Energy aware detection and prevention of black hole attack in MANET
-
2018-03-11 https://doi.org/10.14419/ijet.v7i2.6.10139 -
Ant Colony Optimization, Black-hole and gray-hole attack, digital signatures, intelligent routing protocol, MANET, watchdog and path rater. -
Abstract
Energy and security are the two vital components of Mobile Ad-hoc Networks (MANETs). During routing finding an optimal path from sender to receiver sense of path length (number of hops), longevity (battery life) and security becomes an essential requirement. Variety of schemes are proposed by the researchers for finding the shortest path along with energy saving and protecting from attacks Black-hole and gray-hole attacks are some of the most harmful attacks against MANET communication and needs attention. These attacks may cause by insider or outsider malicious node(s) who may drop packets or misroute the information during communication from sender node to receiver node. In our study we proposed an intelligent routing protocol based on Ant Colony Optimization (ACO) technique that finds shortest path from source to destination, applies the concept of power aware techniques to save energy increasing the longevity of the link avoiding link failure and also uses the concept of digital signatures, watchdog and path rater for detection and avoidance ofblack-hole and gray-hole attacks. Simulation study of the proposed scheme is made over some network parameters and found to be efficient in comparison to the basic AODV routing protocol.
-
References
[1] Pankajini Panda, Khitish Ku. Gadnayak, Niranjan Panda, “MANET Attacks and their Countermeasures: A Surveyâ€, International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 2, no. 11, pp. 319-330, 2013.
[2] Scott, K., Bambos, N., 1996. Routing and channel assignment for low power transmission in PCS. In: Proc. Intl. Conf. Universal Personal Communications (ICUPC’96), Cambridge, MA, pp. 498–502.
[3] Singh, S., Woo, M., Raghavendra, C.S., 1998. Power-aware routing in mobile ad hocnetworks. In: Proc. 4th Annual ACM/IEEE Intl. Conf. Mobile Computing and Networking, Dallas, TX, pp. 181–190.
[4] Toh, C.-K., 2001. Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networksâ€. IEEE Communications Magazine 39 (June (6)), 138–147.
[5] Kim, J., Garcia-Luna-Aceves, J., Obraczka, K., Cano, J.-C., Manzoni, P., 2002. Power aware routing based on the energy drain rate for mobile ad hoc networks. In: Proc. 11th Intl. Conf. Comp. Comm. Netw., pp. 565–569.
[6] Liang, W., Yuansheng, Y., 2004. Maximizing battery life routing in wireless ad hocnetworks. In: Proceedings of the 37th Hawaii International Conference on System Sciences, Hawaii, USA.
[7] Srinivas, A., Modiano, E., 2005. Finding minimum energy disjoint paths in wireless ad-hoc networks. Wireless Netw. 11, 401–417.
[8] Yuen, W.H., Sung, C.W., 2003. On energy efficiency and network connectivity of mobile ad hoc networks. In: Proc. 23rd IEEE Intl. Conf. Distrib. Comput. Sys. (ICDCS’03), Rhode Island, May 2003, pp. 38–45.
[9] Al-Shurman, Mohammad, Seong-Moo Yoo, and Seungjin Park. "Black hole attack in mobile ad hoc networks." Proceedings of the 42nd annual Southeast regional conference. ACM, 2004.
[10] M. Chaitanya Kishore Reddy and BoyaSripriya, “A Study on Gray-hole Attacks in Mobile Ad-hoc Networksâ€, 2017 International Journal of Advance Technology and Innovative Research, vol 9, pp. 1634-1636, 2017.
[11] Biswas, Kamanashis, and Md Ali. "Security threats in mobile ad hoc network." (2007).
[12] Pequeño, Guillermo Alonso, and Javier Rocha Rivera. "Extension to MAC 802.11 for performance Improvement in MANET." (2007).
[13] Perkins, Charles E., and Pravin Bhagwat. "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers." ACM SIGCOMM computer communication review. Vol. 24. No. 4. ACM, 1994.
[14] Deng, Hongmei, Wei Li, and Dharma P. Agrawal. "Routing security in wireless ad hoc networks." IEEE Communications magazine 40.10 (2002): 70-75.
[15] VishvasKshirsagar, Ashok M. Kanthe, and Dina Simunic “Analytical approach towards packet drop attacks in mobile ad-hoc networks,†IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), IEEE, 2014.
[16] GayatriWahane, Ashok M. Kanthe, and Dina Simunic, “Detection of cooperative black hole attack using crosschecking with truelink in MANET,†International Conference on. Computational Intelligence and Computing Research (ICCIC), IEEE, 2014.
[17] Ayesha Siddiqua, Kotari Sridevi, and Arshad Ahmad Khan Mohammed, “Preventing black hole attacks in MANETs using secure knowledge algorithm,†International Conference on Signal Processing and Communication Engineering Systems (SPACES), IEEE, 2015.
[18] Nidhi Choudhary, and Lokesh Tharani, “Preventing black hole attack in AODV using timer-based detection mechanism,†International conference on Signal processing and communication engineering systems (SPACES), IEEE, 2015.
[19] Ali Dorri and HamedNikdel, “A new approach for detecting and eliminating cooperative black hole nodes in MANET,†7th Conference on Information and Knowledge Technology (IKT), IEEE, 2015.
[20] Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, HanChieh Chao, and Chin-Feng Lai, Member, IEEE "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait" (2015)
[21] M. A. Abdelshafy and P. J. B. King, "Resisting blackhole attacks on MANETs," 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, 2016, pp. 1048-1053.
[22] S. Dixit, P. Pathak and S. Gupta, "A novel approch for gray hole and black hole detection and prevention," 2016 Symposium on Colossal Data Analysis and Net-working (CDAN), Indore, 2016, pp. 1-6.
[23] Harn, Lein, Manish Mehta, and Wen-Jung Hsin. "Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA)." IEEE Communications Letters 8.3 (2004): 198-200.
[24] Marti, Sergio, et al. "Mitigating routing misbehavior in mobile ad hoc networks." Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, 2000.
[25] Misra, Sudip, et al. "An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks." Journal of systems and software 83.11 (2010): 2188-2199.
-
Downloads
-
How to Cite
Panda, N., & Kumar Pattanayak, B. (2018). Energy aware detection and prevention of black hole attack in MANET. International Journal of Engineering & Technology, 7(2.6), 135-140. https://doi.org/10.14419/ijet.v7i2.6.10139Received date: 2018-03-14
Accepted date: 2018-03-14
Published date: 2018-03-11