Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 338))

Abstract

A mobile Adhoc network (MANET) is a collection of mobile nodes to form a temporary network without use of any predefined infrastructure. Direct communication is possible only when two nodes lie within their sensing range; otherwise communication is made through intermediate nodes till the destination is reached. Such type of networks can allow any node to join in the network or leave the network at any instant of time. So any node can act as a host or the router in the network, which results in security issues in MANETs. A well known attack in MANETs is a Black hole attack. In this paper, we present a simple but effective method called Code Division Security Method (CDSM) for security in order to prevent Black hole attack in MANETs. Black hole node is a malicious node which can mislead a normal node to forward the data through it and corrupt the data so that it can degrade the performance of the network. We validate our approach using network simulator with an example.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahmad, S.J., Reddy, V.S.K., Damodaram, A., Krishna, P.R.: Location Aware and Energy Efficient Routing Protocol for Long Distance MANETs. International Journal of Networking and Virtual Organizations (IJNVO), Inderscience 13(4), 327–350 (2013)

    Article  Google Scholar 

  2. Chandrakant, N.: Self Protecting Nodes for Secured Data Transmission in Energy Efficient MANETs. International Journal of Advanced Research in Computer Science and Software Engineering 3(6), 673–675 (2013)

    Google Scholar 

  3. Deng, H., Li, W., Agrawal, D.P.: Routing Security in Wireless Adhoc Networks. IEEE Communication Magazine 40(10), 70–75 (2002)

    Article  Google Scholar 

  4. Deswal, S., Sing, S.: Implementation of Routing Security Aspects in AODV. International Journal of Computer Theory and Engineering 2(1), 135–138 (2010)

    Article  Google Scholar 

  5. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. Hu, Y.C., Perrig, A., Johnson, D.B.: Aridane: A Secure On-Demand Routing Protocol for Adhoc Networks. Wireless Networks 11, 21–38 (2005)

    Article  Google Scholar 

  7. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Counter Measures. AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols 1(2-3), 293–315 (2003)

    Google Scholar 

  8. Lu, S., Li, L., Lem, K.Y., Jia, L.: SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. In: Proceedings of the 2009 International Conference on Computational Intelligence and Security (CIS 2009), Beging, China, vol. 2, pp. 421–425 (2009)

    Google Scholar 

  9. Michiardi, P., Molva, R.: CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Adhoc Networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, Portorosz, Slovenia, pp. 107–121 (2002)

    Google Scholar 

  10. Sanjeev, R., Manpreet, S.: Performance Analysis of Malicious Node Aware Routing for MANET using Two Hop Authentication. International Journal of Computer Applications 25(3), 17–24 (2011)

    Article  Google Scholar 

  11. Sharma, V.C., Gupta, A., Dimri, V.: Detection of Black Hole attack in MANET under AODV Routing Protocol. International Journal of Advanced Research in Computer Science and Software Engineering 3(6), 438–443 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Syed Jalal Ahmad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ahmad, S.J., Reddy, V.S.K., Damodaram, A., Krishna, P.R. (2015). Detection of Black Hole Attack Using Code Division Security Method. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13731-5_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13730-8

  • Online ISBN: 978-3-319-13731-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics