Skip to main content
Erschienen in: Wireless Personal Communications 1/2020

17.08.2019

Random-Session and K-Neighbour Based Suspected Node Analysis Approach for Cooperative Blackhole Detection in MANET

verfasst von: Kapil Juneja

Erschienen in: Wireless Personal Communications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cooperative Blackhole is generated by two or more attackers with mutual handshaking. The nodes behave normally in reciprocal interaction and communication. In this paper, a session based suspected node evaluation model is presented to detect and prevent the cooperative blackhole attacks. A session is established for prior communication estimation as the communication begins. The parameter specific evaluation is performed over the session to identify the distrusted nodes. After this session, the continuous observation on behaviour of suspected nodes is performed throughout the communication. K-neighbour evaluation method is applied to recognize the cooperative attack behaviour of the suspected nodes. The evaluation is performed randomly on smaller separate sessions during the communication. The status update on nodes is also done based to recognize the attacker or safe node. The degree of conjunctive interaction in a flow is observed to recognize the cooperative attacker nodes. The proposed model is simulated on the multiple networks with variations in terms of the number of nodes, node speed and the number of attacker nodes. The evaluations are taken against the independent blackhole and cooperative blackhole nodes. The comparative evaluation against AODV, Probabilistic Blackhole Detection methods verified the reliability and effectiveness of the proposed model. The qualified evaluation performed on PDR and lossrate parameters verified that the investigated model has improved the PDR ratio significantly for highly infected, scattered and dense networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dorri, A., & Nikdel, H. (2015). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In 7th Conference on information and knowledge technology (IKT), Urmia (pp. 1–6). Dorri, A., & Nikdel, H. (2015). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In 7th Conference on information and knowledge technology (IKT), Urmia (pp. 1–6).
2.
Zurück zum Zitat Kanthe, A. M., Simunic, D., & Wahane, G. (2014). Detection of cooperative black hole attack using crosschecking with truelink in MANET. In IEEE international conference on computational intelligence and computing research, Coimbatore (pp. 1–6). Kanthe, A. M., Simunic, D., & Wahane, G. (2014). Detection of cooperative black hole attack using crosschecking with truelink in MANET. In IEEE international conference on computational intelligence and computing research, Coimbatore (pp. 1–6).
3.
Zurück zum Zitat Jaiswal, R., Sharma, S., & Mishra, A. (2013). A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network. In 3rd IEEE international advance computing conference (IACC), Ghaziabad (pp. 499–504). Jaiswal, R., Sharma, S., & Mishra, A. (2013). A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network. In 3rd IEEE international advance computing conference (IACC), Ghaziabad (pp. 499–504).
4.
Zurück zum Zitat Yamamoto, R., Tanaka, Y., & Yang, B. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In 16th International conference on advanced communication technology, Pyeongchang (pp. 223–232). Yamamoto, R., Tanaka, Y., & Yang, B. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In 16th International conference on advanced communication technology, Pyeongchang (pp. 223–232).
5.
Zurück zum Zitat Koilakonda, S., Ukil, A., & Sen, J. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In 2nd International conference on intelligent systems, modelling and simulation, Kuala Lumpur (pp. 338–343). Koilakonda, S., Ukil, A., & Sen, J. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In 2nd International conference on intelligent systems, modelling and simulation, Kuala Lumpur (pp. 338–343).
6.
Zurück zum Zitat Min, Z., & Jiliu, Z. (2009). Cooperative black hole attack prevention for mobile ad hoc networks. In International symposium on information engineering and electronic commerce, Ternopil (pp. 26–30). Min, Z., & Jiliu, Z. (2009). Cooperative black hole attack prevention for mobile ad hoc networks. In International symposium on information engineering and electronic commerce, Ternopil (pp. 26–30).
7.
