Advertisement

Wireless Networks

, Volume 25, Issue 4, pp 1685–1695 | Cite as

A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET

  • Shashi GurungEmail author
  • Siddhartha Chauhan
Article

Abstract

Mobile Ad hoc network (MANET) is a wireless network which is characterized by dynamic network topology, open medium, multi-hop communication etc. in which each device not only acts as a router but also as a host. Security in the mobile ad-hoc network is one of the most sought-after research topic. The performance of MANET is greatly affected by the presence of malicious nodes in the network. One of the most common attacks in MANET is a denial of service attack in which the source node is not able to communicate with the destination node due to malicious behaviour of the node. The malicious node which drops the packet is known as a black-hole node. In order to mitigate the black-hole attack problem, various techniques have been used by many researchers. In this paper, based on a dynamic sequence number threshold value, MBDP-AODV protocol is used. The main contribution of this paper is the performance evaluation of MBDP-AODV protocol under black-hole attack. Through simulation, it has been found that MBDP-AODV protocol is able to mitigate the impact of black-hole attack under different network density. Although it improves the network performance in terms of packet delivery, throughput and reduces the normalized routing load but it has high routing overhead.

Keywords

MANET Black hole attack Sequence number based AODV MBDP-AODV Denial of service attack 

References

  1. 1.
    Balaji, S., & Rajaram, M. (2016). SIPTAN: Securing inimitable and plundering track for ad hoc network. Wireless Personal Communications.  https://doi.org/10.1007/s11277-016-3187-y.Google Scholar
  2. 2.
    Eissa, T., Razak, S. A., Khokhar, R. H., & Samian, N. (2013). Trust-based routing mechanism in MANET: Design and implementation. Mobile Networks and Applications.  https://doi.org/10.1007/s11036-011-0328-0.Google Scholar
  3. 3.
    Jhaveri, R. H., Patel, S. J. & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey, In IEEE 2nd International Conference on Advanced Computing & Communication Technologies. Google Scholar
  4. 4.
    Singh, T., Singh, J., & Sharma, S. (2016). Energy efficient secured routing protocol for MANETs. Wireless Network.  https://doi.org/10.1007/s11276-015-1176-9.Google Scholar
  5. 5.
    Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications.  https://doi.org/10.1007/s11277-016-3318-5.Google Scholar
  6. 6.
    Gurung, S., & Chauhan, S. (2017). A dynamic based approach for mitigating black-hole attack in MANET. Wireless Network.  https://doi.org/10.1007/s11276-017-1514-1.Google Scholar
  7. 7.
    Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2015). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Network.  https://doi.org/10.1007/s11276-015-1032-y.Google Scholar
  8. 8.
    Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE International Conference on WiSPNET (pp. 2409–2415). Google Scholar
  9. 9.
    Li, C., Wang, Z., & Yang, C. (2010). SEAODV: A security enhanced AODV routing protocol for wireless mesh networks. In IEEE International Workshop on Selected Topics in Mobile and Wireless Computing (pp. 699–706).Google Scholar
  10. 10.
    Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE 9th Malaysia International Conference (pp. 530–535).  https://doi.org/10.1109/MICC.2009.5431439.
  11. 11.
    Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications, 35(3), 1130–1139.CrossRefGoogle Scholar
  12. 12.
    Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Systems, Modelling and Simulation (ISMS) (pp. 338–343).Google Scholar
  13. 13.
    Vadhana, S. K. & Paramasivan, B. (2015). Ant based defense mechanism for selective forwarding attack in MANET. In IEEE ICDE Workshops (pp. 92–97).Google Scholar
  14. 14.
    Saha, H. N., Bhattacharyya, D., Bandhyopadhyay, A. K., & Banerjee, P. K. (2012). Two-level secure re-routing (TSR) in mobile ad hoc networks. In International Conference on Advances in Mobile Network, Communication and Its Applications (pp. 119–122).Google Scholar
  15. 15.
    Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Proceedings of IEEE Conference on Information and Communication Technologies (pp. 479–484).Google Scholar
  16. 16.
    Gurung, S., & Chauhan, S. (2016). A novel approach for mitigating grayhole attack in MANET. Wireless Network.  https://doi.org/10.1007/s11276-016-1353-5.Google Scholar
  17. 17.
    Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75.CrossRefGoogle Scholar
  18. 18.
    Gurung, S, Saluja, K. K. (2014). Mitigating impact of blackhole attack in MANET. In Proceedings of 5th, ACEEE International Conference on Recent Trends in Information, Telecommunication and Computing, ITC (pp. 229–237).Google Scholar
  19. 19.
    The Network Simulator-NS-2.35 (2016). http://www.isi.edu/nsnam/ns/.
  20. 20.
    Gurung, S., & Chauhan, S. (2017). A novel approach for mitigating flooding attack in MANET. Wireless Network.  https://doi.org/10.1007/s11276-017-1515-0.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of TechnologyHamirpurIndia
  2. 2.Computer CentreJawaharlal Nehru Govt. Engg. CollegeSundernagarIndia

Personalised recommendations