Skip to main content
Log in

Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks

  • Research Article - Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

Identifying a trusted and secure route in an un-trusted environment is always a challenging problem. Lack of centralized infrastructure and dependence on other nodes for routing data, always pose security threats in ad hoc networks. So routing in ad hoc networks demands a secure end-to-end route that is free of malicious nodes for reliable packet forwarding. In this paper, we have designed a routing solution called Trust Based Dynamic Source Routing that enables the Dynamic Source Routing (DSR) Protocol to find a secure end-to-end route free of black hole nodes with cooperation from the neighbors. Also our solution can be able to protect the network in the presence of colluding attackers without the need of promiscuous monitoring the neighbor nodes. Extensive simulation has been carried out to evaluate the design of our protocol. The experiment results show that our protocol is able to achieve routing security with 42 % increase in packet delivery ratio and 37 % reduction in packet loss rate when compared to standard DSR under cooperative black hole attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Sanzgiri, K.; et al.: A secure routing protocol for ad hoc networks. In: Proceeding of the 10th IEEE International Conference on Network Protocols (ICNP’02) (2002)

  2. Hu, Y.-C.; Perrig, A.; Johnson, D.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. J. (2005)

  3. Zapata, M.G.; Asokan, N.: Securing ad hoc routing protocols. In: WiSe’02 (2002)

  4. Luo, J.; Fan, M.; Ye, D.: Black hole attack prevention based on authentication mechanism. In: Proceeding of the IEEE Singapore International Conference on Communication Systems (ICCS) (2008)

  5. Eissa, T.; Razak, S.A.; Ngadi, M.A.: A novel lightweight authentication scheme for mobile ad hoc networks. Arab. J. Sci. Eng. 37, (2012)

  6. Seno S.A.H., Budiarto R., Wan T.-C.: A secure mobile ad hoc network based on distributed certificate authority. Arab. J. Sci. Eng. 36, 245–257 (2011)

    Article  Google Scholar 

  7. Buchegger, S.; Le Boudec, J.-Y.: Performance analysis of the CONFIDANT protocol (cooperation of nodes: fairness in dynamic ad-hoc networks). In: MOBIHOC ’02 (2002)

  8. Marti, S.; Giuli, T.J.; Lai, K.: Mitigating routing misbehavior in mobile ad hoc networks. In: Mobile Computing and Networking (MOBICOM), pp. 255–265 (2000)

  9. Bhalaji N., Kanakeri A.V., Chaitanya K.P., Shanmugam A.: Trust based strategy to resist collaborative blackhole attack in MANET. Int. J. Inf. Process. Manag. 70, 465–474 (2010)

    Google Scholar 

  10. Li, J.-S.; Lee, C.-T.: Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks. Comput. Commun., 1121–1132 (2006)

  11. Raza, I.; Hussain, S.A.: Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Comput. Commun., 1796–1802 (2008)

  12. Kurosawa, S.; Nakayama, H.; Kato, N.; Jamalipour, A.; Nemoto, Y.: Detecting black hole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int. J. Netw. Secur., 338–346 (2007)

  13. Tamilselvan L., Sankaranarayanan V.: Prevention of co-operative blackhole attack in MANET. J. Netw. 3, 13–20 (2008)

    Google Scholar 

  14. Deng H., Agarwal P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40, 70–75 (2002)

    Article  Google Scholar 

  15. Jiang N., Sheu S., Hua K.A., Ozyer O.: A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 4, 3–16 (2010)

    Article  Google Scholar 

  16. Djenouri D., Badache N.: A gradual solution to detect selfish nodes in mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 4, 264–274 (2010)

    Article  Google Scholar 

  17. Johnson, D.B.; Maltz, D.A.; Hu, Y.-C.: The dynamic source routing protocol for mobile ad-hoc network (DSR). IETF Internet Draft (2004)

  18. Zeng, X.; Bagrodia, R.; Gerla, M.: GloMoSim: a library for parallel simulation of large-scale wireless networks. In: Proceedings of the 12th workshop on parallel and distributed simulation (1998)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Mohanapriya.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mohanapriya, M., Krishnamurthi, I. Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks. Arab J Sci Eng 39, 1825–1833 (2014). https://doi.org/10.1007/s13369-013-0764-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-013-0764-1

Keywords

Navigation