Defense Against Co-Operative Black-hole Attack and Gray-hole Attack in MANET

  • Authors

    • Niranjan Panda
    • Binod Kumar Pattanayak
    2018-06-25
    https://doi.org/10.14419/ijet.v7i3.4.16752
  • Security, Attacks, vulnerabilities, Black-hole, Gray-hole, routing protocols.
  • Abstract

    Mobile Ad-hoc networks (MANETs) can be termed as an autonomous system created by the collaboration of a set of motile nodes communicating with one another through available wireless media and each node behaves as an end system, as well as a router for packet forwarding. Each node is allowed to move freely, change locations and configure them to form a network. Finding an optimal and efficient path between the sender and receiver node is the main aim of routing protocols. Multipath routing protocols show a better result in comparison to single path routing protocols, for data transmission from source to destination extending lifetime of the network. Along with that security in routing for a protected communication between nodes has become a prime concern as any attack during routing may interrupt data transmission, paralyzing the whole network. During packet transmission through multiple paths a number of attacks make come into action by the unauthenticated and compromised nodes present within the network and black-hole attack is one of them. So our objective is to design a multipath routing protocol that detects and avoids the path containing black-hole. Our paper proposes a way to defense the black-hole and gray-hole attacks with the help of intelligence in MANET.

     

     

  • References

    1. [1] Giordano, Silvia. "Mobile ad hoc networks." Handbook of wireless networks and mobile computing (2002): 325-346.

      [2] Yih-Chun, Hu, and Adrian Perrig. "A survey of secure wireless ad hoc routing." IEEE Security & Privacy 2.3 (2004): 28-39.

      [3] Perkins, Charles, Elizabeth Belding-Royer, and Samir Das. Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561. 2003.

      [4] Johnson, David B., David A. Maltz, and Josh Broch. "DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks." Ad hoc networking 5 (2001): 139-172.

      [5] Perkins, Charles E., and Pravin Bhagwat. "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers." ACM SIGCOMM computer communication review. Vol. 24. No. 4. ACM, 1994.

      [6] Chang, Jae-Hwan, and Leandros Tassiulas. "Energy conserving routing in wireless ad-hoc networks." INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. Vol. 1. IEEE, 2000.

      [7] Singh, Debabrata, Binod Kumar Pattanayak, and Chandan Kumar Panda. "Analysis of an improved energy balanced routing protocol for wireless sensor network." In Communication and Signal Processing (ICCSP), International Conference on, pp. 1807-1811. IEEE, 2016.

      [8] Rath, Mamata, Bibudhendu Pati, Binod Kumar Pattanayak, Chhabi Rani Panigrahi, and Joy Lal Sarkar. "Load balanced routing scheme for MANETs with power and delay optimisation." International Journal of Communication Networks and Distributed Systems 19, no. 4 (2017): 394-405.

      [9] Chandel, Jyotika, and Navneet Kaur. "Energy Consumption Optimization using Clustering in Mobile Ad-Hoc Network." International Journal of Computer Applications 168.12 (2017).

      [10] Deepa, J., and J. Sutha. "A new energy based power aware routing method for MANETs." Cluster Computing (2018): 1-8.

      [11] Panda, Niranjan, and Binod Kumar Pattanayak. "Energy aware detection and prevention of black hole attack in MANET." International Journal of Engineering and Technology (UAE) 7.2.6 (2018): 135-140.

      [12] Tarique, Mohammed, et al. "Survey of multipath routing protocols for mobile ad hoc networks." Journal of Network and Computer Applications 32.6 (2009): 1125-1143.

      [13] Stavrou, Eliana, and Andreas Pitsillides. "A survey on secure multipath routing protocols in WSNs." Computer Networks 54.13 (2010): 2215-2238.

