Skip to main content
Top
Published in: Wireless Networks 6/2017

23-03-2016

An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET

Author: Ali Dorri

Published in: Wireless Networks | Issue 6/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile Ad hoc Network (MANET) is a self-configurable, self-maintenance network with wireless, mobile nodes. Special features of MANET like dynamic topology, hop-by-hop communications and open network boundary, made security highly challengeable in this network. From security aspect, routing protocols are highly vulnerable against a wide range of attacks like black hole. In black hole attack malicious node injects fault routing information to the network and leads all data packets toward it-self. In this paper, we proposed an approach to detect and eliminate cooperative malicious nodes in MANET with AODV routing protocol. A data control packet is used in order to check the nodes in selected path; also, by using an Extended Data Routing Information table, all malicious nodes in selected path are detected, then, eliminated from network. For evaluation, our approach and a previous work have been implemented using Opnet 14 in different scenarios. Referring to simulation results, the proposed approach decreases packet overhead and delay of security mechanism with no false positive detection. In addition, network throughput is improved by using the proposed approach.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kies, A., Mehar, S., Rodwane, B., & Maaza, Z. M. (2012). Self-organization framework for mobile ad hoc networks. In 8th international wireless communications and mobile computing conference (IWCMC). Kies, A., Mehar, S., Rodwane, B., & Maaza, Z. M. (2012). Self-organization framework for mobile ad hoc networks. In 8th international wireless communications and mobile computing conference (IWCMC).
2.
go back to reference Kaur, T., Toor, A. S., & Saluja, K. K. (2014). Defending MANETs against flooding attacks for military applications under group mobility. Engineering and Computational Sciences (RAECS), 2014 Recent Advances in IEEE (pp. 1–6). Chandigarh. doi:10.1109/RAECS.2014.6799499. Kaur, T., Toor, A. S., & Saluja, K. K. (2014). Defending MANETs against flooding attacks for military applications under group mobility. Engineering and Computational Sciences (RAECS), 2014 Recent Advances in IEEE (pp. 1–6). Chandigarh. doi:10.​1109/​RAECS.​2014.​6799499.
3.
go back to reference Zehua, W., Yuanzhu, C., & Cheng, L. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 859–868.CrossRef Zehua, W., Yuanzhu, C., & Cheng, L. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 859–868.CrossRef
4.
go back to reference Zahidi, S. Z. H., Aloul, F., Sagahyroon, A., & El-Hajj, W. (2013). Optimizing complex cluster formation in MANETs using SAT/ILP techniques. IEEE Sensors Journal, 13, 2400–2412.CrossRef Zahidi, S. Z. H., Aloul, F., Sagahyroon, A., & El-Hajj, W. (2013). Optimizing complex cluster formation in MANETs using SAT/ILP techniques. IEEE Sensors Journal, 13, 2400–2412.CrossRef
5.
go back to reference Dorri, A., & Nikdel, H. (2015). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In 7th conference on information and knowledge technology (IKT), (pp. 1–6). 26. Dorri, A., & Nikdel, H. (2015). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In 7th conference on information and knowledge technology (IKT), (pp. 1–6). 26.
6.
go back to reference Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). DoS attacks in mobile ad hoc networks: A survey. In Second international conference on advanced computing & communication technologies (ACCT). f. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). DoS attacks in mobile ad hoc networks: A survey. In Second international conference on advanced computing & communication technologies (ACCT). f.
7.
go back to reference Sharma, D., Gajkumar Shah, P., & Huang, X. (2010). Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In NSS ‘10 proceedings of the fourth international conference on network and system security. Sharma, D., Gajkumar Shah, P., & Huang, X. (2010). Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In NSS ‘10 proceedings of the fourth international conference on network and system security.
8.
go back to reference Dorri, A., Kamel, S. R., & Kheyrkhah, E. (2015). Security challenges in mobile ad hoc network: A Survey. International journal of Computer science and engineering survey (IJCSES),. doi:10.5121/ijcses.2015.6102. Dorri, A., Kamel, S. R., & Kheyrkhah, E. (2015). Security challenges in mobile ad hoc network: A Survey. International journal of Computer science and engineering survey (IJCSES),. doi:10.​5121/​ijcses.​2015.​6102.
9.
go back to reference Khan, Z. A., & Islam, M. H. (2012). Wormhole attack: A new detection technique. In International conference on emerging technologies (ICET). Khan, Z. A., & Islam, M. H. (2012). Wormhole attack: A new detection technique. In International conference on emerging technologies (ICET).
10.
go back to reference Morshed, M. M., Ko, F. I. S., Dongwook, L., & Rahman, M. H. (2010). Performance evaluation of DSDV and AODV routing protocols in mobile ad hoc networks. In 4th international conference on new trends in information science and service science (NISS). Morshed, M. M., Ko, F. I. S., Dongwook, L., & Rahman, M. H. (2010). Performance evaluation of DSDV and AODV routing protocols in mobile ad hoc networks. In 4th international conference on new trends in information science and service science (NISS).
11.
go back to reference Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Third international conference on advanced computing and communication technologies (ACCT). Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Third international conference on advanced computing and communication technologies (ACCT).
