scholarly journals Node Disjoint Multiple Paths Routing Technique for Secure, Reliable and Confidential Data Transmission against Black Hole Attacks in MANET

The Ad-hoc On-Demand Multipath Distance Vector (AOMDV)is an extension of AODV protocol in the mobile ad-hoc network (MANET). It utilizes the features of DSDV, DSR, and AODV Routing protocols for Secure, Reliable and confidential data transmission against the attacks in the MANET, butinblack hole attack malicious nodes utilize the behavior of AODV and show its malicious behavior at the data transmission, it causes the loss of data packets. So to avoid this loss more researchers have been conducted several techniques for detection and put several efforts to prevent the Blackhole attacks. But still, it isnot prevented completely, sothis paper proposes a Node Disjoint Multiple paths routing algorithm technique on AOMDV against black hole attacks in MANET and shows its better performance in Network Simulator (NS2).

Author(s):  
Baban Ahmed Mahmood ◽  
Aso Ahmed Majeed ◽  
Ahmed Chalak Shakir

<p>The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.</p>


Author(s):  
Arudra Annepu ◽  
◽  
Priti Mishra ◽  

Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MANET is numerous threats types of attacks due to dynamic changing topologies and wireless medium. Security of the MANET becomes one of the challenging tasks. Black hole attacks is the main type of attack that are possible in MANET. Black hole node not forward any data packets to the neighbour node instead it drops all the data packets. Black hole attacks are bit hard to detect due to lack of centralized access. This research work concentrates to enhance the security of MANET by identifying and blocking black hole assaults from occurring. A reactive routing system such as Ad-Hoc on Demand Distance Vector has previously been used to address security problems in the MANET (AODV). Various attack types were investigated, and the consequences of these assaults were detailed by describing how MANET performance was disrupted. Network Simulator 3 (NS3) is used for the simulation process.


2008 ◽  
Vol 2008 ◽  
pp. 1-7 ◽  
Author(s):  
R. Asokan ◽  
A. M. Natarajan ◽  
C. Venkatesh

Mobile ad hoc network (MANET) is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. Quality of service (QoS) is a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. QoS support MANETs is a challenging task due to the dynamic topology and limited resources. The main objective of this paper is to enhance the QoS routing for MANET using temporally ordered routing algorithm (TORA) with self-healing and optimized routing techniques (SHORT). SHORT improves routing optimality by monitoring routing paths continuously and redirecting the path whenever a shortcut path is available. In this paper, the performance comparison of TORA and TORA with SHORT has been analyzed using network simulator for various parameters. TORA with SHORT enhances performance of TORA in terms of throughput, packet loss, end-to-end delay, and energy.


2011 ◽  
Vol 225-226 ◽  
pp. 565-568 ◽  
Author(s):  
Chiu Ching Tuan ◽  
Kuen Yang Chen ◽  
Yi Chao Wu

In a mobile ad-hoc network, MANET, designing a security routing protocol is an important issue since the mobile nodes and wireless medium are prone to be attacked. However, most of wireless routing protocols concentrated on how to reduce the data transmission time and energy consumption. Wireless routing paths in MANET may be broken or fabricated by attacking. Hence, sending data packets to the destination may failure. For defending the active black hole attacks and the passive fabricated routing attacks, we proposed a preventive security mechanism based on ad-hoc on-demand distance vector routing (AODV), called PSM-AODV. PSM-AODV modified some field in RREQ, RREP, and RERR packets based on AODV. PSM-AODV thus may defend the possible black hole and fabricated routing attacks. Simulation results showed that PSM-AODV could promote the packet delivery rate based on little overhead in control packets.


2018 ◽  
Vol 8 (3) ◽  
pp. 3079-3083
Author(s):  
I. A. Halepoto ◽  
I. H. Sadhayo ◽  
M. S. Memon ◽  
A. Manzoor ◽  
S. Bhatti

Stream control transmission protocol (SCTP) is a transport layer protocol, which is efficient, reliable, and connection-oriented as compared to transmission control protocol (TCP) and user datagram protocol (UDP). Additionally, SCTP has more innovative features like multihoming, multistreaming and unordered delivery. With multihoming, SCTP establishes multiple paths between a sender and receiver. However, it only uses the primary path for data transmission and the secondary path (or paths) for fault tolerance. Concurrent multipath transfer extension of SCTP (CMT-SCTP) allows a sender to transmit data in parallel over multiple paths, which increases the overall transmission throughput. Parallel data transmission is beneficial for higher data rates. Parallel transmission or connection is also good in services such as video streaming where if one connection is occupied with errors the transmission continues on alternate links. With parallel transmission, the unordered data packets arrival is very common at receiver. The receiver has to wait until the missing data packets arrive, causing performance degradation while using CMT-SCTP. In order to reduce the transmission delay at the receiver, CMT-SCTP uses intelligent retransmission polices to immediately retransmit the missing packets. The retransmission policies used by CMT-SCTP are RTX-SSTHRESH, RTX-LOSSRATE and RTX-CWND. The main objective of this paper is the performance analysis of the retransmission policies. This paper evaluates RTX-SSTHRESH, RTX-LOSSRATE and RTX-CWND. Simulations are performed on the Network Simulator 2. In the simulations with various scenarios and parameters, it is observed that the RTX-LOSSRATE is a suitable policy.


