scholarly journals Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review

2013 ◽  
Vol 64 (3) ◽  
pp. 16-22
Author(s):  
Harsh PratapSingh ◽  
Virendra Pal Singh ◽  
Rashmi Singh
2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Robert A. Sowah ◽  
Kwadwo B. Ofori-Amanfo ◽  
Godfrey A. Mills ◽  
Koudjo M. Koumadi

A Mobile Ad-Hoc Network (MANET) is a convenient wireless infrastructure which presents many advantages in network settings. With Mobile Ad-Hoc Network, there are many challenges. These networks are more susceptible to attacks such as black hole and man-in-the-middle (MITM) than their corresponding wired networks. This is due to the decentralized nature of their overall architecture. In this paper, ANN classification methods in intrusion detection for MANETs were developed and used with NS2 simulation platform for attack detection, identification, blacklisting, and node reconfiguration for control of nodes attacked. The ANN classification algorithm for intrusion detection was evaluated using several metrics. The performance of the ANN as a predictive technique for attack detection, isolation, and reconfiguration was measured on a dataset with network-varied traffic conditions and mobility patterns for multiple attacks. With a final detection rate of 88.235%, this work not only offered a productive and less expensive way to perform MITM attacks on simulation platforms but also identified time as a crucial factor in determining such attacks as well as isolating nodes and reconfiguring the network under attack. This work is intended to be an opening for future malicious software time signature creation, identification, isolation, and reconfiguration to supplement existing Intrusion Detection Systems (IDSs).


A Mobile Ad-hoc Network (MANET) is a lot of nodes that impart together agreeably utilizing the remote medium, and with no focal organization. Because of its inborn open nature and the absence of framework, security is a convoluted issue contrasted with different systems. That is, these systems are powerless against a wide scope of attacks at various system layers. At the system level, malignant nodes can play out a few attacks going from detached spying to dynamic meddling. Blackhole is a case of serious attack that has pulled in much consideration as of late. It includes the traffic redirection between end-nodes via Blackhole attack, and also controls the directing calculation to give figment to the nodes situated a long way from one another are neighbours. To handle this issue, we are proposing a novel location model to enable a node to check whether an assumed most limited way contains a Blackhole attack or not. Our methodology depends on the way that the Blackhole attack diminishes essentially the length of the ways going through it. To keep the black hole, worm opening, black hole that is community oriented also the flooding attacks, the measure by which Secure esteem is figured by the premise of the course which is asked, course answer and information parcels. After the count put the stock in values in the range 0 to 1. The event in which that secure esteem is seen more prominent as of 0.5 at that time marks the node is solid and allow on a system commonly piece. The System performance of proposed convention secured secure AODV steering convention (SAODV) is assessed. The result shows execution varies when matched with standard AODV convention.


Mobile Ad Hoc Network (MANET) is a highly popular wireless network technology due to the proliferation of wireless devices. The characteristic of mobile ad hoc network is described as wireless links and open medium, centralized decision making, dynamic topology, limited power supply, bandwidth constraint and no predefined boundary. Due to its unique characteristics, this technology has been used to support communications in situations where it may be impossible to deploy infrastructure networks, such as military battlefields, disaster recovery sites and medical emergency situations. However, they appear to be susceptible to a variety of attacks than any other networks. The nodes of a MANET communicate with each other with the help of intermediate nodes. Each node of a network act as a host as well as a router. Efficient routing protocols have been developed to support the functionality of each node. These protocols trust that all the nodes are cooperative and well behaved. But some nodes act as a malicious node and launch various attacks on routing protocols. Mainly sinkhole attack affects the routing functionality of the network. Therefore, route inference-based attack detection has been proposed to handle the sinkhole attack in the networks. The proposed system computes the weight value by considering route factor, flow factor and sink factor. Based on the weight value, a malicious node is identified. The experiment results indicate that, the proposed system achieved a packet delivery ratio of 99.6% and throughput of 2700 kbps.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 698 ◽  
Author(s):  
May Thura Lwin ◽  
Jinhyuk Yim ◽  
Young-Bae Ko

As a trending and interesting research topic, in recent years, researchers have been adopting the blockchain in the wireless ad-hoc environment. Owing to its strong characteristics, such as consensus, immutability, finality, and provenance, the blockchain is utilized not only as a secure data storage for critical data but also as a platform that facilitates the trustless exchange of data between independent parties. However, the main challenge of blockchain application in an ad-hoc network is which kind of nodes should be involved in the validation process and how to adopt the heavy computational complexity of block validation appropriately while maintaining the genuine characteristics of a blockchain. In this paper, we propose the blockchain-based trust management system with a lightweight consensus algorithm in a mobile ad-hoc network (MANET). The proposed scheme provides the distributed trust framework for routing nodes in MANETs that is tamper-proof via blockchain. The optimized link state routing protocol (OLSR) is exploited as a representative protocol to embed the blockchain concept in MANETs. As a securely distributed and trusted platform, blockchain solves most of the security issues in the OLSR, in which every node is performing the security operation individually and in a repetitive manner. Additionally, using predefined principles, the routing nodes in the proposed scheme can collaborate to defend themselves from the attackers in the network. The experimental results show that the proposed consensus algorithm is suitable to be used in the resource-hungry MANET with reduced validation time and less overhead. Meanwhile, the attack detection overhead and time also decrease because the repetitivity of the process is reduced while providing a scalable and distributed trust among the routing nodes.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
R. Srilakshmi ◽  
Jayabhaskar Muthukuru

PurposeThe mischievous nodes that defy the standard corrupt the exhibition of good nodes considerably. Therefore, an intrusion discovery mechanism should be included to the mobile ad-hoc network (MANET). In this paper, worm-hole and other destructive malignant attacks are propelled in MANET.Design/methodology/approachA wireless ad-hoc network also called as mobile ad-hoc network (MANET) is a gathering of hubs that utilizes a wireless channel to exchange information and coordinate together to establish information exchange among any pair of hubs, without any centralized structure. The security issue is a major difficulty while employing MANETs.FindingsConsequently, the attacks due to the malicious node activity are detected using Hybrid Reactive Search and Bat (HRSB) mechanism to prevent the mischievous nodes from entering the network beneath the untruthful information. Moreover, the attack detection rate and node energy are predicted for determining the lifetime of the node.Originality/valueThe simulation outcomes of the proposed HRSB technique are evaluated with the prevailing methods. The comparison studies have proven the efficacy of the current research model by attaining high attack detection rate and achieving more network lifetime.


Sign in / Sign up

Export Citation Format

Share Document