12.
go back to reference Ismail, Z., & Hassan, R. (2010). Performance of AODV routing protocol in mobile ad hoc network. In International symposium in information technology (ITSim) (Vol. 1). Ismail, Z., & Hassan, R. (2010). Performance of AODV routing protocol in mobile ad hoc network. In International symposium in information technology (ITSim) (Vol. 1).
13.
go back to reference Dhurandher, S. K., Woungang, I., Mathur, R., & Khurana, P. (2013). GAODV: A modified AODV against single and collaborative black hole attacks in MANETs. In 27th international conference on advanced information networking and applications workshops (WAINA). Dhurandher, S. K., Woungang, I., Mathur, R., & Khurana, P. (2013). GAODV: A modified AODV against single and collaborative black hole attacks in MANETs. In 27th international conference on advanced information networking and applications workshops (WAINA).
14.
go back to reference Bagwari, A., Jee, R., Joshi, P., & Bisht, S. (2012). Performance of AODV routing protocol with increasing the MANET nodes and its effects on QoS of mobile ad hoc networks. In International conference on communication systems and network technologies (CSNT). Bagwari, A., Jee, R., Joshi, P., & Bisht, S. (2012). Performance of AODV routing protocol with increasing the MANET nodes and its effects on QoS of mobile ad hoc networks. In International conference on communication systems and network technologies (CSNT).
15.
go back to reference Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent black hole and gray hole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent black hole and gray hole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12.
16.
go back to reference Mishra, A., Jaiswal, R., & Sharma, S. (2012). A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network. In IEEE. Mishra, A., Jaiswal, R., & Sharma, S. (2012). A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network. In IEEE.
17.
go back to reference Jaisankar, N., Saravanan, R., & Durai Swamy, K. (2010). A novel security approach for detecting black hole attack in MANET. Information Processing and Management Communications in Computer and Information, Science, 70, 217–223.CrossRef Jaisankar, N., Saravanan, R., & Durai Swamy, K. (2010). A novel security approach for detecting black hole attack in MANET. Information Processing and Management Communications in Computer and Information, Science, 70, 217–223.CrossRef
18.
go back to reference Nath, I., & Chaki, R. (2012). BHAPSC: A new black hole attack prevention system in clustered MANET. International Journal of Advanced Research in Computer Science and Software Engineering, 2(8), 113–121. Nath, I., & Chaki, R. (2012). BHAPSC: A new black hole attack prevention system in clustered MANET. International Journal of Advanced Research in Computer Science and Software Engineering, 2(8), 113–121.
19.
go back to reference Surana, K. A., Rathi, S. B., Thosar, T. P., & Mehatre, S. (2012). Securing black hole attack in routing protocol AODV in MANET with watchdog mechanisms. World Research Journal of Computer Architecture, 1(1), 19–23. Surana, K. A., Rathi, S. B., Thosar, T. P., & Mehatre, S. (2012). Securing black hole attack in routing protocol AODV in MANET with watchdog mechanisms. World Research Journal of Computer Architecture, 1(1), 19–23.
20.
go back to reference Jain, S., Jain, M., & Kandwal, H. (2010). Advanced algorithm for detection and prevention of cooperative black and gray hole attacks in mobile ad hoc networks. International Journal of Computer Applications, 1(7), 37–42.CrossRef Jain, S., Jain, M., & Kandwal, H. (2010). Advanced algorithm for detection and prevention of cooperative black and gray hole attacks in mobile ad hoc networks. International Journal of Computer Applications, 1(7), 37–42.CrossRef
21.
go back to reference Rutvij, H. J., Sankita, J. P., & Devesh, C. J. (2012). A novel approach for grayole and black hole attacks in mobile ad hoc networks. In Second international conference on advanced computing and communication technologies, IEEE. Rutvij, H. J., Sankita, J. P., & Devesh, C. J. (2012). A novel approach for grayole and black hole attacks in mobile ad hoc networks. In Second international conference on advanced computing and communication technologies, IEEE.
22.
go back to reference Thachil, F., & Shet, K. C. (2012). A trust based approach for AODV protocol to mitigrate black hole attack in MANET. In International conference on computing science. Thachil, F., & Shet, K. C. (2012). A trust based approach for AODV protocol to mitigrate black hole attack in MANET. In International conference on computing science.
23.
go back to reference Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of cooperative black hole and gray hole attacks in MANETs. In International conference on system engineering and technology, IEEE. Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of cooperative black hole and gray hole attacks in MANETs. In International conference on system engineering and technology, IEEE.
24.
go back to reference Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In Second international conference on intelligent systems, modelling and simulation (ISMS). Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In Second international conference on intelligent systems, modelling and simulation (ISMS).
25.
go back to reference Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking, FGCN (Vol. 2). Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking, FGCN (Vol. 2).
Metadata
Title
An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET
Author
Ali Dorri
Publication date
23-03-2016
Publisher
Springer US
Published in
Wireless Networks / Issue 6/2017
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1251-x

Other articles of this Issue 6/2017

Wireless Networks 6/2017 Go to the issue