An Efficient Scheme for Detection and Prevention of Black Hole Attacks in AODV-Based MANETs
Mobile ad hoc network (MANET) is a set of independent mobile nodes, which connect to each other over a wireless channel without any centralized infrastructure, nor integrated security. MANET is a weak target to many Denial of Service (DOS) attacks, which seriously harms its functionality and connect...
Gespeichert in:
Veröffentlicht in: | International journal of advanced computer science & applications 2019, Vol.10 (1) |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | |
container_title | International journal of advanced computer science & applications |
container_volume | 10 |
creator | Pathan, Muhammad Salman He, Jingsha Zhu, Nafei Ali, Zulfiqar Qasim, Muhammad Azmat, Aneeka |
description | Mobile ad hoc network (MANET) is a set of independent mobile nodes, which connect to each other over a wireless channel without any centralized infrastructure, nor integrated security. MANET is a weak target to many Denial of Service (DOS) attacks, which seriously harms its functionality and connectivity. A black hole attack is a type of DOS attack, where the malevolent node tries to get all the data packets from a source node by sending fabricated fake route reply (RREP) packet, falsely pretending that it possesses the shortest path towards the destination node, and then drops all the packets it receives. In this paper, the AODV (Ad-hoc on-demand distance vector) routing protocol is improved by incorporating an efficient and simple mechanism to mitigate black hole attacks. Mechanism to detect black hole attacks from MANET (MDBM) uses fake route request (RREQ) packets with an unreal destination address in order to detect black hole nodes prior to the actual routing process. Simulation experiment conducted has verified the performance of the proposed detection and prevention scheme. The results demonstrated that the proposed mechanism performed well in terms of Packet Delivery Ratio, End-to-End Delay and Throughput under black hole attack. |
doi_str_mv | 10.14569/IJACSA.2019.0100132 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2656396554</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2656396554</sourcerecordid><originalsourceid>FETCH-LOGICAL-c325t-482744dc42df53d2e0f6c9ee95fe45fdba53833afacd1555fe8b932504c4c33d3</originalsourceid><addsrcrecordid>eNotkFtLAzEQhYMoWGr_gQ8Bn3fNdbv7uL1oK9UKrSL4ENJkglvb3Zqkgv_e7WVe5sxw5gx8CN1SklIhs-J--lQOF2XKCC1SQgmhnF2gDqMyS6Tsk8ujzhNK-h_XqBfCmrTFC5blvIM-yxqPnatMBXXEC_MFW8Cu8XgEEUysmhrr2uJXD7-t4TA2Dg822nzjSbMBXMbY6oCrGpfz0Xsy0AEsfi5fxstwg66c3gTonXsXvT2Ml8NJMps_ToflLDGcyZiInPWFsEYw6yS3DIjLTAFQSAdCOrvSkueca6eNpVK223xVtJdEGGE4t7yL7k65O9_87CFEtW72vm5fKpbJjBeZlKJ1iZPL-CYED07tfLXV_k9Roo4k1YmkOpBUZ5L8H3vcZPs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2656396554</pqid></control><display><type>article</type><title>An Efficient Scheme for Detection and Prevention of Black Hole Attacks in AODV-Based MANETs</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Pathan, Muhammad Salman ; He, Jingsha ; Zhu, Nafei ; Ali, Zulfiqar ; Qasim, Muhammad ; Azmat, Aneeka</creator><creatorcontrib>Pathan, Muhammad Salman ; He, Jingsha ; Zhu, Nafei ; Ali, Zulfiqar ; Qasim, Muhammad ; Azmat, Aneeka</creatorcontrib><description>Mobile ad hoc network (MANET) is a set of independent mobile nodes, which connect to each other over a wireless channel without any centralized infrastructure, nor integrated security. MANET is a weak target to many Denial of Service (DOS) attacks, which seriously harms its functionality and connectivity. A black hole attack is a type of DOS attack, where the malevolent node tries to get all the data packets from a source node by sending fabricated fake route reply (RREP) packet, falsely pretending that it possesses the shortest path towards the destination node, and then drops all the packets it receives. In this paper, the AODV (Ad-hoc on-demand distance vector) routing protocol is improved by incorporating an efficient and simple mechanism to mitigate black hole attacks. Mechanism to detect black hole attacks from MANET (MDBM) uses fake route request (RREQ) packets with an unreal destination address in order to detect black hole nodes prior to the actual routing process. Simulation experiment conducted has verified the performance of the proposed detection and prevention scheme. The results demonstrated that the proposed mechanism performed well in terms of Packet Delivery Ratio, End-to-End Delay and Throughput under black hole attack.