scholarly journals Host based Detection and Prevention of Black Hole attacks by AODV-ICCSO Algorithm for security in MANETs

Author(s):  
Sathyaraj P ◽  
Rukmani Devi D ◽  
K Kannan

Abstract Background: Mobile Ad-hoc Networks (i.e.) MANETs are gaining rapid fame in recent days and are considered as very significant because of their easier implementation and growing property. Various types of attacks are prone to damage the networks due to the elastic property possessed by the network. And among different categories of attacks that can affect MANETs, black hole attack is considered as the commonly occurring one within a MANET. Chicken Swarm Optimization (CSO) algorithm is one among the technique used for the detection of black hole attacks occurring in the MANETs. But the CSO algorithm possesses some disadvantages and necessity rises for overcoming the weakness in the CSO algorithm. Objective: Therefore, in this research paper, to address the black hole attack in MANET, an Improved Crossover Chicken Swarm Optimization (ICCSO) algorithm and the concept of Enhanced Partially-Mapped Crossover operation proposed and the best fitness values obtained. Methods: In ICCSO algorithm, parameter initialization is carried out in step 1 of the algorithm, where the attacked nodes and non-attack nodes are created separately with the aid of parameters like PDR (i.e.) Packet Delivery Ratio and RSSI (i.e.) Received Signal Strength Indicator. Further, If the node is affected by any attack, then the nodes are discarded and the data is transmitted through the non-attacked node. Routing is carried by a protocol of AODV.Results: The effectiveness of the algorithm proposed in the work is evaluated using various performance measures like packet delivery ratio (PDR), end-to-end delay (EED) and throughput. The performance measures are compared with a different state of the art routing protocols and it can be inferred that the proposed methodology comes up with improved results.

Wireless Sensor Networks are in rapid advance occupying every field of our lives. They are in great demand and are widely used in transmission of data like temperature, pressure, humidity, speed etc. As these networks are wireless and are easily prone to intrusion by the attackers. Hence the basic concern is security of data. The nodes in the network will be sending information between the nodes, and in between the nodes intrusion takes place with attack like wormhole attack, black hole attack, sybil attack, hello flood attack etc. which corrupts data. These attacks effect the efficiency of the network and the parameters like packet delivery ratio and throughput of the network is affected. Black hole is a severe attack in network which alters most of the data before it is received at the sink, hence has to be detected and prevented. In this paper, Adhoc on demand distance vector (AODV) protocol is used to detect and prevent the black hole attack using Network Simulator (NS-2.3)


Author(s):  
Kirti A. Adoni ◽  
Anil S. Tavildar ◽  
Krishna K. Warhade

Background and Objective: Random Black Hole (BH) attack significantly degrades MANET’s performance. For strategic applications, the performance parameters like Packet Delivery Ratio, Routing Overheads, etc. are important. The objectives are: (a) To model random BH attack, (b) To propose a routing strategy for the protocol to mitigate random BH attack, (c) To evaluate and compare the network performance of modified protocol with the standard protocol. Methods: The random BH attack is modelled probabilistically. The analysis is carried out by varying Black Hole Attack (BHA) time as Early, Median, Late occurrences and mix of these three categories. The blocking performance is also analysed by varying the percentages of malicious presence in the network. Normal Optimized Link State Routing (OLSR) protocol is used to simulate the MANET performance using a typical medium size network. The protocol has then been modified using Trust- Confidence aware routing strategy, named as TCAOLSR, with a view to combat the degradations due to the random BH attack. Results: The random behavior of Black Hole attack is analyzed with all the possible random parameters, like deployment of mobile nodes, number of malicious nodes and timing instances at which these nodes change their state. From the results of individual type- Early, Median and Late, it is observed that the TCAOLSR protocol gives stable performance for Packet Delivery Ratio (PDR) and Routing Overheads (RO), whereas for OLSR protocol PDR gradually reduces and RO increases. For individual and mix type, Average Energy Consumption (AEC) per node increases marginally for TCAOLSR protocol. For the mix type, PDR for TCAOLSR is 40-60% better whereas RO for TCAOLSR is very less compared to OLSR protocol. The efficacy of the TCAOLSR protocol remains stable for different categories of BH attack with various percentages of malicious nodes compared to OLSR with the same environment. Conclusion: Simulations reveal that the modified protocol TCAOLSR, effectively mitigates the network degradation for Packet Delivery Ratio and Routing Overheads considerably, at the cost of a slight increase in Average Energy Consumption per node of the network. Efficacy of the OLSR and TCAOLSR protocols has also been defined and compared to prove robustness of the TCAOLSR protocol.


However the black hole attack prevention has been proposed earlier but it is observed that the packet dropping increases constantly as the number of black hole attack are increased. The proposed work is making use of fuzzy logic. This mechanism allows the random node selection so it is supposed to maintain the packet delivery ratio. Results of this research show that the proposed mechanisms do not allow packet dropping on constant rate. Many studies are made that are simulating influence of attack made by .black .hole in the network based on .AODV. It has been observed that there is constant fall in the packet dropping ratio if number of malicious packet increases. This paper has represented the Black Hole attack over AODV routing when random node selection mechanism is applied. Proposed work is allowing selection of nodes on random basis. Such mechanism is supposed to improve the ratio of delivery of packet. Results of Simulation indicates the impact of black hole attack over packet delivery ratio , packet .loss .ratio, .Average .end to .end delivery, and .routing over head. Moreover the comparative analysis of .traditional and .proposed model is made considering packet delivery ratio.


