Skip to main content
Top
Published in: Soft Computing 5/2024

15-11-2023 | Neural Networks

An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET

Authors: Rahul Chakravorty, Jay Prakash, Ashish Srivastava

Published in: Soft Computing | Issue 5/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today, more than ever, the necessity for remote availability, independent of a client’s location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a few of the wireless technologies that have facilitated the widespread availability of the internet on mobile phones, PDAs, laptops, and other portable electronic devices, and the ease with which users may exchange and sync data between them. MANET, or mobile ad hoc network, is one of the newer ways for nodes to connect because of its decentralized structure and self-configuring nature. Many different protocols control the MANET, and because of its dynamic topology, new problems have emerged in recent years. The black hole attacks put ad hoc networks at risk of data loss. These attacks trick the source into thinking it is sending data through the shortest path possible when, in reality, it is not. It’s a cosmic black hole metaphor where everything vanishes. This research aims to investigate the implications of the Blackhole attack on the On-Demand Multicast Routing Protocol in a MANET and propose solutions to counteract it. MATLAB is used to test the efficacy of our strategy. In addition, the suggested method is evaluated using standard performance measures like packet delivery ratio, throughput, packet loss, etc.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Arqub OA, Al-Smadi M (2020) Fuzzy conformable fractional differential equations: novel extended approach and new numerical solutions. Soft Comput 24(16):12501–12522CrossRefMATH Arqub OA, Al-Smadi M (2020) Fuzzy conformable fractional differential equations: novel extended approach and new numerical solutions. Soft Comput 24(16):12501–12522CrossRefMATH
go back to reference Arqub OA, Al-Smadi M, Momani S, Hayat T (2017) Application of reproducing kernel algorithm for solving second-order, two-point fuzzy boundary value problems. Soft Comput 21:7191–7206CrossRefMATH Arqub OA, Al-Smadi M, Momani S, Hayat T (2017) Application of reproducing kernel algorithm for solving second-order, two-point fuzzy boundary value problems. Soft Comput 21:7191–7206CrossRefMATH
go back to reference Delkesh T, Jabraeil Jamali MA (2019) Eaodv: detection and removal of multiple black hole attacks through sending forged packets in manets. J Ambient Intell Humaniz Comput 10(5):1897–1914CrossRef Delkesh T, Jabraeil Jamali MA (2019) Eaodv: detection and removal of multiple black hole attacks through sending forged packets in manets. J Ambient Intell Humaniz Comput 10(5):1897–1914CrossRef
go back to reference Dhiman A, Kumar R (2019) A comparative study of position based routing protocols in vanets. In: 2019 international conference on intelligent sustainable systems (ICISS). IEEE, pp 306–311 Dhiman A, Kumar R (2019) A comparative study of position based routing protocols in vanets. In: 2019 international conference on intelligent sustainable systems (ICISS). IEEE, pp 306–311
go back to reference Dorri A (2017) An edri-based approach for detecting and eliminating cooperative black hole nodes in manet. Wirel Netw 23(6):1767–1778CrossRefMATH Dorri A (2017) An edri-based approach for detecting and eliminating cooperative black hole nodes in manet. Wirel Netw 23(6):1767–1778CrossRefMATH
go back to reference El-Semary AM, Diab H (2019) Bp-aodv: blackhole protected aodv routing protocol for manets based on chaotic map. IEEE Access 7:95197–95211CrossRef El-Semary AM, Diab H (2019) Bp-aodv: blackhole protected aodv routing protocol for manets based on chaotic map. IEEE Access 7:95197–95211CrossRef
go back to reference Gupta P, Goel P, Varshney P, Tyagi N (2019) Reliability factor based aodv protocol: prevention of black hole attack in manet. In: Tiwari S, Trivedi MC, Mishra KK, Misra AK Kumar KK (eds) Smart innovations in communication and computational sciences. Springer, Berlin, pp 271–279 Gupta P, Goel P, Varshney P, Tyagi N (2019) Reliability factor based aodv protocol: prevention of black hole attack in manet. In: Tiwari S, Trivedi MC, Mishra KK, Misra AK Kumar KK (eds) Smart innovations in communication and computational sciences. Springer, Berlin, pp 271–279