2017 ◽  
Vol 10 (1) ◽  
pp. 94-102 ◽  
Author(s):  
Ashish Jain ◽  
Vrinda Tokekar

Mobile ad hoc network (MANET) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANET are autonomous routers. Hence, they are vulnerable to security attacks. Collaborative attacks such as black hole and wormhole in MANET are difficult to be detected and prevented. Trust based routing decision is an effective approach for security enhancement in MANET. In this study, trust computing using fuzzy based max-product composition scheme is applied to compute aggregated trust values to determine malicious nodes and thereby safe route in MANETs. The results show performance improvement of proposed protocol over AODV protocol. Network metrics are analysed under different mobility conditions and different positions of black hole nodes.


2019 ◽  
Vol 8 (4) ◽  
pp. 9203-9210

A wireless mobile ad-hoc network (WMANET) is endless self-organizing, infrastructure-less collection of movable devices which are connected by using a wireless communication system. In other word’s WMANET is an autonomous, decentralized, dynamic topology, provisional network system having wireless movable devices (nodes) moving randomly without an infrastructure of the network. Furthermore, the nodes communicate with every supplementary node, through forwarding data-packets toward other nodes in the WMANET. The node finds a path to the destination node by applying routing techniques. Due to the dynamic topology of movable nodes wireless mobile network is more vulnerable to security and unprotected to attacks by the malicious node. One of the attacks is Blackhole malware Attack, a malicious-node wrongly advertises shortest to the destination node among an intention of disrupting the network communication. Because the data packets did not arrive at the destination node due to this attack data is lost. In the literature, researchers have been proposed various preventive detection techniques. These techniques used to detect and prevent the black-hole malware attacks. Furthermore, in this paper Novel Detection and Prevention mechanism (INCMAODV) has been simulated the black-hole attack in WMANET scenario. The proposed technique tried to find quality of service (QoS) parameters for instance throughput (Th), packet delivery ratio (PDR) and delay of the network and compared with the state of the art.


Mobile Ad hoc network (MANETs) is a selforganizing multi-hop wireless network with dynamic topologies. Due to the absence of Control Authority in MANET, the network seems to be vulnerable that can be easily destroyed by the entry of malicious nodes. The presence of malicious nodes can destroy the data transmission of the network. So, finding and removing the malicious nodes is one of the critical issues in the MANET. With the help of the proposed Coherence Key Based Node Authentication for Routing (CKR) Algorithm, each and every mobile node are authenticated while updating the routing table by using the authentication key value that is generated with the help of random number with the secret key. Only the authenticated nodes (non-Malicious Nodes) are updated in the routing table and the remaining nodes which are not authenticated (malicious nodes) will be eliminated from the routing table. So that, the malicious node will not participated and could not destroy the data transmission. Thus, it makes this Multi-hop network as more trustful network.


2018 ◽  
Vol 7 (3.34) ◽  
pp. 305
Author(s):  
W Ancy Breen ◽  
S Durga Devi ◽  
E Sushmitha ◽  
V Suveetha

MANET is the mobile ad-hoc network. Security is very important especially when transmitting the data packets from one node to another. MANET is constructed by grouping mobile wireless nodes with no fixed infrastructure. In order to forward the packets, all the nodes in the network must cooperate with each other, so that the nodes beyond the radio ranges can communicate. Each node acts as a router and MANET is infrastructure-less networks. Hence, MANET is open to more security attacks such as Gray-hole attack, Black-hole attack and worm-hole attack. Due to the dynamism in network topology, MANETS are highly vulnerable and are prone to malicious attack. Security issue is highly challenging in MANET. Understanding the different form of possible attacks and providing good security solutions is important for secure data transmission between nodes. The most dangerous attack among these attacks is Gray-hole attack. In this paper, it proposed a method for reducing the Gray-hole attack. Our proposed algorithm MAODV identifies the malicious node before the data transmission process and it greatly reduces the dropping of data packets. 


The Mobile Ad hoc Network (MANET) is the collection of some mobile devices that communicate with one another without any help from a centralized administration. For this, the energy is an important issue that has to be addressed since the ad-hoc network nodes have a limited battery power. A secure routing in the MANETs is an area of research that is emerging. The designing of a security protocol which is trustworthy for the ad hoc routing is an extremely challenging task owing to all its unique traits. Due to its minimal configuration and its quick deployment, the MANETs are found to be well-suited for situations in the case of an emergency such as the natural disasters or the military applications. This way, a transfer of data among two nodes need some security. A MANET black-hole attack will occur owing to the malicious nodes attracting data packets by means of a false advertisement of a fresh route to its destination. For this work, the trust-based routing along with the packet forwarding probability. For this work, the Ad hoc On-Demand Multipath Distance Vector Routing (AOMDV) protocol is used and for finding the routing path a trust value will be piggybacked with a route request packet. There was yet another novel algorithm for optimization known as the Group Search Optimizer (GSO) algorithm that was proposed inspired by the behaviour of animals. This GSO-AOMDV was for the purpose of improving the performance of the network. The results of the experiment proved that this method proposed could achieve a better performance compared to the other methods


Sign in / Sign up

Export Citation Format

Share Document