

Secure Communication in Black Hole Attack for MANET using Hybrid Protocol
Abstract
Mobile Ad-hoc Networks (MANETs) are a subset of wireless ad-hoc networks that typically consist of an end-to-end Link Layer (LL) ad-hoc network with a routable networking environment. Whereas mobile networks have a central controller, MANETs are hop-to-hop, self-arrangement, and self-configured networks. Because ad-hoc networks have unique vulnerabilities that these IDS solutions cannot address, the solutions might not always be adequate. Un-forward capacity nodes are one of the primary attack types in the network. They pose as intermediate nodes of a route to specific targets and drop any packet that passes through them. The mechanism is cooperative, so the protocol cooperates to analyze and detect malicious nodes in MANETs in a reliable way. In this paper, they propose black-hole attacks as an analysis method to detect malicious nodes. In order to validate our developed scheme, we used the Modified-Zone based Hierarchical Link State (M-ZHLS) hybrid routing protocol with mobile nodes in Network Simulations 2 (NS2). When mobility speed and topology size change, it is found that the Zone based Hierarchical Link State (ZHLS) routing protocol has a very good detection rate for black holes and malicious nodes, a lower average delay, and an increased packet delivery ratio.
References
Chatterjee, et.al (2002) “A Weighted Clustering Algorithm for Mobile Ad Hoc Networks”, Vol. 5, No. 2, pp. 193-204.
Jane et al, (2005) “A Survey of clustering schemes for MANET”, IEEE communication and surveys, Vol.7, No.1, pp.32-47.
Baccelli (2006) “OLSR trees: A simple clustering mechanism for OLSR”, International Federation for Information Processing, Vol. 197, pp. 265–274.
Ros FJ and Ruiz PM (2007) “Cluster-based OLSR extensions to reduce control overhead in mobile Ad hoc networks”, In Proc. of the conference on WC&MC-ACM, New York, pp.202–207.
Imielinski, et al (2010) “Mobile Computing”, Springer publications, Vol.76, No.12, pp. 1281-1293.
Prabu, et al (2012) “Performance Comparison of Routing Protocol in MANET”, IJARCSSE, Vol-2, No. 9, pp. 388-392.
Swati, et.al (2014) “A Survey Routing Protocols in MANET”, IJCA, Vol.96, No.13, pp.7-12.
Pathak, et al (2014) “An improved cluster maintenance scheme for MANET”, In IEEE Conference on advances in computing, communications and informatics, pp. 2117–2121.
Y. Hu, et al. “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks”, in Proc. 4th IEEE Workshop Mobile Computer System Application, 2002, pp.3–13.
I. Jawhar, et al. “Quality of Service Routing in Mobile Ad Hoc Networks”, Network Theory and Applications, Springer, 2004.
Refbacks
- There are currently no refbacks.