go back to reference Juneja K (2020) Random-session and k-neighbour based suspected node analysis approach for cooperative blackhole detection in manet. Wirel Pers Commun 110(1):45–68CrossRefMATH Juneja K (2020) Random-session and k-neighbour based suspected node analysis approach for cooperative blackhole detection in manet. Wirel Pers Commun 110(1):45–68CrossRefMATH
go back to reference Kowsigan M, Rajeshkumar J, Baranidharan B, Prasath N, Nalini S, Venkatachalam K (2021) A novel intrusion detection system to alleviate the black hole attacks to improve the security and performance of the manet. Wirel Pers Commun 127:1–21 Kowsigan M, Rajeshkumar J, Baranidharan B, Prasath N, Nalini S, Venkatachalam K (2021) A novel intrusion detection system to alleviate the black hole attacks to improve the security and performance of the manet. Wirel Pers Commun 127:1–21
go back to reference Maayah B, Arqub OA, Alnabulsi S, Alsulami H (2022a) Numerical solutions and geometric attractors of a fractional model of the cancer-immune based on the Atangana–Baleanu–Caputo derivative and the reproducing kernel scheme. Chin J Phys 80:463–483 Maayah B, Arqub OA, Alnabulsi S, Alsulami H (2022a) Numerical solutions and geometric attractors of a fractional model of the cancer-immune based on the Atangana–Baleanu–Caputo derivative and the reproducing kernel scheme. Chin J Phys 80:463–483
go back to reference Maayah B, Moussaoui A, Bushnaq S, Abu Arqub O (2022b) The multistep Laplace optimized decomposition method for solving fractional-order coronavirus disease model (covid-19) via the Caputo fractional approach. Demonstr Math 55(1):963–977 Maayah B, Moussaoui A, Bushnaq S, Abu Arqub O (2022b) The multistep Laplace optimized decomposition method for solving fractional-order coronavirus disease model (covid-19) via the Caputo fractional approach. Demonstr Math 55(1):963–977
go back to reference Mohammad SN, Singh R, Dey A, Ahmad SJ (2019) Esmbcrt: enhance security to manets against black hole attack using mcr technique. In: Saini HS, Kishore Singh R, Patel VM (eds) Innovations in electronics and communication engineering. Springer, Berlin, pp 319–326 Mohammad SN, Singh R, Dey A, Ahmad SJ (2019) Esmbcrt: enhance security to manets against black hole attack using mcr technique. In: Saini HS, Kishore Singh R, Patel VM (eds) Innovations in electronics and communication engineering. Springer, Berlin, pp 319–326
go back to reference Noguchi T, Hayakawa M (2018) Black hole attack prevention method using multiple rreps in mobile ad hoc networks. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE). IEEE, pp 539–544 Noguchi T, Hayakawa M (2018) Black hole attack prevention method using multiple rreps in mobile ad hoc networks. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE). IEEE, pp 539–544
go back to reference Panda N, Pattanayak BK (2018) Defense against co-operative black-hole attack and gray-hole attack in manet. Int J Eng Technol 7(3.4):84–89CrossRefMATH Panda N, Pattanayak BK (2018) Defense against co-operative black-hole attack and gray-hole attack in manet. Int J Eng Technol 7(3.4):84–89CrossRefMATH
go back to reference Pavithran P, Mathew S, Namasudra S, Lorenz P (2021) A novel cryptosystem based on dna cryptography and randomly generated mealy machine. Comput Secur 104:102160CrossRefMATH Pavithran P, Mathew S, Namasudra S, Lorenz P (2021) A novel cryptosystem based on dna cryptography and randomly generated mealy machine. Comput Secur 104:102160CrossRefMATH
go back to reference Rani P, Verma S, Nguyen GN et al (2020) Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access 8:121755–121764CrossRef Rani P, Verma S, Nguyen GN et al (2020) Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access 8:121755–121764CrossRef
go back to reference Saudi NAM, Arshad MA, Buja AG, Fadzil AFA, Saidi RM (2019) Mobile ad-hoc network (manet) routing protocols: a performance assessment. In: Proceedings of the third international conference on computing, mathematics and statistics (iCMS2017). Springer, pp 53–59 Saudi NAM, Arshad MA, Buja AG, Fadzil AFA, Saidi RM (2019) Mobile ad-hoc network (manet) routing protocols: a performance assessment. In: Proceedings of the third international conference on computing, mathematics and statistics (iCMS2017). Springer, pp 53–59
