrossRef Tseng, F.-H., Chou, L.-D., & Chao, H.-C. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-Centric Computing and Information Sciences, 1, 1–16.CrossRef
38.
Zurück zum Zitat Jain, S., & Khunteta, A. (2015). Detection techniques of blackhole attack in mobile adhoc network: A survey. In Proceedings of the 2015 international conference on advanced research in computer science engineering & technology (ICARCSET 2015) (p. 47). Jain, S., & Khunteta, A. (2015). Detection techniques of blackhole attack in mobile adhoc network: A survey. In Proceedings of the 2015 international conference on advanced research in computer science engineering & technology (ICARCSET 2015) (p. 47).
39.
Zurück zum Zitat Medadian, M., Fardad, K., & Barazandeh, I. (2011). Discovered and removed a mass black hole attacks on mobile networks ad hoc. In 1st national conference on soft computing and information technology, Iran. Medadian, M., Fardad, K., & Barazandeh, I. (2011). Discovered and removed a mass black hole attacks on mobile networks ad hoc. In 1st national conference on soft computing and information technology, Iran.
40.
Zurück zum Zitat Rezaei, R., Medadian, M., & Darvishi, M. (2014). Provide a way to deal with attacks on black holes in wireless networks case: The behavior of nodes. In National conference on computer engineering and information technology management, Iran. Rezaei, R., Medadian, M., & Darvishi, M. (2014). Provide a way to deal with attacks on black holes in wireless networks case: The behavior of nodes. In National conference on computer engineering and information technology management, Iran.
Metadaten
Titel
A modified algorithm to improve security and performance of AODV protocol against black hole attack
verfasst von
Sina Shahabi
Mahdieh Ghazvini
Mehdi Bakhtiarian
Publikationsdatum
01.07.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 5/2016
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-1032-y

Weitere Artikel der Ausgabe 5/2016

Wireless Networks 5/2016 Zur Ausgabe

Neuer Inhalt