Securing cluster based routing against cooperative black hole attack in mobile ad hoc network

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Mobile ad hoc networks (MANETs) are wireless infrastructure-less network consisting collection of autonomous nodes that communicate with each other in decentralized manner. Security remains major challenge due to its some unique characteristics like open medium, mobility and hence topology changes. Therefore, routing protocol for MANETs is much vulnerable to attacks. Black Hole is a type of attack, where malicious node falsely advertises itself having the shortest or optimal path to the destination node. This attack is more dangerous while a group of nodes are cooperating with each other.The objective of this paper is to design cluster based routing protocol and prevent it from the black hole attack. The simulation results show improvement in packet delivery ratio and control overhead.


  • Keywords


    Black Hole Attack; MANETs; Routing and Security.

  • References


      [1] Ram Ramanathan and Jason Redi, “A Brief Overview of Ad hoc Networks: Challenges and Directions,” IEEE Computer Magazine, pp.20-22, 2002.

      [2] Sheltami Tarek, “Ad hoc Network Overview,” http://www.ccse.kfupm.edu.sa/~tarek, Ad hoc network Technology, 2003.

      [3] Ranjan, Rakesh, Nirnemesh Kumar Singh, and Ajay Singh, “Security issues of black hole attacks in MANET,” International Conference on Computing, Communication & Automation (ICCCA), IEEE, 2015. https://doi.org/10.1109/CCAA.2015.7148419.

      [4] Kishor Jyoti Sarma, Rupam Sharma and Rajdeep Das, “A Survey of Black Hole Attack Detection in MANET,” IEEE, 2014.https://doi.org/10.1109/ICICICT.2014.6781279.

      [5] Changling Liu and Jorg Kaiser, “A Survey of Mobile Ad hoc Network Routing Protocols,” Univ. of Ulm, Tech. Rep.Series, 2005.

      [6] Krishna Gorantala, “Routing Protocols in Mobile Ad hoc Networks,” M. thesis in Computing Science, Umea University, Sweden, 2006.

      [7] S. Kalwar, “Introduction to reactive protocol,” vol. 29, pp. 34-35, IEEE, 2010.

      [8] Geetha Jayakumar, and G. Gopinath, “Ad Hoc Mobile Wireless Networks Routing Protocols – A Review,” Journal of Computer Science 3 (8), pp.574-582, 2007.https://doi.org/10.3844/jcssp.2007.574.582.

      [9] Mingliang Jiang, Jinyang Li and Y. C. Tay, “Cluster Based Routing Protocol (CBRP),” Internet Draft, draft-ietf-manet-cbrp-spec-01.txt, 1999.

      [10] Mohammad Al-Shurman and Seong-Moo Yoo, “Black Hole Attack in Mobile Ad Hoc Networks,” 42nd Annual Southeast Regional conference, pp.96-97, 2004.https://doi.org/10.1145/986537.986560.

      [11] Ashutosh Bhardwaj, “Secure Routing in DSR to Mitigate Black Hole Attack,” International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), pp.985-989, IEEE, 2014.https://doi.org/10.1109/ICCICCT.2014.6993102.

      [12] Seryvuth Tan and Keecheon Kim, “Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs,” International Conference on High Performance Computing and Communications, pp.1159-1164, IEEE, 2013. https://doi.org/10.1109/HPCC.and.EUC.2013.164.

      [13] Bhakti Thakre and S.V.Sonekar, “An Empirical Approach for the Detection of Malicious Node in Cluster Based Adhoc Wireless Networks,” International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 3(6), pp.651 – 658, 2014.

      [14] Pandi Selvam Raman,“Black Hole Attack Prevention on AODV Routing Protocol using Clustering Approach (CBAODV) in MANET,” International Journal of Engineering and Technology(IJET), in press.https://doi.org/10.21817/ijet/2017/v9i6/170906306.

      [15] R. Pandi Selvam and V.Palanisamy, “An Efficient Cluster-Based Multi-Source Multicast Routing Protocol in Mobile Ad hoc Networks,” International Conference on Communication Control and Computing Technologies, pp.700-706, IEEE 2010.https://doi.org/10.1109/ICCCCT.2010.5670749.


 

View

Download

Article ID: 9725
 
DOI: 10.14419/ijet.v7i1.9.9725




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.