go back to reference Singh A, Hasan M (2018) An improved mechanism to prevent blackhole attack in manet. In: Saeed K, Chaki N, Pati B, Bakshi S, Mohapatra DP (eds) Progress in advanced computing and intelligent engineering. Springer, Berlin, pp 511–520CrossRefMATH Singh A, Hasan M (2018) An improved mechanism to prevent blackhole attack in manet. In: Saeed K, Chaki N, Pati B, Bakshi S, Mohapatra DP (eds) Progress in advanced computing and intelligent engineering. Springer, Berlin, pp 511–520CrossRefMATH
go back to reference Sivanesh S, Sarma Dhulipala V (2022) Analytical termination of malicious nodes (atom): an intrusion detection system for detecting black hole attack in mobile ad hoc networks. Wirel Pers Commun 124(2):1511–1524CrossRef Sivanesh S, Sarma Dhulipala V (2022) Analytical termination of malicious nodes (atom): an intrusion detection system for detecting black hole attack in mobile ad hoc networks. Wirel Pers Commun 124(2):1511–1524CrossRef
go back to reference Srivastava A (2016a) Simulation based performance of AODV (reactive) and DSDV (proactive) routing protocol for manet. Int J Res Appl Sci Eng Technol (IJRASET) 4(XI):372–376 Srivastava A (2016a) Simulation based performance of AODV (reactive) and DSDV (proactive) routing protocol for manet. Int J Res Appl Sci Eng Technol (IJRASET) 4(XI):372–376
go back to reference Srivastava A (2016b) Simulation based performance in terms of node energy for different proactive and reactive routing protocols of manet. Int J Res Appl Sci Eng Technol (IJRASET) 4(XII):210–216 Srivastava A (2016b) Simulation based performance in terms of node energy for different proactive and reactive routing protocols of manet. Int J Res Appl Sci Eng Technol (IJRASET) 4(XII):210–216
go back to reference Srivastava A, Mishra A, Upadhyay S (2014b) A conceptual overview of energy consumption based routing protocol-ecbr. Int J Comput Appl 92(3):18–22 Srivastava A, Mishra A, Upadhyay S (2014b) A conceptual overview of energy consumption based routing protocol-ecbr. Int J Comput Appl 92(3):18–22
go back to reference Tamilselvi P, Ganesh Babu C (2019) An efficient approach to circumvent black hole nodes in manets. Clust Comput 22(5):11401–11409 Tamilselvi P, Ganesh Babu C (2019) An efficient approach to circumvent black hole nodes in manets. Clust Comput 22(5):11401–11409
go back to reference Tripathi A, Srivastava A (2016) Design of an energy efficient routing approach based on AODV routing protocol for mobile ad hoc networks. IJSTE - Int J Sci Technol Eng 3(5):78–80 Tripathi A, Srivastava A (2016) Design of an energy efficient routing approach based on AODV routing protocol for mobile ad hoc networks. IJSTE - Int J Sci Technol Eng 3(5):78–80
go back to reference Tseng F-H, Chiang H-P, Chao H-C (2018) Black hole along with other attacks in manets: a survey. J Inf Process Syst 14(1):56–78MATH Tseng F-H, Chiang H-P, Chao H-C (2018) Black hole along with other attacks in manets: a survey. J Inf Process Syst 14(1):56–78MATH
go back to reference Yaseen QM, Aldwairi M (2018) An enhanced aodv protocol for avoiding black holes in manet. Procedia Comput Sci 134:371–376CrossRefMATH Yaseen QM, Aldwairi M (2018) An enhanced aodv protocol for avoiding black holes in manet. Procedia Comput Sci 134:371–376CrossRefMATH
go back to reference Yasin A, Abu Zant M (2018) Detecting and isolating black-hole attacks in manet using timer based baited technique. Wirel Commun Mob Comput 2018 Yasin A, Abu Zant M (2018) Detecting and isolating black-hole attacks in manet using timer based baited technique. Wirel Commun Mob Comput 2018
Metadata
Title
An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET
Authors
Rahul Chakravorty
Jay Prakash
Ashish Srivastava
Publication date
15-11-2023
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 5/2024
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-023-09386-0

Other articles of this Issue 5/2024

Soft Computing 5/2024 Go to the issue

Foundation, algebraic, and analytical methods in soft computing

Lebesgue decomposition type theorems for weakly null-additive functions on D-posets

Premium Partner