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2019.0100132</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Black holes ; Communication ; Computer science ; Denial of service attacks ; Mobile ad hoc networks ; Nodes ; Packets (communication) ; Prevention ; Protocol ; Routing (telecommunications) ; Shortest-path problems ; Wireless networks</subject><ispartof>International journal of advanced computer science & applications, 2019, Vol.10 (1)</ispartof><rights>2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c325t-482744dc42df53d2e0f6c9ee95fe45fdba53833afacd1555fe8b932504c4c33d3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4021,27921,27922,27923</link.rule.ids></links><search><creatorcontrib>Pathan, Muhammad Salman</creatorcontrib><creatorcontrib>He, Jingsha</creatorcontrib><creatorcontrib>Zhu, Nafei</creatorcontrib><creatorcontrib>Ali, Zulfiqar</creatorcontrib><creatorcontrib>Qasim, Muhammad</creatorcontrib><creatorcontrib>Azmat, Aneeka</creatorcontrib><title>An Efficient Scheme for Detection and Prevention of Black Hole Attacks in AODV-Based MANETs</title><title>International journal of advanced computer science & applications</title><description>Mobile ad hoc network (MANET) is a set of independent mobile nodes, which connect to each other over a wireless channel without any centralized infrastructure, nor integrated security. MANET is a weak target to many Denial of Service (DOS) attacks, which seriously harms its functionality and connectivity. A black hole attack is a type of DOS attack, where the malevolent node tries to get all the data packets from a source node by sending fabricated fake route reply (RREP) packet, falsely pretending that it possesses the shortest path towards the destination node, and then drops all the packets it receives. In this paper, the AODV (Ad-hoc on-demand distance vector) routing protocol is improved by incorporating an efficient and simple mechanism to mitigate black hole attacks. Mechanism to detect black hole attacks from MANET (MDBM) uses fake route request (RREQ) packets with an unreal destination address in order to detect black hole nodes prior to the actual routing process. Simulation experiment conducted has verified the performance of the proposed detection and prevention scheme. The results demonstrated that the proposed mechanism performed well in terms of Packet Delivery Ratio, End-to-End Delay and Throughput under black hole attack.</description><subject>Black holes</subject><subject>Communication</subject><subject>Computer science</subject><subject>Denial of service attacks</subject><subject>Mobile ad hoc networks</subject><subject>Nodes</subject><subject>Packets (communication)</subject><subject>Prevention</subject><subject>Protocol</subject><subject>Routing (telecommunications)</subject><subject>Shortest-path problems</subject><subject>Wireless networks</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotkFtLAzEQhYMoWGr_gQ8Bn3fNdbv7uL1oK9UKrSL4ENJkglvb3Zqkgv_e7WVe5sxw5gx8CN1SklIhs-J--lQOF2XKCC1SQgmhnF2gDqMyS6Tsk8ujzhNK-h_XqBfCmrTFC5blvIM-yxqPnatMBXXEC_MFW8Cu8XgEEUysmhrr2uJXD7-t4TA2Dg822nzjSbMBXMbY6oCrGpfz0Xsy0AEsfi5fxstwg66c3gTonXsXvT2Ml8NJMps_ToflLDGcyZiInPWFsEYw6yS3DIjLTAFQSAdCOrvSkueca6eNpVK223xVtJdEGGE4t7yL7k65O9_87CFEtW72vm5fKpbJjBeZlKJ1iZPL-CYED07tfLXV_k9Roo4k1YmkOpBUZ5L8H3vcZPs</recordid><startdate>2019</startdate><enddate>2019</enddate><creator>Pathan, Muhammad Salman</creator><creator>He, Jingsha</creator><creator>Zhu, Nafei</creator><creator>Ali, Zulfiqar</creator><creator>Qasim, Muhammad</creator><creator>Azmat, Aneeka</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2019</creationdate><title>An Efficient