scholarly journals Black hole attack behavioral analysis general network scalability

Author(s):  
Layth A. Khalil Al Dulaimi ◽  
R. Badlishah Ahmad ◽  
Naimah Yaakob ◽  
Mohd Hafiz Yusoff ◽  
Mohamed Elshaikh

<span style="font-size: 9pt; font-family: 'Times New Roman', serif;">A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its self-arranging conduct. MANETs can convey over moderately data transfer capacity compelled routing connections. In a blackhole assault, a malicious node falsely advertises the shortest path to the destination node, intending to disrupt communication. Our objective was to review the impact of a blackhole assault on networks. To accomplish this, we simulated MANET situations, which include the blackhole node, using the OMNET++ simulator to demonstrate the effects of a single blackhole attack and multiple blackhole attacks on MANET performance have examined for networks. We analysed MANET performance under blackhole assaults through the use of performance grids.</span><table class="MsoTableGrid" style="width: 444.85pt; border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-yfti-tbllook: 1184; mso-padding-alt: 0in 5.4pt 0in 5.4pt;" width="593" border="1" cellspacing="0" cellpadding="0"><tbody><tr style="mso-yfti-irow: 0; mso-yfti-firstrow: yes; mso-yfti-lastrow: yes; height: 63.4pt;"><td style="width: 290.6pt; border: none; border-top: solid windowtext 1.0pt; mso-border-top-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; height: 63.4pt;" valign="top" width="387"><p class="MsoNormal" style="margin-top: 6.0pt; text-align: justify;"><span style="font-size: 9.0pt; color: black; mso-bidi-font-style: italic;"><span style="mso-spacerun: yes;"> </span>A mobile ad hoc network (MANET) is a frameworkless system of different mobile devices known for its self-arranging conduct. MANETs can convey over moderately data transfer capacity compelled routing connections. In a blackhole assault, a malicious node falsely advertises the shortest path to the destination node, intending to disrupt communication. Our objective was to review the impact of a blackhole assault on networks. To accomplish this, we simulated MANET situations, which include the blackhole node, using the OMNET++ simulator to demonstrate the effects of a single blackhole attack and multiple blackhole attacks on MANET performance have examined for networks. We analysed MANET performance under blackhole assaults through the use of performance grids.</span></p><p class="MsoNormal" style="margin-top: 6.0pt; text-align: justify;"><span style="font-size: 9.0pt; color: black; mso-bidi-font-style: italic;">.</span></p></td></tr></tbody></table>

2013 ◽  
Vol 684 ◽  
pp. 547-550
Author(s):  
Sery Vuth Tan ◽  
Minh Yuk Choi ◽  
Kee Cheon Kim

Mobile Ad-hoc Network (MANET) is a dynamic wireless network without any infrastructures. The network is weak and vulnerable to many types of attacks. One of these attacks is BlackHole. In this attack, a malicious node advertises itself as having a high sequence number and a shortest path to a specific node to absorb packets. The effect of BlackHole attack on ad-hoc network using AODV as a routing protocol will be examined in this research. We also propose a new mechanism, called DPBA-AODV, to detect and prevent BlackHole attacks on AODV protocol. Simulation result, by using NS2, depicts the efficiency of our proposed mechanism in packet delivery ratio under the presence of BlackHole nodes.


2019 ◽  
Vol 8 (4) ◽  
pp. 9203-9210

A wireless mobile ad-hoc network (WMANET) is endless self-organizing, infrastructure-less collection of movable devices which are connected by using a wireless communication system. In other word’s WMANET is an autonomous, decentralized, dynamic topology, provisional network system having wireless movable devices (nodes) moving randomly without an infrastructure of the network. Furthermore, the nodes communicate with every supplementary node, through forwarding data-packets toward other nodes in the WMANET. The node finds a path to the destination node by applying routing techniques. Due to the dynamic topology of movable nodes wireless mobile network is more vulnerable to security and unprotected to attacks by the malicious node. One of the attacks is Blackhole malware Attack, a malicious-node wrongly advertises shortest to the destination node among an intention of disrupting the network communication. Because the data packets did not arrive at the destination node due to this attack data is lost. In the literature, researchers have been proposed various preventive detection techniques. These techniques used to detect and prevent the black-hole malware attacks. Furthermore, in this paper Novel Detection and Prevention mechanism (INCMAODV) has been simulated the black-hole attack in WMANET scenario. The proposed technique tried to find quality of service (QoS) parameters for instance throughput (Th), packet delivery ratio (PDR) and delay of the network and compared with the state of the art.


