An Approach for Security Measures of Black Hole Attack in MANET

Author(s):  
Prachi Goyal ◽  

Mobile Adhoc Network (MANET)as a network of mobile routers that self-configures has raised some security concerns which one of them has been the Black Hole Attack (BHA). Studies have shown various detection and mitigation techniques in line with the black hole attack of MANET technology. However, some of the proposed models in this direction have paid less attention to how fuzzy systems could be integrated in Adhoc On-Demand Distance Vector (AODV)protocol, to further guide its detection abilities against a possible black hole attack. Hence the study proposed a model that integrates the Fuzzy Inference Method (FIM)on the existing AODV security measures in order to strengthen further its detection metrics. Also,an Intrusion Detection System (IDS) was introduced for an early check against possible BHA along with the Fuzzy Parameter Extraction module which performs all necessary parameter checks before passing it on to the FIM. The parameters into consideration were adapted from the study of Narang (2013), with this study modifying further its proposed algorithm using the added concepts earlier mentioned. The proposed model presented tends to perform better than the existing models in this direction with evidence from the theoretical underpinnings of the functionality of the added modules in the proposed system


Author(s):  
Divya Singh ◽  
Sumit Jalan

In Wireless ad-hoc network, the infrastructure of MANET's differ to each other due to the topology of MANETs changes time to time because the mobile nodes of MANET's are movable. In MANETs protocols, if any node wants to communicate with another node then they establish a path with the help of adjacent node due to this the security in MANETs protocol is vulnerable. Thus, there are various types of attacks are try to break the security of MANETs protocol. AODV is a popular and most usable protocol of MANET and Black Hole Attack is a severe attack that affects the functionality of AODV protocol. The malicious node treat to the source node which have freshest and nearest path for the destination. In this work, my prime focus specifically is on follow the security against Black Hole Attack. I proposed AODV protocol capture some extra effort for source node and destination node which based on best possible effort (heuristic) with appropriate simulation using ns-2.35.


Sign in / Sign up

Export Citation Format

Share Document