      [14] Panda Pankajini, Gadnayak Khitish Ku., Panda Niranjan, “MANET Attacks and their Countermeasures: A Surveyâ€, International Journal of Computer Science and Mobile Computing, Vol. 2, Issue. 11, pp. 319 – 330, Nov 2013.

      [15] Kim, Gisung, Younggoo Han, and Sehun Kim. "A cooperative-sinkhole detection method for mobile ad hoc networks." AEU-International Journal of Electronics and Communications 64.5 (2010): 390-397.

      [16] Pathan, Al-Sakib Khan, ed. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press, 2016.

      [17] Abbas, Sohail, et al. "Lightweight sybil attack detection in manets." IEEE systems journal 7.2 (2013): 236-248.

      [18] Patel, Anal, Nimisha Patel, and Rajan Patel. "Defending against wormhole attack in MANET." Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on. IEEE, 2015.

      [19] Tamilselvan L, Sankaranarayanan V. , “Prevention of blackhole attack in MANETâ€, IEEE 2nd International Conference, pp. 21-21, 2007.

      [20] Lee, Seungjoon, Bohyung Han, and Minho Shin. "Robust routing in wireless ad hoc networks." In Parallel Processing Workshops, 2002. Proceedings. International Conference on, pp. 73-78. IEEE, 2002.

      [21] Al-Shurman M, Yoo SM, Park S., “ Black hole attack in mobile ad hoc networksâ€, In Proceedings of the 42nd annual Southeast regional conference, pp. 96-97, 2004.

      [22] Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y., “Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning methodâ€, Internation Journal of Network Security, Vol-5(3), pp.338-46, 2007.

      [23] Gerhards-Padilla, Elmar, Nils Aschenbruck, Peter Martini, Marko Jahnke, and Jens Tolle. "Detecting black hole attacks in tactical MANETs using topology graphs." In Local Computer Networks, 2007. LCN 2007. 32nd IEEE Conference on, pp. 1043-1052, IEEE, 2007.

      [24] Medadian M, Yektaie MH, Rahmani AM., “ Combat with Black Hole Attack in AODV routing protocol in MANETâ€, First IEEE Asian Himalayas International Conference, pp. 1-5, 2009 .

      [25] Zhang X, Sekiya Y, Wakahara Y., “Proposal of a method to detect black hole attack in MANETâ€, IEEE International Symposium In Autonomous Decentralized Systems, pp. 1-6, 2009.

      [26] Chavda KS, Nimavat AV., “ Removal of black hole attack in AODV routing protocol of MANETâ€, IEEE Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1-5, 2013.

      [27] Xiaopeng G, Wei C., “A novel gray hole attack detection scheme for mobile ad-hoc networksâ€, NPC Workshops. IFIP International Conference, pp. 209-214, 2007.

      [28] Sen, Jaydip, M. Girish Chandra, S. G. Harihara, Harish Reddy, and P. Balamuralidhar. "A mechanism for detection of gray hole attack in mobile Ad Hoc networks." In Information, Communications & Signal Processing, 2007 6th International Conference on, pp. 1-5. IEEE, 2007.

      [29] Dhamade CS, Deshmukh HR., “An efficient way to minimize the impact of the grayhole attack in ad hoc networkâ€, International Journal of Emerging Technology and Advanced Engineering. Vol-2(2), pp.106-110, 2012.

      [30] Kariya DG, Kathole AB, Heda SR., “Detecting black and gray hole attacks in mobile ad hoc network using an adaptive methodâ€, International Journal Of Emerging Technology And Advanced Engineering. 2(1), pp.775-80.2012.

  • Downloads

  • How to Cite

    Panda, N., & Kumar Pattanayak, B. (2018). Defense Against Co-Operative Black-hole Attack and Gray-hole Attack in MANET. International Journal of Engineering & Technology, 7(3.4), 84-89. https://doi.org/10.14419/ijet.v7i3.4.16752

    Received date: 2018-08-03

    Accepted date: 2018-08-03

    Published date: 2018-06-25