Preventing Black Hole Attack in AODV using timer-based detection mechanism

Nidhi Choudhary, L. Tharani
{"title":"Preventing Black Hole Attack in AODV using timer-based detection mechanism","authors":"Nidhi Choudhary, L. Tharani","doi":"10.1109/SPACES.2015.7058198","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc networks (MANET) are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. MANET do not have centralized administration, here nodes act as both host as well as router and communicate by forwarding packets for each other in multi hop way, because of the fundamental characteristics like, the open medium, dynamic network topology, lack of centralized monitoring and management these networks are particularly vulnerable to various types of attacks. One of the routing protocol being used for wireless network is Ad hoc on demand distance vector (AODV). Black hole is one of the attack that is launched on AODV. In this attack, the attacker claims the shortest route to the destination and hinders the communication by dropping all the packets. In this paper, a new solution against the Black Hole attack is proposed. This paper demonstrates a timer based detection approach for identifying black hole node. In network layer we proposed a Timer based method to overhear the next node action. The simulation results using EXata-Cyber shows that in a dynamic network most of the malicious nodes can be detected and that results in an improved packet delivery ratio.","PeriodicalId":432479,"journal":{"name":"2015 International Conference on Signal Processing and Communication Engineering Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Signal Processing and Communication Engineering Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPACES.2015.7058198","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 31

Abstract

Mobile ad hoc networks (MANET) are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. MANET do not have centralized administration, here nodes act as both host as well as router and communicate by forwarding packets for each other in multi hop way, because of the fundamental characteristics like, the open medium, dynamic network topology, lack of centralized monitoring and management these networks are particularly vulnerable to various types of attacks. One of the routing protocol being used for wireless network is Ad hoc on demand distance vector (AODV). Black hole is one of the attack that is launched on AODV. In this attack, the attacker claims the shortest route to the destination and hinders the communication by dropping all the packets. In this paper, a new solution against the Black Hole attack is proposed. This paper demonstrates a timer based detection approach for identifying black hole node. In network layer we proposed a Timer based method to overhear the next node action. The simulation results using EXata-Cyber shows that in a dynamic network most of the malicious nodes can be detected and that results in an improved packet delivery ratio.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于定时器的AODV检测机制防止黑洞攻击
移动自组织网络(MANET)是具有动态拓扑结构的自组织移动节点的集合,没有固定的基础结构。MANET没有集中管理,这里的节点既充当主机又充当路由器,以多跳的方式相互转发数据包进行通信,由于其媒体开放、网络拓扑动态、缺乏集中监控和管理等基本特点,这些网络特别容易受到各种类型的攻击。无线网络中使用的路由协议之一是按需距离矢量(AODV)。黑洞是对AODV发起的攻击之一。在这种攻击中,攻击者声称到达目的地的路由最短,并通过丢弃所有数据包来阻止通信。本文提出了一种新的针对黑洞攻击的解决方案。提出了一种基于定时器的黑洞节点识别方法。在网络层,我们提出了一种基于定时器的监听下一个节点动作的方法。利用EXata-Cyber进行的仿真结果表明,在动态网络中可以检测到大多数恶意节点,从而提高了数据包的投递率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
BTSWASH: Brain tumour segmentation by water shed algorithm Path loss prediction analysis by ray tracing approach for NLOS indoor propagation Enhancing the performance of AOA estimation in wireless communication using the MUSIC algorithm Preventing black hole attacks in MANETs using secure knowledge algorithm Redundancy based WEP routing technology (IoT-WSN)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1