Trust-based-Tuning of Bayesian watchdog Intrusion Detection for Fast and improved Detection of Black Hole Attacks in Mobile Adhoc Networks

Author(s):  
B.V.R. Reddy ◽  
Ruchi Makani
2016 ◽  
Vol 10 (3) ◽  
pp. 42-66
Author(s):  
Erukala Suresh Babu ◽  
C. Nagaraju ◽  
M.H.M. Krishna Prasad

Secure communication is one of the basic requirements for any network standard. Particularly, cryptographic algorithms have gained more popularity to protect the communication in a hostile environment. As the critical information that is being transferred over the wireless adhoc networks can be easily acquired and is vulnerable to many security attacks. However, several security communication threats had been detected and defended using conventional symmetric and asymmetric cryptographic mechanism, which are too difficult and resource consuming for such mobile adhoc networks. Recently, one of the severe security threats that have to be detected and defend in any type of network topology is blackhole attack and cooperative blackhole. Because of its severity, the black hole attack has attracted a great deal of attention in the research community. Comprehensively the results of the existing system conclude that the black hole attack on various mobile adhoc networks is hard to detect and easy to implement. This paper addresses to detect and defend the blackhole attack and cooperative blackhole attack using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the underlying AODV routing protocol. Eventually, This Hybrid DNA-based Cryptography (HDC) is one of the high potential candidates for advanced wireless ad hoc networks, which require less communication bandwidth and memory in comparison with other cryptographic systems. The simulation results of this proposed method provide better security and network performances as compared to existing schemes.


Author(s):  
Thebiga M ◽  
Suji Pramila

<p>Ensuring collateral is the most substantial snag in Mobile Adhoc Networks which crash the efficacy of the network. Without regard to all different networks, the Mobile Adhoc network is stuffed with more safety hindrances and the Adhoc on Demand Vector Routing Protocol is more comprehensively utilized protocol in MANETS. This type of network is more exposed to assorted number of attacks and among those, the black hole attack and its variant pull off critical detriment to the entire network .In this type of attack, named black hole attack, the noxious node utilizes its routing principles, with the view to annunciate itself, that it has the briefest route to the target node. In this paper, we have investigated all the subsisting techniques and graded the solution with a table to understand their pros and cons.<strong></strong></p>


2019 ◽  
Vol 8 (4) ◽  
pp. 2740-2744

In this paper, the security problem of black hole node in mobile adhoc networks (MANET) is discussed. Mobile adhoc network is a kind of network in which there is no fixed structure of the network. All the nodes are mobile i.e. they are free to move where ever they want to move. Mobility of the nodes and lack of any central administration in the network leads to complex security problem and black hole attack is one such security problem. In this paper, some of the best work which are already exist in this field and the limitations are disused in brief. A Relative TRUST based approach to eradicate the problem of black hole is proposed in this paper.


Sign in / Sign up

Export Citation Format

Share Document