Skip to main content

2019 | OriginalPaper | Buchkapitel

Enhanced Security of MANETs Against Black Hole Attacks Using AS Technique

verfasst von : Ishrath Unissa, Syed Jalal Ahmad

Erschienen in: ICCCE 2018

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A mobile ad hoc network (MANET) is an autonomous structureless arrangement of mobile nodes to figure a momentary network. Communication between any two nodes is possible directly if the two nodes belong to the same sensing range; otherwise communication can be achieved by means of the nodes which are present between source and destination. As the network nodes are mobile, any node can enter or leave the network at any particular time interval. Thus, whichever node is present in between the source and destination can perform as a router or the host node in the arranged network. Therefore this poses security challenges to MANETs. This paper presents a solution to black hole attacks. The presented method is easy to use and efficient in detecting black hole attacks. The presented approach is validated by the use of network simulator 2 (NS2).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and counter measures. AdHoc Netw J Spec Issue Sens Netw Appl Protoc 1(2–3):293–315 Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and counter measures. AdHoc Netw J Spec Issue Sens Netw Appl Protoc 1(2–3):293–315
2.
Zurück zum Zitat Douceur JR (2002) The Sybil attack. In: Druschel P, Kaashoek MF, Rowstron A (eds) IPTPS 2002, vol 2429. LNCS. Springer, Heidelberg, pp 251–260 Douceur JR (2002) The Sybil attack. In: Druschel P, Kaashoek MF, Rowstron A (eds) IPTPS 2002, vol 2429. LNCS. Springer, Heidelberg, pp 251–260
3.
Zurück zum Zitat Sanjeev R, Manpreet S (2011) Performance analysis of malicious node aware routing for MANET using two hop authentication. Int J Comput Appl 25(3):17–24 Sanjeev R, Manpreet S (2011) Performance analysis of malicious node aware routing for MANET using two hop authentication. Int J Comput Appl 25(3):17–24
4.
Zurück zum Zitat Chandrakant N (2013) Self protecting nodes for secured data transmission in energy efficient MANETs. Int J Adv Res Comput Sci Softw Eng 3(6):673–675 Chandrakant N (2013) Self protecting nodes for secured data transmission in energy efficient MANETs. Int J Adv Res Comput Sci Softw Eng 3(6):673–675
5.
Zurück zum Zitat Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Adhoc networks. In: Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security: advanced communications and multimedia security, Portorosz, Slovenia, pp 107–121 Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Adhoc networks. In: Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security: advanced communications and multimedia security, Portorosz, Slovenia, pp 107–121
6.
Zurück zum Zitat Hu YC, Perrig A, Johnson DB (2005) Aridane: a secure on-demand routing protocol for Adhoc networks. Wireless Netw 11:21–38CrossRef Hu YC, Perrig A, Johnson DB (2005) Aridane: a secure on-demand routing protocol for Adhoc networks. Wireless Netw 11:21–38CrossRef
7.
Zurück zum Zitat Sharma VC, Gupta A, Dimri V (2013) Detection of black hole attack in MANET under AODV routing protocol. Int J Adv Res Comput Sci Softw Eng 3(6):438–443 Sharma VC, Gupta A, Dimri V (2013) Detection of black hole attack in MANET under AODV routing protocol. Int J Adv Res Comput Sci Softw Eng 3(6):438–443
8.
Zurück zum Zitat Deng H, Li W, Agrawal DP (2002) Routing security in wireless Adhoc networks. IEEE Commun Mag 40(10):70–75CrossRef Deng H, Li W, Agrawal DP (2002) Routing security in wireless Adhoc networks. IEEE Commun Mag 40(10):70–75CrossRef
9.
Zurück zum Zitat Lu S, Li L, Lem KY, Jia L (2009) SAODV: a MANET routing protocol that can withstand black hole attack. In: Proceedings of the 2009 international conference on computational intelligence and security (CIS 2009), vol 2, Beijng, China, pp 421–425 Lu S, Li L, Lem KY, Jia L (2009) SAODV: a MANET routing protocol that can withstand black hole attack. In: Proceedings of the 2009 international conference on computational intelligence and security (CIS 2009), vol 2, Beijng, China, pp 421–425
10.
Zurück zum Zitat Deswal S, Sing S (2010) Implementation of routing security aspects in AODV. Int J Comput Theory Eng 2(1):135–138CrossRef Deswal S, Sing S (2010) Implementation of routing security aspects in AODV. Int J Comput Theory Eng 2(1):135–138CrossRef
11.
Zurück zum Zitat Kukreja D, Dhurandher SK, Reddy BVR (2017) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humaniz Comput 1–16 Kukreja D, Dhurandher SK, Reddy BVR (2017) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humaniz Comput 1–16
12.
Zurück zum Zitat Adnan A, Abubakar K, Channa MI, Haseeb K, Khan AW (2016) A trust aware routing protocol for energy constraint wireless sensor networks. Telecommun Syst 61(1):123–140CrossRef Adnan A, Abubakar K, Channa MI, Haseeb K, Khan AW (2016) A trust aware routing protocol for energy constraint wireless sensor networks. Telecommun Syst 61(1):123–140CrossRef
13.
Zurück zum Zitat Ahmad SJ, Reddy VSK, Damodaram A, Krishna PR (2013) Location aware and energy efficient routing protocol for long distance MANETs. Int J Netw Virtual Organ (IJNVO) 13(4):327–350 InderscienceCrossRef Ahmad SJ, Reddy VSK, Damodaram A, Krishna PR (2013) Location aware and energy efficient routing protocol for long distance MANETs. Int J Netw Virtual Organ (IJNVO) 13(4):327–350 InderscienceCrossRef
Metadaten
Titel
Enhanced Security of MANETs Against Black Hole Attacks Using AS Technique
verfasst von
Ishrath Unissa
Syed Jalal Ahmad
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-0212-1_10

Neuer Inhalt