An Efficient Approach for Prevention of Blackhole Attack in MANET

Authors

  • Jyoti Dhanke Department of Engineering Science (Mathematics), Bharati Vidyapeeth's College of Engineering, Lavale, Pune 412115, Maharashtra, India
  • Shishir Rastogi Roots Group of Institutions, Bijnor
  • Kamaljeet Singh School of Computer Application, Lovely Professional University Phagwara Punjab
  • Komal Saxena Amity Institute of Information Technology, Amity University, Noida
  • Kaushal Kumar Department of Computer Science & Engineering, Manav Rachna International Institute of Research and Studies Faridabad, India
  • Prateek Mishra Department of Computer Science and Engineering, Asia Pacific Institute of Information Technology SD INDIA, PANIPAT, HARYANA

Keywords:

MANET, Blackhole attack, DoS attack, AODV, Routing Attack

Abstract

A structure known as a Mobile Ad-Hoc Network (MANET) is formed when mobile nodes come together to communicate with each other, offering a broad spectrum of applications. MANET, characterized by its lack of a central monitoring authority and absence of a fixed infrastructure, gains popularity due to its ubiquitous nature. However, the openness of MANET introduces security challenges that require detection and resolution. One prevalent issue is the Packet Drop Attack, wherein an intruder falsely claims to possess the shortest route to the destination, dropping all packets without forwarding them. This paper addresses the mitigation of this problem, focusing on the optimal solution for the Blackhole Attack. Researchers employ various techniques, such as Opinion-based, Trust-based, Intrusion Detection, Crypto-based, and Destination Sequence Number (DSN) based methods. The proposed method specifically employs DSN, where the attacker lures packets by sending a forged RREP message to the source node. To thwart this, the DSN in the proposed method is compared to a threshold value, allowing the rejection of forged RREP messages.

Downloads

Download data is not yet available.

References

Singh A, and Hasan M, “An Analysis of Prevention Mechanism of Blackhole Attack” 2016 International Conference on Innovations in information Embedded and Communication Systems (ICIIECS’16), Tamilnadu, vol. 1, pp. 117-122.

Murthy, C. Siva Ram, and B. S. Manoj. Ad hoc wireless networks: Architectures and protocols. Pearson education, 2004.

Aware, Anand, and Kiran Bhandari. "Prevention of black hole attack on AODV in MANET using hash function." Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2014 3rd International Conference on. IEEE, 2014.

Clausen, Thomas, et al. "The optimized link state routing protocol, evaluation through experiments and simulation." IEEE Symposium on" Wireless Personal Mobile Communications. 2001.

Ogier, Richard, Fred Templin, and Mark Lewis. Topology dissemination based on reverse-path forwarding (TBRPF). No. RFC 3684. 2004.

Perkins, Charles E., and Pravin Bhagwat. "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers." ACM SIGCOMM computer communication review. Vol. 24. No. 4. ACM, 1994.

Chiang, Ching-Chuan, et al. "Routing in clustered multihop, mobile wireless networks with fading channel." proceedings of IEEE SICON. Vol. 97. No. 1997.4. 1997.

Perkins, Charles, Elizabeth Belding-Royer, and Samir Das. Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561. 2003.

Johnson, David B., and David A. Maltz. "Dynamic source routing in ad hoc wireless networks." Mobile computing. Springer US, 1996. 153-181.

Park, Vincent D., and M. Scott Corson. "A highly adaptive distributed routing algorithm for mobile wireless networks." INFOCOM'97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution., Proceedings IEEE. Vol. 3. IEEE, 1997.

Chakeres, Ian D., and Joseph P. Macker. "Mobile ad hoc networking and the IETF." ACM SIGMOBILE Mobile Computing and Communications Review 10.1 (2006): 58-60.

Haas, Zygmunt J. "A new routing protocol for the reconfigurable wireless networks." Universal Personal Communications Record, 1997. Conference Record., 1997 IEEE 6th International Conference on. Vol. 2. IEEE, 1997.

M.Joa-Ng and I.T.Lu, “A Peer -to-Peer Zone-Based Two-Level Link State Routing for Mobile Ad Hoc Networks,” IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, pp. 1415-1425, August 1999.

Macker, Joseph. "Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations." (1999).

Roth, Uwe. "Cluster Based Routing Protocol." (2011).

Iwata, Atsushi, et al. "Scalable routing strategies for ad hoc wireless networks." Selected Areas in Communications, IEEE Journal on 17.8 (1999): 1369-1379.

Agrawal, Sudhir, Sanjeev Jain, and Sanjeev Sharma. "A survey of routing attacks and security measures in mobile ad-hoc networks." arXiv preprint arXiv:1105.5623 (2011).

Jaiswal, Pooja, and Dr Rakesh Kumar. "Prevention of Black Hole Attack in MANET." IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN (2012): 2250-3501.

Sachan, Preeti, and Pabitra Mohan Khilar. "Securing AODV routing protocol in MANET based on cryptographic authentication mechanism." International Journal of Network Security & Its Applications 3.5 (2011): 229.

Deng, Hongmei, Wei Li, and Dharma P. Agrawal. "Routing security in wireless ad hoc networks." Communications Magazine, IEEE 40.10 (2002): 70-75.

Varshney, Tarun, Toshi Sharma, and Parmanand Sharma. "Implementation of watchdog protocol with AODV in mobile ad hoc network." Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on. IEEE, 2014.

Maheshwar, Kamini, and Divakar Singh. "Black Hole Effect Analysis and Prevention through IDS in MANET Environment." European Journal of Applied Engg. and Scientific Research (2012).