Zurück zum Zitat Ntantogian, C., Malliaros, S., Xenakis, C., & Panos, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks,113, 94–110.CrossRef Ntantogian, C., Malliaros, S., Xenakis, C., & Panos, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks,113, 94–110.CrossRef
8.
Zurück zum Zitat Belmehdi, A., & Baadache, A. (2014). Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Computer Networks,73, 173–184.CrossRef Belmehdi, A., & Baadache, A. (2014). Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Computer Networks,73, 173–184.CrossRef
9.
Zurück zum Zitat Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking (FGCN 2007), Jeju (pp. 362–367). Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking (FGCN 2007), Jeju (pp. 362–367).
10.
Zurück zum Zitat Kumar, R., & Kumar, V. (2015). An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Computer Science,48, 472–479.CrossRef Kumar, R., & Kumar, V. (2015). An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Computer Science,48, 472–479.CrossRef
11.
Zurück zum Zitat Rana, V., Gupta, S., & Rana, A. (2015). EMAODV: Technique to prevent collaborative attacks in MANETs. Procedia Computer Science,70, 137–145.CrossRef Rana, V., Gupta, S., & Rana, A. (2015). EMAODV: Technique to prevent collaborative attacks in MANETs. Procedia Computer Science,70, 137–145.CrossRef
12.
Zurück zum Zitat Su, M.-Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications,34, 107–117.CrossRef Su, M.-Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications,34, 107–117.CrossRef
13.
Zurück zum Zitat Ragha, L., Marathe, N., & Choudhury, D. R. (2015). Implementing and improving the performance of AODV by receive reply method and securing it from black hole attack. Procedia Computer Science,45, 564–570.CrossRef Ragha, L., Marathe, N., & Choudhury, D. R. (2015). Implementing and improving the performance of AODV by receive reply method and securing it from black hole attack. Procedia Computer Science,45, 564–570.CrossRef
14.
Zurück zum Zitat Alameri, I., Onaizah, A. N., & Kamel, M. B. M. (2017) STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET. In IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC), Chongqing (pp. 1278–1282). Alameri, I., Onaizah, A. N., & Kamel, M. B. M. (2017) STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET. In IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC), Chongqing (pp. 1278–1282).
15.
Zurück zum Zitat Yamamoto, R., Tanaka, Y., & Yang, B. (2012). Historical evidence based trust management strategy against black hole attacks in MANET. In 14th International conference on advanced communication technology (ICACT), PyeongChang (pp. 394–399). Yamamoto, R., Tanaka, Y., & Yang, B. (2012). Historical evidence based trust management strategy against black hole attacks in MANET. In 14th International conference on advanced communication technology (ICACT), PyeongChang (pp. 394–399).
16.
Zurück zum Zitat Bhandare, A. S., & Patil, S. B. (2015). Securing MANET against co-operative black hole attack and its performance analysis—A case study. In International conference on computing communication control and automation, Pune (pp. 301–305). Bhandare, A. S., & Patil, S. B. (2015). Securing MANET against co-operative black hole attack and its performance analysis—A case study. In International conference on computing communication control and automation, Pune (pp. 301–305).
17.
Zurück zum Zitat Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In 3rd International conference on advanced computing and communication technologies (ACCT), Rohtak (pp. 254–260). Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In 3rd International conference on advanced computing and communication technologies (ACCT), Rohtak (pp. 254–260).
18.
Zurück zum Zitat Sminesh, C. N., & Arathy, K. S. (2016). A novel approach for detection of single and collaborative black hole attacks in MANET. Procedia Technology,25, 264–271.CrossRef Sminesh, C. N., & Arathy, K. S. (2016). A novel approach for detection of single and collaborative black hole attacks in MANET. Procedia Technology,25, 264–271.CrossRef
Metadaten
Titel
Random-Session and K-Neighbour Based Suspected Node Analysis Approach for Cooperative Blackhole Detection in MANET
verfasst von
Kapil Juneja
Publikationsdatum
17.08.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06711-5

Weitere Artikel der Ausgabe 1/2020

Wireless Personal Communications 1/2020 Zur Ausgabe