Modified DSR protocol for detection and removal of selective black hole attack in MANET

Gray hole attack detection by destination node. •We proposed a light weight, non-cryptographic and energy efficient solution for gray hole detection process in MANET.•The destination node detects the presence of malicious nodes and with the help of IDS, isolates them from the network.•IDS nodes will...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & electrical engineering 2014-02, Vol.40 (2), p.530-538
Hauptverfasser: Mohanapriya, M., Krishnamurthi, Ilango
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Gray hole attack detection by destination node. •We proposed a light weight, non-cryptographic and energy efficient solution for gray hole detection process in MANET.•The destination node detects the presence of malicious nodes and with the help of IDS, isolates them from the network.•IDS nodes will turn into promiscuous listening only in the presence of attack which results in less energy loss.•Our scheme is found to achieve routing security with 64% reduction in packet loss rate than DSR. A black hole attack in ad hoc network refers to an attack by malicious nodes, which forcibly acquires the route from a source to destination by falsely advertising shortest hop count to reach the destination node. In this paper, we present a Modified Dynamic Source Routing Protocol (MDSR) to detect and prevent selective black hole attack. Selective black hole attack is a special kind of black hole attack where malicious nodes drop the data packets selectively. We proposed an Intrusion Detection System (IDS) where the IDS nodes are set in promiscuous mode only when required, to detect the abnormal difference in the number of data packets being forwarded by a node. When any anomaly is detected, the nearby IDS node broadcast the block message, informing all nodes on the network to cooperatively isolate the malicious node from the network. The proposed technique employs Glomosim to validate the effectiveness of proposed intrusion detection system.
ISSN:0045-7906
1879-0755
DOI:10.1016/j.compeleceng.2013.06.001