Harmandeep Singh and Manpreet Singh. "Securing MANETs Routing Protocol under Black Hole Attack." International Journal of Innovative Research in Computer and Communication Engineering 1.4 (2013): 808-813.

Latha Tamilselvan and V. Sankaranarayanan. "Prevention of blackhole attack in MANET." Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on. IEEE, 2007.

Tirthankar Ghosh, Niki Pissinou, and Kia Makki. "Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks." Local Computer Networks, 2004. 29th Annual IEEE International Conference on. IEEE, 2004

Kumar, V., & Kumar, R. (2015). An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network. Procedia Computer Science, 48, 472-479.

Kumar, V., & Kumar, R. (2015, June). A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs. In International Conference for Information Technology and Communications (pp. 171-183). Springer International Publishing.

Kumar, V., & Kumar, R. (2016). Prevention of Blackhole Attack using Certificateless Signature (CLS) Scheme in MANET. Security Solutions for Hyperconnectivity and the Internet of Things, 130.

Gurung, S. and Chauhan, S., 2018. A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Networks, 24(8), pp.2957-2971.

Shukla, M., Joshi, B.K. and Singh, U., 2021. Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. Wireless Personal Communications, 121(1), pp.503-526

Talukdar, M.I., Hassan, R., Hossen, M.S., Ahmad, K., Qamar, F. and Ahmed, A.S., 2021. Performance improvements of AODV by black hole attack detection using IDS and digital signature. Wireless Communications and Mobile Computing, 2021.

Kumar, V. and Kumar, R., 2015. An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Computer Science, 48, pp.472-479.

Kumar, V. and Kumar, R., 2015. An optimal authentication protocol using certificateless ID-based signature in MANET. In Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings 3 (pp. 110-121). Springer International Publishing.

Kumar, V. and Kumar, R., 2015, April. Detection of phishing attack using visual cryptography in ad hoc network. In 2015 International Conference on Communications and Signal Processing (ICCSP) (pp. 1021-1025). IEEE.

Kumar, V., Shankar, M., Tripathi, A.M., Yadav, V., Rai, A.K., Khan, U. and Rahul, M., 2022. Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme. Journal of Scientific & Industrial Research, 81(10), pp.1061-1072.

Narayan, Vipul, et al. "7 Extracting business methodology: using artificial intelligence-based method." Semantic Intelligent Computing and Applications 16 (2023): 123.

Narayan, Vipul, et al. "A Comprehensive Review of Various Approach for Medical Image Segmentation and Disease Prediction." Wireless Personal Communications 132.3 (2023): 1819-1848.

Mall, Pawan Kumar, et al. "Rank Based Two Stage Semi-Supervised Deep Learning Model for X-Ray Images Classification: AN approach toward tagging unlabeled medical dataset." Journal of Scientific & Industrial Research (JSIR) 82.08 (2023): 818-830.

Narayan, Vipul, et al. "Severity of Lumpy Disease detection based on Deep Learning Technique." 2023 International Conference on Disruptive Technologies (ICDT). IEEE, 2023.

Saxena, Aditya, et al. "Comparative Analysis Of AI Regression And Classification Models For Predicting House Damages İn Nepal: Proposed Architectures And Techniques." Journal of Pharmaceutical Negative Results (2022): 6203-6215.

Kumar, Vaibhav, et al. "A Machine Learning Approach For Predicting Onset And Progression"“Towards Early Detection Of Chronic Diseases “." Journal of Pharmaceutical Negative Results (2022): 6195-6202.

Chaturvedi, Pooja, Ajai Kumar Daniel, and Vipul Narayan. "Coverage Prediction for Target Coverage in WSN Using Machine Learning Approaches." (2021).

Chaturvedi, Pooja, A. K. Daniel, and Vipul Narayan. "A Novel Heuristic for Maximizing Lifetime of Target Coverage in Wireless Sensor Networks." Advanced Wireless Communication and Sensor Networks. Chapman and Hall/CRC 227-242.

Dhanke, Jyoti, Naveen Rathee, M. S. Vinmathi, S. Janu Priya, Shafiqul Abidin, and Mikiale Tesfamariam. Smart Health Monitoring System with Wireless Networks to Detect Kidney Diseases. Computational Intelligence and Neuroscience 2022 (2022).

Atul, Dhanke Jyoti, R. Kamalraj, G. Ramesh, K. Sakthidasan Sankaran, Sudhir Sharma, and Syed Khasim. A machine learning based IoT for providing an intrusion detection system for security. Microprocessors and Microsystems 82 (2021).

Dhanke, Jyoti, M. Pradeepa, R. Karthik, Veeresh Rampur, I. Poonguzhali, and Hemanand Chittapragada. Heterogeneous sensor data fusion acquisition model for medical applications. Measurement: Sensors 24 (2022): 100552.

Jagan, S.; Ashish, A.; Mahdal, M.; Isabels, K.R.; Dhanke, J.; Jain, P.; Elangovan, M. A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms. Mathematics 2023, 11, 2840.

Downloads

Published

12.01.2024

How to Cite

Dhanke, J. ., Rastogi, S. ., Singh, K. ., Saxena, K. ., Kumar , K. ., & Mishra, P. . (2024). An Efficient Approach for Prevention of Blackhole Attack in MANET. International Journal of Intelligent Systems and Applications in Engineering, 12(12s), 743–752. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4560

Issue

Section

Research Article

Most read articles by the same author(s)