Prevention of Black Hole Attack in MANET

Main Article Content

C.Mohammed Gulzar
Dr.Ragini Kashyap

Abstract

The reliability in the transmission of data among the nodes will always degrade with the dynamic nature of Manet. Due to lack of security the manet is not protected against the attacks. Black Hole attack is the most common attack experienced by the Manet. To prevent the black hole attack, this paper addresses the security oriented solution to authenticate the routes selected during the route discovery process using the digital certificates. During the route discovery itself the digital certificate authentication avoids the black hole node. This methodology is implemented on AOMDV protocol.

Article Details

How to Cite
[1]
C.Mohammed Gulzar and Dr.Ragini Kashyap, “Prevention of Black Hole Attack in MANET”, Int. J. Comput. Eng. Res. Trends, vol. 2, no. 5, pp. 337–341, May 2015.
Section
Research Articles

References

K.Selvavinayaki, K.K.Shyam Shankar And Dr.E.Karthikeyan, “Security Enhanced Dsr Protocol To Prevent Black Hole Attacks In Manets”, International Journal Of Computer Applications Vol 7– No.11, October 2010, Pp.15-19.

Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, JohnDixon, and Kendall Nygard, “Prevention of Cooperative BlackHole Attack in Wireless Ad Hoc Networks”, 2003 International Conference on Wireless Networks (ICWN “03), Las Vegas,Nevada, USA.

E. A. Mary Anita and V. Vasudevan, Black Hole attack Prevention in multicast routing Protocols For MANETs Using Certificate Chaining, IJCA, Vol.1, No.12, pp. 22–29, 2010.

Tamilselvan, L. Sankaranarayanan, V. “Prevention of Black hole Attack in MANET”, Journal of Networks, Vol.3, No.5, May 2008.

D. Djenouri, L. Khelladi and N. Badache, A Survey of SecurityIssues in Mobile Ad Hoc and Sensor Networks, IEEE Communication Surveys & Tutorials, Vol. 7, No. 4, 2005.

Marti, S., Giuli, T. J., Lai, K., & Baker, M.(2000),Mitigating routing misbehavior in mobile ad-hoc networks, Proceedings of the6th International Conference on Mobile Computing and Networking (MobiCom), , pp. 255-265.

Yi-Chun Hu, Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy, 1540-7993/04/$20.00 © 2004 IEEE, May/June 2004.

Mahesh K. Marina Samir R. Das , On-demand Multipath Distance Vector Routingin Ad Hoc Networks- WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2006; 6:969–988Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/wcm.432.

Hesiri Weerasinghe and Huirong Fu, Member of IEEE, Preventing Cooperative Black Hole Attacks in Mobile Adhoc Networks: Simulation Implemention and Evaluation,IJSEA,Vol2,No.3,July 2008.

Yu, K.M, Yu, C.W, Yan, S.F. 2009. An Ad Hoc Routing Protocol with Multiple Backup Routes. In Proc. Springer Science+Business Media LLC. 1 November 2009

Tsou P-C, Chang J-M, Lin Y-H, Chao H-C, Chen J-L(2011) Developing a BDSR Scheme to Avoid BlackHole Attack Based on Proactive and Reactive Architecture in MANETs.

NS2 tutorial, www.isi.edu/nsnam/ns/tutorial.

Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, ”Securing Mobile Ad Hoc Networks with Certificateless Public Keys”, IEEE transactions on dependable and secure computing, vol. 3, no. 4,october-december 2006

Kimaya Sanzgiri, Daniel LaFlamme, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M.Belding-Royer, “Authenticated Routing for Ad-Hoc networks”, IEEE Journal on selected areas in communications, Vol.23, No. 3, March 2005.

Yih-Chun HU, Adrian Perrig, “A survey of secure wireless ad hoc routing” In IEEE Security & Privacy,2004.

Nikola Milanovic, Miroslaw Malek, Anthony Davidson, Veljko Milutinovic, “Routing and Security in Mobile Ad-hoc network”, IEEE Computer Society,Feb. 2004.

Loay Abusalah, Ashfaq Khokhar, Mohsen Guizani, “A survey of secure Mobile Ad hoc routing Protocol”IEEE Communication Survey & Tutorials, Vol 10,No.4, 2008. [18] Eduardo da silva, Aldri l. dos Santos, and Luiz Carlos p. albini, “ID-Based Key Management in Mobile Adhoc Networks: Techniques and Application”, IEEE wireless communication, pp 46-52, October 2008.

W. Liu and Y. Fang, “SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks,” Proc.IEEE INFOCOM 2004.

Y. Desmedt and Y. Frankel, “Threshold Cryptosystems,” Proc. CRYPTO ’89, pp. 307-315,Aug. 1989