An Efficient multi stage security model based on cross layer mechanism for identifying and preventing black hole attack in wireless ad-hoc networks

  • Authors

    • S Jagadeesan
    • V Parthasarathy
    2018-05-29
    https://doi.org/10.14419/ijet.v7i2.31.13445
  • Mobile adhoc network, cross layer, malicious attacks, blackhole attack, security in wireless adhoc networks.
  • Mobile Adhoc Network (MANET) is one of the popular and highly demanded networks functioning under wireless adhoc network. It has high demand by various emerging applications in the entire world. MANET and its necessities are increasing day by day. MANET and its various components like node, route and etc., are too dynamic regarding creating, deployment, mobility, speed, join and disconnect from the network. MANET does not require any existing infrastructure whereas it starts functions in any place at any time. Due these reasons various malicious activities are created dynamically and it degrades the performance of the network. This paper focused on detecting and identifying malicious activities one who affects the data directly.  Such kind of malicious activity is blackhole attack where it destroys the data during transmission in a route. In order to detect and eliminated blackhole attack this paper focused on monitoring and investigating various functionalities of the network using a Multi Stage Security Model (MSSM). The MSSM is used for detecting and preventing blackhole attacks in MANET which involves investigating cross layer functionalities during data transmission. And it also investigates and analyzes the entire information that is available in the network. This proposed MSSM is simulated in Network Simulation-2 software and the results are verified and the performance is evaluated.

     

  • References

    1. [1] Seungjin P & Seong MY, “An efficient reliable one-hop broadcast in mobile ad hoc networksâ€, Ad Hoc Netw., Vol.11, No.1, (2013), pp.19-28.

      [2] Goldsmith J & Wicker SB, “Design challenges for energy constrained ad-hoc wireless networksâ€, IEEE Wireless Commun., Vol.9, (2002), pp.8-27.

      [3] Kawadia V & Kumar PR, “Principles and protocols for power control in wireless ad-hoc networksâ€, IEEE J Selected Areas Commun, Part I, Vol.23, No.1, (2005), pp.78-88.

      [4] Conti M, Maselli G & Turi G, “Cross-layering in mobile ad-hoc network designâ€, IEEE Comput Soc., (2004), pp.48-51.

      [5] Alkhwildi N, Khan S, Loo KK & Al-Raweshidy HS, “Adaptive link with routing protocols using cross-layer communication for MANETâ€, Wseas transactions on communications, Vol.6, No.11, (2007).

      [6] Ramachandran SS, “Received signal strength based cross-layer designs in mobile ad-hoc networksâ€, IETE Tech Rev., Vol.25, No.4, (2009), pp.192-200.

      [7] Mamata R, Bibudhendu P & Binod KP, “Cross layer based QoS platform for multimedia transmission in MANETâ€, International Conference on Intelligent Systems and Control, (2017), pp.402-407.

      [8] Sun Q, Li L, Chen N & Sadia A, “A Cross-layer Design for Broadcast Algorithm in MANETsâ€, Networking and Mobile Computing, (2006), pp.1-4.

      [9] Yu L, Yang L & Hong M, “A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networksâ€, Security and Privacy for Emerging Areas in Communications Networks, (2005).

      [10] Min HS, Ji BL & Yi PL, “Cluster-based Cooperative Back Proppagation Network Approach for Intrusion Detection in MANETâ€, IEEE10th International Conference on Computer and Information Technology (CIT), (2010), pp.1627-1632.

      [11] Thamilarasu G, Mishra S & Sridhar R, “A cross-layer approach to detect jamming attacks in wireless ad hoc net-worksâ€, Military Communications Conference, (2006), pp.1–7

      [12] Kotov V & Vasilev V, “A survey of Modern Advances in Network Intrusion Detection,†13th International Workshop on Computer Scince and Information Technology CSIT, (2011), pp.18–21.

      [13] John FCJ, Amitabha DB, Bu SL & Boon CS , “CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETSâ€, Elsevier Computer Networks, (2010).

      [14] Santoshi K, Hidehisa N, Nei K, Abbas J & Yoshiaki N, “A Self-Adaptive Intrusion Detection Method for AODV-based Mobile Ad Hoc Networks,†IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, (2005), pp.773-780.

      [15] Rakesh S, Kyong HH, Dong YC & Seung JH, “A Novel Cross Layer Intrusion Detection System in MANETâ€, IEEE 14th International Conference on Advanced Information Networking and Applications, (2010), pp.647-654.

      [16] Arjun PA & Patrick T, “Towards Secure Multi-path Routing for Wireless Mobile Ad-Hoc Networks: A Cross-layer Strategyâ€, 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON),(2011), pp.146–148.

  • Downloads

  • How to Cite

    Jagadeesan, S., & Parthasarathy, V. (2018). An Efficient multi stage security model based on cross layer mechanism for identifying and preventing black hole attack in wireless ad-hoc networks. International Journal of Engineering & Technology, 7(2.31), 212-218. https://doi.org/10.14419/ijet.v7i2.31.13445