Mechanism for Detecting Black Hole Attack in Infrastructure-Less MANET (MDB-MAN)
DOI:
https://doi.org/10.26438/ijcse/v6i12.176181Keywords:
MANET AODV, MDB-MAN, Black-Hole attack, Gray-Hole attackAbstract
Mobile Adhoc Network (MANET) is a self-organized group of wireless nodes forming a tentative network. In MANET nodes would be randomly changing their positions due to its dynamic infrastructure-less property. Therefore it is more susceptible to Black-Hole & Gray-Hole attacks, which are considered as serious attacks to the network. So far several solutions have been developed for MANET but many of them are not efficient. The main purpose of this paper is to present a solution known as mechanism for detecting Black Hole Attack in Infrastructure-Less MANET (MDB-MAN). An Algorithm is developed to detect Black-Hole node based on reactive Adhoc on demand distance vector protocol (AODV), where routes are established on demand. Several times simulations were conducted on proposed model using Network Simulator and found that the Packet Delivery Ratio (PDR) and Throughput is almost similar at time instant 50 msec. as compared to original AODV protocol. The Packet Drop Ratio keeps on changing as time changes and it can be tolerable.
References
[1] S. Jain, N. Hemrajan, S. Srivastava, “Simulation and Analysis of Performance Parameters for Black Hole and Flooding Attack in MANET Using AODV Protocol”, International Journal of Scientific & Technology Research Vol. 2, Issue. 7, pp. 66-69, July 2013.
[2] A. Patel and A. Jain, “A study of various Black Hole Attack techniques and IDS in MANET”, International Journal of Advanced Computer Technology, Vol. 4, Issue. 3, pp. 58-62, 2016.
[3] R. Garg, V. Mongia, “ Mitigation of Black Hole Attack in Mobile Ad-Hoc Network Using Artificial Intelligence Technique”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology , Vol. 3, Issue. 1, pp. 1168-1174, 2018.
[4] S. Muqtar Ahmed and S. Abdul Sattar, “International Journal of Computer Science and Engineering”, Vol. 6, Issue. 11, pp. 77-82, 2018.
[5] M. Jahnke, J. T¨olle, S. Lettgen, M. Bussmann, and U. Weddige, “A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs”, Springer-Verlag Berlin Heidelberg, pp. 164–180, 2006.
[6] I. Saada, M. Z. Rashad, R. H. Sakr, “Implementing and Comparing LIDBPP (Local Intrusion Detection by Bluff Probe Packet)”, International Journal of Computer Science and Network Security, Vol.16 Issue.8, pp. 20-24, August 2016.
[7] A. A. Bhosle, T. P. Thosar and S. Mehatre, “Black-Holeand Wormhole Attack in Routing Protocol AODV in MAN”, International Journal of Computer Science, Engineering and Applications, Vol. 2, No.1, February 2012.
[8] P.C. TSOU, J. Ming CHANG, Y.Hsuan LIN, H.Chieh CHAO, J. Liang CHEN, “Developing a BDSR Scheme to Avoid Black Hole Attack Based on Proactive and Reactive Architecture in MANETs”, 13th International Conference on Advanced Communication Technology, ICAC-2011.
[9] P. N. Raj and P. B. Swadas, “DPRAODV: A dyanamic learning system against black hole attack in aodv based manet”, IJCSI International Journal of Computer Science Issues, vol. 2, pp. 54–59, 2009.
[10]. L. Himral, V. Vig, and N. Chand, "Preventing Aodv Routing Protocol From Black Hole Attack", International Journal of Engineering Science and Technology (IJEST), Vol .3, 2011.
[11]. H. M. Salmon, C. M. d. Farias, P. Loureiro, L. Pirmez, "Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques", International Journal of Wireless Information Networks, Vol. 20, Issue.1, pp. 39-66, 2013.
[12] S. K. Dhurandher, I. Woungang , R. Mathur , P. Khurana, “GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETs”, 27th International Conference on Advanced Information Networking and Applications Workshops, 2013.
[13] Rutvij, H.J., “MR-AODV: A solution to mitigate black hole and gray hole attacks in AODV based MANETs. Pro”, 3rd International Conference on Advanced Computing and Communication Technologies, CCT-2013.
[14] R. Murugan, A. Shanmugam, “Cluster Based Node Misbehaviour Detection, Isolation and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security 3 Vol. 6; Issue. 3; Start page: 188, 2012.
[15] U. K. Singh, J. Patidar and K. C. Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, International Journal of Scientific Research in Computer Science & Engineering”, Volume-3, Issue-1, pp. 11-16, 2015.
[16] P K. Sharma, S. Mewada and P. Nigam, “Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network”, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue. 4, pp. 8-11, 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
