Minimization of Black hole Attacks in AdHoc Networks using Risk Aware Response Mechanism

Author(s):  
D. John Aravindhar ◽  
S. G. Gino Sophia ◽  
Padmaveni Krishnan ◽  
D. Praveen Kumar
2016 ◽  
Vol 10 (3) ◽  
pp. 42-66
Author(s):  
Erukala Suresh Babu ◽  
C. Nagaraju ◽  
M.H.M. Krishna Prasad

Secure communication is one of the basic requirements for any network standard. Particularly, cryptographic algorithms have gained more popularity to protect the communication in a hostile environment. As the critical information that is being transferred over the wireless adhoc networks can be easily acquired and is vulnerable to many security attacks. However, several security communication threats had been detected and defended using conventional symmetric and asymmetric cryptographic mechanism, which are too difficult and resource consuming for such mobile adhoc networks. Recently, one of the severe security threats that have to be detected and defend in any type of network topology is blackhole attack and cooperative blackhole. Because of its severity, the black hole attack has attracted a great deal of attention in the research community. Comprehensively the results of the existing system conclude that the black hole attack on various mobile adhoc networks is hard to detect and easy to implement. This paper addresses to detect and defend the blackhole attack and cooperative blackhole attack using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the underlying AODV routing protocol. Eventually, This Hybrid DNA-based Cryptography (HDC) is one of the high potential candidates for advanced wireless ad hoc networks, which require less communication bandwidth and memory in comparison with other cryptographic systems. The simulation results of this proposed method provide better security and network performances as compared to existing schemes.


Author(s):  
Thebiga M ◽  
Suji Pramila

<p>Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Routing Protocol is more comprehensively utilized protocol in MANETS. This type of network is more exposed to assorted number of attacks and among those, the black hole attack and its variant pull off critical detriment to the entire network .In this type of attack, named black hole attack, the noxious node utilizes its routing principles, with the view to annunciate itself, that it has the briefest route to the target node. In this paper, we have investigated all the subsisting techniques and graded the solution with a table to understand their pros and cons.<strong></strong></p>


2019 ◽  
Vol 8 (4) ◽  
pp. 2740-2744

In this paper, the security problem of black hole node in mobile adhoc networks (MANET) is discussed. Mobile adhoc network is a kind of network in which there is no fixed structure of the network. All the nodes are mobile i.e. they are free to move where ever they want to move. Mobility of the nodes and lack of any central administration in the network leads to complex security problem and black hole attack is one such security problem. In this paper, some of the best work which are already exist in this field and the limitations are disused in brief. A Relative TRUST based approach to eradicate the problem of black hole is proposed in this paper.


2018 ◽  
Vol 7 (3.6) ◽  
pp. 337 ◽  
Author(s):  
M Thebiga ◽  
R Suji Pramila

Mobile adhoc networks is defined as collection of infrastructure less, self-organized, dynamic networks of mobile nodes that can be connected anywhere and at any time. In Mobile Adhoc Networks, every node in the network habitually amalgamate and deliver every other nodes packets in a sequence to permit out of reach conveyance. In this aggressive background, a part of the nodes may opposed to have it, either for preserving their self-resources or deliberately distorting usual conveyance. This class of misconduct is cited as packet dropping attack or Black hole attack. This kind of attack is supposed to be more catastrophic attack and it may provide a route to network crumble. The black hole malicious node organize its malevolent performance during the route locating procedures. In this paper we make a compendious study and survey examination on the counteract ant to be concerned with black hole attack and also we explore some of the propounded solution to diagnose and to avert the attack. 


Author(s):  
Thebiga M ◽  
Suji R Pramila

<p>This Mobile adhoc networks is a perpetual and autogenous organization without framework, and the mobile nodes are coupled cordlessly. Owing to the deficiency of framework assistance, reliable data distribution is a demanding process in mobile adhoc networks and this mobile adhoc network is unguarded to many categories of attacks. A black hole attack in Mobile Adhoc networks cites to an attack by the malevolent node which strongly get hold of the path from sender to the receiver, by means of perversion of subsequence word. With regard to diminish the menace from the malevolent node, the authors encompass the notion of trust in mobile adhoc networks. In this paper, we cope with a packet dropping misconduct named Black hole Attack and we propounded  a new hybrid trust based secured algorithm hinged on four new parameters to scrutinize, whether the transitional nodes are transmitting the packets correctly to the adjacent nodes. This paper presents a new hybrid trust based concept to pinpoint the malevolent node hinged on the computation of trust value. Using ns2 simulator, we analyse the performance of our proposed method and proved the detection efficiency. The investigated results shows that our proposed work can precisely diagnose the malevolent nodes and assure a good packet delivery ratio and network throughput.</p>


Sign in / Sign up

Export Citation Format

Share Document