Skip to main content
Top
Published in: Wireless Personal Communications 2/2016

01-09-2016

Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks

Authors: T. Poongodi, M. Karthikeyan

Published in: Wireless Personal Communications | Issue 2/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Black hole attack refers an attack by single or more number of malicious nodes which forcibly captures the route from source to destination by sending reply with largest sequence number and smallest hop count. In this paper, a novel technique using Localized Secure Architecture for MANET (LSAM) routing protocol is proposed to detect and prevent co-operative black hole attack. Security Monitoring Nodes (SMNs) would be activated only if the threshold value is exceeded. If malicious nodes are detected, other SMNs in its proximity area are intimated to isolate the malicious nodes. Network simulator tool is implemented to analyze the network performance of different scenarios with various number of nodes. Packet delivery ratio (PDR), routing overhead, control overhead, packet drop rate, throughput and end-to-end delay (EED) are the factors taken into consideration for performance analysis and it is shown that the proposed protocol is more secured and efficient. PDR is been increased by 27 % in the presence of 40 % misbehaving nodes, while it increases the percentage of overhead on proposed routing protocol from 1 to 4 %. EED is greatly reduced from 0.9 to 0.3 % in LSAM.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhou, L., & Haas, Z. (1999). Securing ad hoc networks. IEEE Network Magazine, 13, 24–30. Zhou, L., & Haas, Z. (1999). Securing ad hoc networks. IEEE Network Magazine, 13, 24–30.
2.
go back to reference Zapata, M., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of 3rd ACM workshop WiSE, pp. 1–10. Zapata, M., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of 3rd ACM workshop WiSE, pp. 1–10.
3.
go back to reference Papadimitratos, P., & Haas, H. (2003). Secure data transmission in mobile ad hoc networks. In Proceedings of ACM workshop WiSE, pp. 41–50. Papadimitratos, P., & Haas, H. (2003). Secure data transmission in mobile ad hoc networks. In Proceedings of ACM workshop WiSE, pp. 41–50.
4.
go back to reference Yih-Chun, H, & Perrig, A. (2004). A survey of secure wireless ad hoc routing. IEEE Security Privacy, 2, 28–39. Yih-Chun, H, & Perrig, A. (2004). A survey of secure wireless ad hoc routing. IEEE Security Privacy, 2, 28–39.
5.
go back to reference Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc network. In Proceedings of 10th IEEE International Conference in Network Protocols (INCP’ 02), IEEE press (pp. 78–87). Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc network. In Proceedings of 10th IEEE International Conference in Network Protocols (INCP’ 02), IEEE press (pp. 78–87).
6.
go back to reference Deng, H., & Agarwal, P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine, 40, 70–75.CrossRef Deng, H., & Agarwal, P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine, 40, 70–75.CrossRef
7.
go back to reference Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. IETF RFC, 3561. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. IETF RFC, 3561.
8.
go back to reference Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of the 6th annual international conference mobile computer networks, pp. 255–265. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehaviour in mobile ad hoc networks. In Proceedings of the 6th annual international conference mobile computer networks, pp. 255–265.
9.
go back to reference Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.CrossRef Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.CrossRef
10.
go back to reference Boppana, R. V., & Su, X. (2011). On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 10, 1162–1174.CrossRef Boppana, R. V., & Su, X. (2011). On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 10, 1162–1174.CrossRef
11.
go back to reference Sánchez-Casado, L., Maciá-Fernández, G., García-Teodoro, P., & Magán-Carrión, R. (2015). A model of data forwarding in MANETs for lightweight detection of malicious packet dropping. Computer Networks, 87, 44–58.CrossRef Sánchez-Casado, L., Maciá-Fernández, G., García-Teodoro, P., & Magán-Carrión, R. (2015). A model of data forwarding in MANETs for lightweight detection of malicious packet dropping. Computer Networks, 87, 44–58.CrossRef
12.
go back to reference Nadeem, A., & Howarth, M. P. (2014). An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Networks, 13, 368–380.CrossRef Nadeem, A., & Howarth, M. P. (2014). An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Networks, 13, 368–380.CrossRef
13.
go back to reference Nakayama, H., Kurosama, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58, 2471–2481.CrossRef Nakayama, H., Kurosama, S., Jamalipour, A., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 58, 2471–2481.CrossRef
14.
go back to reference Ming-Yang, S. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communication, 34, 107–117.CrossRef Ming-Yang, S. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communication, 34, 107–117.CrossRef
15.
go back to reference Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. International Journal of Network Security, 5, 338–346. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. International Journal of Network Security, 5, 338–346.
16.
go back to reference Latha, T., & Sankaranarayanan, V. (2008). Prevention of co-operative black hole attack in MANET. Journal of Networks, 3, 13–20. Latha, T., & Sankaranarayanan, V. (2008). Prevention of co-operative black hole attack in MANET. Journal of Networks, 3, 13–20.
17.
go back to reference Shakshuki, E. M., Kang, N., & Sheltami, T. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60, 1089–1098.CrossRef Shakshuki, E. M., Kang, N., & Sheltami, T. (2013). EAACK—A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60, 1089–1098.CrossRef
Metadata
Title
Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks
Authors
T. Poongodi
M. Karthikeyan
Publication date
01-09-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2016
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3318-5

Other articles of this Issue 2/2016

Wireless Personal Communications 2/2016 Go to the issue