Skip to main content
Top

2019 | OriginalPaper | Chapter

Enhanced Security of MANETs Against Black Hole Attacks Using AS Technique

Authors : Ishrath Unissa, Syed Jalal Ahmad

Published in: ICCCE 2018

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A mobile ad hoc network (MANET) is an autonomous structureless arrangement of mobile nodes to figure a momentary network. Communication between any two nodes is possible directly if the two nodes belong to the same sensing range; otherwise communication can be achieved by means of the nodes which are present between source and destination. As the network nodes are mobile, any node can enter or leave the network at any particular time interval. Thus, whichever node is present in between the source and destination can perform as a router or the host node in the arranged network. Therefore this poses security challenges to MANETs. This paper presents a solution to black hole attacks. The presented method is easy to use and efficient in detecting black hole attacks. The presented approach is validated by the use of network simulator 2 (NS2).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and counter measures. AdHoc Netw J Spec Issue Sens Netw Appl Protoc 1(2–3):293–315 Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and counter measures. AdHoc Netw J Spec Issue Sens Netw Appl Protoc 1(2–3):293–315
2.
go back to reference Douceur JR (2002) The Sybil attack. In: Druschel P, Kaashoek MF, Rowstron A (eds) IPTPS 2002, vol 2429. LNCS. Springer, Heidelberg, pp 251–260 Douceur JR (2002) The Sybil attack. In: Druschel P, Kaashoek MF, Rowstron A (eds) IPTPS 2002, vol 2429. LNCS. Springer, Heidelberg, pp 251–260
3.
go back to reference Sanjeev R, Manpreet S (2011) Performance analysis of malicious node aware routing for MANET using two hop authentication. Int J Comput Appl 25(3):17–24 Sanjeev R, Manpreet S (2011) Performance analysis of malicious node aware routing for MANET using two hop authentication. Int J Comput Appl 25(3):17–24
4.
go back to reference Chandrakant N (2013) Self protecting nodes for secured data transmission in energy efficient MANETs. Int J Adv Res Comput Sci Softw Eng 3(6):673–675 Chandrakant N (2013) Self protecting nodes for secured data transmission in energy efficient MANETs. Int J Adv Res Comput Sci Softw Eng 3(6):673–675
5.
go back to reference Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Adhoc networks. In: Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security: advanced communications and multimedia security, Portorosz, Slovenia, pp 107–121 Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Adhoc networks. In: Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security: advanced communications and multimedia security, Portorosz, Slovenia, pp 107–121
6.
go back to reference Hu YC, Perrig A, Johnson DB (2005) Aridane: a secure on-demand routing protocol for Adhoc networks. Wireless Netw 11:21–38CrossRef Hu YC, Perrig A, Johnson DB (2005) Aridane: a secure on-demand routing protocol for Adhoc networks. Wireless Netw 11:21–38CrossRef
7.
go back to reference Sharma VC, Gupta A, Dimri V (2013) Detection of black hole attack in MANET under AODV routing protocol. Int J Adv Res Comput Sci Softw Eng 3(6):438–443 Sharma VC, Gupta A, Dimri V (2013) Detection of black hole attack in MANET under AODV routing protocol. Int J Adv Res Comput Sci Softw Eng 3(6):438–443
8.
go back to reference Deng H, Li W, Agrawal DP (2002) Routing security in wireless Adhoc networks. IEEE Commun Mag 40(10):70–75CrossRef Deng H, Li W, Agrawal DP (2002) Routing security in wireless Adhoc networks. IEEE Commun Mag 40(10):70–75CrossRef
9.
go back to reference Lu S, Li L, Lem KY, Jia L (2009) SAODV: a MANET routing protocol that can withstand black hole attack. In: Proceedings of the 2009 international conference on computational intelligence and security (CIS 2009), vol 2, Beijng, China, pp 421–425 Lu S, Li L, Lem KY, Jia L (2009) SAODV: a MANET routing protocol that can withstand black hole attack. In: Proceedings of the 2009 international conference on computational intelligence and security (CIS 2009), vol 2, Beijng, China, pp 421–425
10.
go back to reference Deswal S, Sing S (2010) Implementation of routing security aspects in AODV. Int J Comput Theory Eng 2(1):135–138CrossRef Deswal S, Sing S (2010) Implementation of routing security aspects in AODV. Int J Comput Theory Eng 2(1):135–138CrossRef
11.
go back to reference Kukreja D, Dhurandher SK, Reddy BVR (2017) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humaniz Comput 1–16 Kukreja D, Dhurandher SK, Reddy BVR (2017) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humaniz Comput 1–16
12.
go back to reference Adnan A, Abubakar K, Channa MI, Haseeb K, Khan AW (2016) A trust aware routing protocol for energy constraint wireless sensor networks. Telecommun Syst 61(1):123–140CrossRef Adnan A, Abubakar K, Channa MI, Haseeb K, Khan AW (2016) A trust aware routing protocol for energy constraint wireless sensor networks. Telecommun Syst 61(1):123–140CrossRef
13.
go back to reference Ahmad SJ, Reddy VSK, Damodaram A, Krishna PR (2013) Location aware and energy efficient routing protocol for long distance MANETs. Int J Netw Virtual Organ (IJNVO) 13(4):327–350 InderscienceCrossRef Ahmad SJ, Reddy VSK, Damodaram A, Krishna PR (2013) Location aware and energy efficient routing protocol for long distance MANETs. Int J Netw Virtual Organ (IJNVO) 13(4):327–350 InderscienceCrossRef
Metadata
Title
Enhanced Security of MANETs Against Black Hole Attacks Using AS Technique
Authors
Ishrath Unissa
Syed Jalal Ahmad
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-0212-1_10