Author(s):  
Rajnesh Singh ◽  
Neeta Singh ◽  
Aarti Gautam Dinker

TCP is the most reliable transport layer protocol that provides reliable data delivery from source to destination node. TCP works well in wired networks but it is assumed that TCP is less preferred for ad-hoc networks. However, for application in ad-hoc networks, TCP can be modified to improve its performance. Various researchers have proposed improvised variants of TCP by only one or two measures. These one or two measures do not seem to be sufficient for proper analysis of improvised version of TCP. So, in this paper, the performance of different TCP versions is investigated with DSDV and AODV routing Protocols. We analyzed various performance measures such as throughput, delay, packet drop, packet delivery ratio and number of acknowledgements. The simulation results are carried out by varying number of nodes in network simulator tool NS2. It is observed that TCP Newreno achieved higher throughput and packet delivery ratio with both AODV and DSDV routing protocols.Whereas TCP Vegas achieved minimum delay and packet loss with both DSDV and AODV protocol. However TCP sack achieved minimum acknowledgment with both AODV and DSDV routing protocols. In this paper the comparison of all these TCP variants shows that TCP Newreno provides better performance with both AODV and DSDV protocols.


Author(s):  
C. Kumuthini ◽  
A. Nirmala ◽  
K. Gomathy

Wireless access networks based on IEEE 802.11 and IEEE 802.16 have become very popular in providing different data services. In this paper our first goal is to design and implement an integrated Wimax and Wi-Fi network and compare two of the most promising infrastructure-based wireless technologies such as IEEE 802.16e standard and upcoming IEEE 802.11p standard. We investigate, through simulation, the potential and limitations of both technologies as a communication media for vehicle-to-infrastructure (V2I) communications. The performance of the two systems is evaluated for delay, packet delivery ratio, and throughput. This research work is to integrated of WiFi with WiMAX technology in an Vehicular Ad-hoc and evaluate the performance using the NS2.31 simulator. To improve the packet delivery ratio, and End-to-End delay the proposed system is implemented using Wi-Fi with WiMAX (IEEE 802.16) routing technique. we conclude that, the comparsion results shows integration of WiFi with WiMAX will produce better result when compared the existing schemes.


2021 ◽  
Vol 26 (6) ◽  
pp. 549-557
Author(s):  
Venkatasubramanian Srinivasan

Mobile Ad-Hoc Networks (MANETs) due to their reconfigurable nature are being integrated into new and futuristic knowledge such as Internet of Things (IoT), cloud, reconfigurable networks, etc. To attain such credibility of integration, the routing protocols associated with these mobile nodes have to connect, perform and facilitate routing that offers a high level of security and resistance to all possible threats and security issues that may emanate in the network. One of the solutions used to maintain network security is intrusion detection systems (IDSs). This article primarily emphasis on the network's susceptibility to a suction assault known as a black hole attack. The investigations about the employment of intelligent agents called Honeypot Agent-based detection scheme (HPAS) with Long-Short Term Memory (LSTM) in identifying such assaults. Hence, the proposed method is named HPAS-LSTM, where honeypots are roaming virtual software managers that create Route Request (RREQ) packets to attract and entrap black hole attackers. Extensive model results utilizing the ns-2 simulator are used to demonstrate the presence of the suggested detection technique. The simulation outcomes demonstrate that the suggested technique outperforms current black hole detection methods in terms of throughput (TH), packet loss rate (PLR), packet delivery ratio (PDR), and total network delay (TND).


Author(s):  
P. Subathra ◽  
S. Sivagurunathan

A Mobile Ad hoc Network (MANET) is a collection of wireless nodes communicating over multi-hop paths without any infrastructure. Nodes must cooperate to provide necessary network functionalities. The security in routing protocols like Dynamic Source Routing (DSR) can be compromised by a “Black Hole” attack. Here, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops them, leading to performance degradation. The situation becomes worse when two or more nodes cooperate and perform the “Cooperative black hole” attack. This chapter proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating the attacking nodes. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio, and false negative probability in comparison with trust and probe based schemes.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 6 ◽  
Author(s):  
Pandi Selvam Raman ◽  
Shankar K ◽  
Ilayaraja M

Mobile ad hoc networks (MANETs) are wireless infrastructure-less network consisting collection of autonomous nodes that communicate with each other in decentralized manner. Security remains major challenge due to its some unique characteristics like open medium, mobility and hence topology changes. Therefore, routing protocol for MANETs is much vulnerable to attacks. Black Hole is a type of attack, where malicious node falsely advertises itself having the shortest or optimal path to the destination node. This attack is more dangerous while a group of nodes are cooperating with each other.The objective of this paper is to design cluster based routing protocol and prevent it from the black hole attack. The simulation results show improvement in packet delivery ratio and control overhead.


Sign in / Sign up

Export Citation Format

Share Document