Scheme for Detection and Prevention of Black Hole Attacks in AODV-Based MANETs</title><author>Pathan, Muhammad Salman ; He, Jingsha ; Zhu, Nafei ; Ali, Zulfiqar ; Qasim, Muhammad ; Azmat, Aneeka</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c325t-482744dc42df53d2e0f6c9ee95fe45fdba53833afacd1555fe8b932504c4c33d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Black holes</topic><topic>Communication</topic><topic>Computer science</topic><topic>Denial of service attacks</topic><topic>Mobile ad hoc networks</topic><topic>Nodes</topic><topic>Packets (communication)</topic><topic>Prevention</topic><topic>Protocol</topic><topic>Routing (telecommunications)</topic><topic>Shortest-path problems</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Pathan, Muhammad Salman</creatorcontrib><creatorcontrib>He, Jingsha</creatorcontrib><creatorcontrib>Zhu, Nafei</creatorcontrib><creatorcontrib>Ali, Zulfiqar</creatorcontrib><creatorcontrib>Qasim, Muhammad</creatorcontrib><creatorcontrib>Azmat, Aneeka</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science & applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pathan, Muhammad Salman</au><au>He, Jingsha</au><au>Zhu, Nafei</au><au>Ali, Zulfiqar</au><au>Qasim, Muhammad</au><au>Azmat, Aneeka</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Efficient Scheme for Detection and Prevention of Black Hole Attacks in AODV-Based MANETs</atitle><jtitle>International journal of advanced computer science & applications</jtitle><date>2019</date><risdate>2019</risdate><volume>10</volume><issue>1</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>Mobile ad hoc network (MANET) is a set of independent mobile nodes, which connect to each other over a wireless channel without any centralized infrastructure, nor integrated security. MANET is a weak target to many Denial of Service (DOS) attacks, which seriously harms its functionality and connectivity. A black hole attack is a type of DOS attack, where the malevolent node tries to get all the data packets from a source node by sending fabricated fake route reply (RREP) packet, falsely pretending that it possesses the shortest path towards the destination node, and then drops all the packets it receives. In this paper, the AODV (Ad-hoc on-demand distance vector) routing protocol is improved by incorporating an efficient and simple mechanism to mitigate black hole attacks. Mechanism to detect black hole attacks from MANET (MDBM) uses fake route request (RREQ) packets with an unreal destination address in order to detect black hole nodes prior to the actual routing process. Simulation experiment conducted has verified the performance of the proposed detection and prevention scheme. The results demonstrated that the proposed mechanism performed well in terms of Packet Delivery Ratio, End-to-End Delay and Throughput under black hole attack.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2019.0100132</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2158-107X |
ispartof | International journal of advanced computer science & applications, 2019, Vol.10 (1) |
issn | 2158-107X 2156-5570 |
language | eng |
recordid | cdi_proquest_journals_2656396554 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Black holes Communication Computer science Denial of service attacks Mobile ad hoc networks Nodes Packets (communication) Prevention Protocol Routing (telecommunications) Shortest-path problems Wireless networks |
title | An Efficient Scheme for Detection and Prevention of Black Hole Attacks in AODV-Based MANETs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T13%3A44%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Efficient%20Scheme%20for%20Detection%20and%20Prevention%20of%20Black%20Hole%20Attacks%20in%20AODV-Based%20MANETs&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Pathan,%20Muhammad%20Salman&rft.date=2019&rft.volume=10&rft.issue=1&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2019.0100132&rft_dat=%3Cproquest_cross%3E2656396554%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2656396554&rft_id=info:pmid/&rfr_iscdi=true |