2017 ◽  
Vol 10 (1) ◽  
pp. 82-85
Author(s):  
Vikram Agrawal

MANET is self organizing, decentralized and dynamic network. In which participating nodes can move anywhere. The nodes can be host or router anytime [1]. Mobile ad hoc network is decentralized network so if one node is participating as router for particular time but if that node leave network then it is very difficult to transfer data packets. The main feature of MANET network of self organizing capability of node has advantage and disadvantage as well. By this it is easy to maintain network and convert topology but at same time we need to tolerate data transfer. The MANET is also used for big network and internet but there is no smart objects like IoT which can share information machine to machine. Now rapidly increase internet users worldwide to access global information and technology [2]. IoT is basically used to converge applications and services to open global business opportunities which can use I-GVC (Information-driven Global Value Chain) for efficient productivity.


Mobile Ad hoc Network (MANET) is essentially a framework much less network. It carries out certainly not demand any kind of predetermined network. Every nodule is serving as a recipient and also a transmitter. All the nodules in the MANET are essentially taken on as functioning within a welcoming as well as collaborative network circumstance. There is essentially no base station to handle the relocating gadgets. There is essentially no safety to guard the nodules. Any kind of nodule may function as a misbehaving nodule. Such uncooperative habits may significantly diminish network efficiency as well as might also cause complete interaction failure. The destructive nodules may effortlessly assault the mobile nodules. In this particular newspaper, our experts have essentially suggested an Intrusion Detection System through which the harmful nodules are essentially spotted and also certainly there due to the functionality of the network are going to be essentially raised.


2019 ◽  
Author(s):  
Rohi Tariq ◽  
Sheeraz Ahmed ◽  
Raees Shah Sani ◽  
Zeeshan Najam ◽  
Shahryar Shafique

Mobile Ad hoc network is the collection of nodes without having any physical structure involved i.e. access points, routers etc. MANETs are wide-open to similar forms of threats as other wireless mobile communication systems. In Ad-hoc Network nodes performing both as end-points of the communication and routers which makes the Ad-hoc routing protocols further prone towards the security attacks. Black Hole attack is a common security issue encountered in MANET routing protocols. The Black-Hole attack is security attack in which a malicious node imposters themselves as a node with the shortest hop count to the destination node during a packet transmission. A malicious node is capable of disturbing the network with Black Hole attack pretends to have the minimum hop-count route to the destination node (DS). This node responds to all route requests (RREQ) messages in positive and thus catches all the transmission to it. The source node (SN) not knowing the malicious nature of the Black-Hole node thus transmits all the important data. The Black Hole node discards all the important data packets. In this paper a comparatively effective, efficient and easy implemented way for identifying and therefore eluding the attacks of Black-Hole in mobile Ad-hoc networks is presented. The Network Simulator (NS-2) has been used for the implementation of our proposed solution to assess its work in terms of Network Routing load, End-to-End delay and Packet delivery ratio. The results show a considerable improvement in the performance metrics.


2021 ◽  
Author(s):  
Md. Moinuddin Bhuiyan

Advances in wireless technology and mobile computing have provided a major impetus towards development of P2P network over MANET. Both peer-to-peer overlays and mobile ad-hoc network share the key characteristics of self-organizing and decentralization; both need to solve same fundamental problem, that is, how to route queries or packets efficiently. Congestion affecting the performance of P2P overlay on wireless ad-hoc network occurs not only due to buffer overflow but also due to error prone nature of the wireless medium used and the mobility of users. When paths of multiple downloading sessions intersect with each other, they mutually cause congestion for each other that result in packet drops. We identified that P2P MANET suffers query performance primarily due to significant congestion during download session. The unawareness of congestion in P2P MANET system may lead to the longer user response time, high overhead and many packet losses. In order to alleviate the congestion problem, we propose a modification to RAON, CANON, which includes congestion awareness for improving the RAON performance. We evaluated our system through simulation, which shows that CAON improves the performance of query success rate, query delay, packet losses significantly. We also evaluated the impact of mobility model on our system by simulating under both Random way point mobility model and Manhattan mobility model.


Mobile ad hoc network is appealing mechanization in many applications, including disaster recovery and communication systems and rescue due to the flexibility offered by the diverse network. An equivalent network, although it has been found that legitimate can operate independently, or may link to the wider Internet. A framework has been introduced in recent years operators and attackers, have used this network environment. Mobile Ad hoc Network is the main concern about dynamic routing access. Mobile ad hoc network provides several well-known protocols for routing responsive like DSR, AODV, TORA, etc. AODV can route both unicast and multicast. AODV routing protocol cannot protect against a wormhole attack. In this paper, we implement a technique of pseudo-DNA cryptography, focused on the molecular biology’s central dogma. In this approach, we simulate the central dogma's transcription and translation process, and even some extra features to make it difficult to crack the resulting ciphertext and defense against wormhole attack. In the sense of ratio for packet drop, throughput and the delay between two nodes we also examine the impact of the wormhole attack on a parameter of ad hoc network.


Sign in / Sign up

Export Citation Format

Share Document