Recognition and Removal of Black Hole Attack for Secure Communication in MANETs

Authors

  • S. Rakesh kumar  Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, Tamilnadu, India
  • N. Gayathri  Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, Tamilnadu, India
  • T. Manikandan  Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, Tamilnadu, India

Keywords:

Black Hole, MANETs, Routing Protocols, NS2

Abstract

Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANETs). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. Previously the works done on security issues in MANETs were based on reactive routing protocol like Ad-Hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANETs. The scope of this paper is to develop a technique to identify Black Hole Attack and then removal of Black Hole Attack in Mobile Ad-hoc Networks (MANETs). Simulation is done with Network Simulator (NS2).

References

  1. P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 2002.
  2. K. Biswas and Md. Liaqat Ali, “Security Threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology Sweden, March 2007.
  3. E. A .Mary Anita and V. Vasudevan, “Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Adhoc networks using Certificate Chaining”, International Journal of Computer Applications (0975 – 8887) Vol. 1, Issue 12, pp. 21-28, 2010
  4. Umang S, Reddy BVR, Hoda MN, “Enhanced Intrusion Detection System for Malicious Node Detection in Ad Hoc Routing Protocols using Minimal Energy Consumption”, IET Communications Vol.4, Issue17, pp2084–2094. doi: 10.1049/ietcom. 2009.
  5. G. A. Pegueno and J. R. Rivera, “Extension to MAC 802.11 for performance Improvement in MANET”, Karlstads University, Sweden, December 2006.
  6. N. Bhalaji and A. Shanmugam, “A Trust Based Model to Mitigate Black Hole Attacks in DSR Based Manet”, European Journal of Scientific Research, Vol.50 No.1, pp.6-15, 2011
  7. Latha Tamilselvan and Dr. V Sankaranarayanan, “Prevention of Blackhole Attack in MANET”, the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, 0-7695-2842-2/07, 2007.
  8. Chang Wu Yu, Tung-Kuang Wu, Rei Heng Cheng, and Shun Chao Chang, “A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks”, PAKDD 2007 Workshops, LNAI 4819, pp. 538–549, 2007
  9. Santhosh Krishna B V, Mrs.Vallikannu A.L, “Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism” International Journal of Scientific & Engineering Research, Vol. 1, Issue 3, ISSN 2229-5518, December-2010.
  10. N.Beijar, “Zone Routing Protocol (ZRP)”, Networking Laboratory, Helsinki University of Technology.
  11. Tsou P-C, Chang J-M, Lin Y-H, Chao H-C, Chen J-L, “Developing a BDSR Scheme to Avoid Black Hole Attack Based on Proactive and Reactive Architecture in MANETs”. Paper presented at the 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, 13-16 Feb. 2011.
  12. Prof. Sanjeev Sharma, Rajshree, Ravi Prakash, Vivek, “Bluff-Probe Based Black Hole Node Detection and prevention”, IEEE International Advance Computing Conference (IACC 2009), 7 March 2009.
  13. Official NS-2 website. http://www.isi.edu/nsnam/ns

Downloads

Published

2015-12-25

Issue

Section

Research Articles

How to Cite

[1]
S. Rakesh kumar, N. Gayathri, T. Manikandan, " Recognition and Removal of Black Hole Attack for Secure Communication in MANETs, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 6, pp.527-534, November-December-2015.