Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Security in mobile ad hoc network (MANET) is one of the key challenges due to its special features e.g. hop-by-hop communications, dynamic topology, and open network boundary that received tremendous attention by scholars. Traditional security methods are not applicable in MANET due to its special properties. In this paper, a novel approach called detecting and eliminating black holes (DEBH) is proposed that uses a data control packet and an additional black hole check table for detecting and eliminating malicious nodes. Benefiting from trustable nodes, the processing overhead of the security method decreases by passing time. Ad hoc on-demand distance vector (AODV) routing protocol is used as the routing protocol in our design. After finding the freshest path using AODV, our design checks the safety of selected path. In case of detecting any malicious node, it is isolated from the entire network by broadcasting a packet that contains the ID of malicious nodes. Simulation results show that DEBH increases network throughput and decreases packet overhead and delay in comparison with other studied approaches. Moreover, DEBH is able to detect all active malicious nodes which generates fault routing information.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63, 4647–4658. CrossRef
Zehua, W., Yuanzhu, C., & Cheng, L. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 859–868. CrossRef
Dorri, Ali, & Kamel, Seyed Reza. (2015). A fuzzy congestion controller to detect and balance congestion in WSN. International Journal of Wireless & Mobile Networks, 7(1), 137. CrossRef
Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15, 2027–2045. CrossRef
Dorri, A., Kamel, R., & Kheyrkhah, E. (2014). An analyses in security challenges in mobile ad hoc network. Presented at the sixth international conference on Wireless and Mobile networks (WiMoNe 2014).
Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: A survey. International Journal of Computer Science and Engineering Survey (IJCSES), 6(1), 15–29. CrossRef
Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4, 212–232. CrossRef
Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Third international conference on advanced computing and communication technologies (ACCT), 2013 (pp. 254–260).
Kalwar, S. (2010). Introduction to reactive protocol. IEEE Potentials, 29, 34–35. CrossRef
Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile ad hoc routing protocols. IEEE Communications Surveys & Tutorials, 10, 78–93. CrossRef
Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538. CrossRef
Kamatchi, V., Mukesh, R., & Rajakumar, (2013). Securing data from black hole attack using AODV routing for mobile ad hoc networks. In N. Meghanathan, D. Nagamalai, & N. Chaki (Eds.), Advances in computing and information technology (Vol. 177, pp. 365–373). Berlin: Springer. CrossRef
Banerjee, S., Sardar, M., & Majumder, K. (2014). AODV based black-hole attack mitigation in MANET. In S. C. Satapathy, S. K. Udgata, & B. N. Biswal (Eds.), Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA) 2013 (Vol. 247, pp. 345–352). Berlin: Springer International Publishing. CrossRef
Lo, N.-W., & Liu, F.-L. (2013). A secure routing protocol to prevent cooperative black hole attack in MANET. In J. Juang & Y.-C. Huang (Eds.), Intelligent technologies and engineering systems (Vol. 234, pp. 59–65). New York: Springer. CrossRef
Jaisankar, N., Saravanan, R., & Swamy, K. D. (2010). A novel security approach for detecting black hole attack in MANET. In V. Das, R. Vijayakumar, N. Debnath, J. Stephen, N. Meghanathan, S. Sankaranarayanan, et al. (Eds.), Information processing and management (Vol. 70, pp. 217–223). Berlin: Springer. CrossRef
Dorri, A., & Nikdel, H. (2013). A new approach for detecting and eliminating cooperative black hole nodes in MANET. Presented at the 7th international conference on information and knowledge technology, Urima.
Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014) Prevention of black hole attack in AODV routing algorithm of MANET using trust based computing. International Journal of Computer Science and Information Technologies, 5, 3254–3258.
Chhari, V., Singh, R., & Dhakad, S. S. (2014). Enhanced and more secure AODV routing protocol to avoid black hole attack in MANET. IJCSNT.
Varshney, T., Sharma, T., & Sharma, P. (2014). Implementation of watchdog protocol with AODV in mobile ad hoc network. In Fourth international conference on communication systems and network technologies (CSNT), 2014 (pp. 217–221).
- DEBH: detecting and eliminating black holes in mobile ad hoc network
- Springer US
Neuer Inhalt/© Filograph | Getty Images | iStock