Skip to main content

STABA: Secure Trust Based Approach for Black-Hole Attack Detection

  • Conference paper
  • First Online:
Applications of Artificial Intelligence and Machine Learning

Abstract

The rapid advancement of mobile computing and wireless networking technology has resulted in a massive increase in the number of mobile users around the world. This reality is at the heart of modern mobile ad-hoc network deployments and the delivery of reliable communication services to users. Owing to a lack of resources and a complex network topology, providing dependable service is difficult. Trust protocols for mobile ad hoc network have developed as an active research topic in modern years due to the development of trust protocols to enable mobile community-based applications. Since there is no central coordination and the wireless medium is shared, reliable communications in ad hoc wireless networks is much more complicated than in wired networks. The intend of Quality-of-Service provisioning is to accomplish more deterministic network operations, allowing for more effective distribution of network information and better use of network resources. In this paper, we use the weighted method to suggest a composite trust-based approach. The packet delivery ratio, buffer length and energy utilization rate must be considered when calculating the weighted trust. In this case, the computed weight serves as the system’s positive trust, while the negative trust is also computed. MANET has established a defense against black-hole attacks using both trusts. The provided technique’s experimental results demonstrate safe data communication and optimized efficiency of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dani V, Bhati N, Bhati D (2021) EECT: energy efficient clustering technique using node probability in ad-hoc network. In: Innovations in bio-inspired computing and applications, IBICA 2020. Advances in intelligent systems and computing, vol 1372. Springer, pp 187–195

    Google Scholar 

  2. Dani V, Birchha V (2015) An improved wormhole attack detection and prevention method for wireless mesh networks. Int J Adv Res Comput Commun Eng 4(12)

    Google Scholar 

  3. Jøsang A (2007) Trust and reputation systems. In: Foundations of security analysis and design IV. Springer, Heidelberg, pp 209–245

    Google Scholar 

  4. Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36(1):41–50

    Article  MathSciNet  Google Scholar 

  5. Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75

    Article  Google Scholar 

  6. Djahel S, Nait-Abdesselam F, Zhang Z (2010) Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges. IEEE Commun Surv Tutor 13(4):658–672

    Article  Google Scholar 

  7. Dani V (2022) iBADS: an improved black-hole attack detection system using trust based weighted method. J Inf Assur Secur 17(3)

    Google Scholar 

  8. Pirzada A, Datta A, McDonald C (2004) Trust-based routing for ad-hoc wireless networks. In: Proceedings of the international conference on networks, vol 1, pp 326–330

    Google Scholar 

  9. Dani V, Bhonde R, Mandloi A (2022) iWAD: an improved wormhole attack detection system for wireless sensor network. In: International conference on intelligent systems design and applications. Springer, Cham, pp 1002–1012

    Google Scholar 

  10. Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf Secur 6(2):77–83

    Article  Google Scholar 

  11. Patel NJK, Tripathi K (2018) Trust value based algorithm to identify and defense gray-hole and black-hole attack present in MANET using clustering method. Int J Sci Res Sci Eng Technol 4:281–287

    Google Scholar 

  12. Arulkumaran G, Gnanamurthy RK (2019) Fuzzy trust approach for detecting black hole attack in mobile adhoc network. Mobile Netw Appl 24(2):386–393

    Article  Google Scholar 

  13. Kamel MBM, Alameri I, Onaizah AN (2017) STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET. In: IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC), pp 1278–1282

    Google Scholar 

  14. Kshirsagar VH, Kanthe AM, Simunic D (2018) Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Pers Commun 100:311–320

    Article  Google Scholar 

  15. Naveena S, Senthilkumar C, Manikandan T (2020) Analysis and countermeasures of black-hole attack in MANET by employing trust-based routing. In: 2020 6th international conference on advanced computing and communication systems (ICACCS), pp 1222–1227

    Google Scholar 

  16. The Network Simulator. NS-2 Available Online at: http://www.isi.edu/nsnam/ns/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Virendra Dani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dani, V., Kokate, P., Umre, J. (2022). STABA: Secure Trust Based Approach for Black-Hole Attack Detection. In: Unhelker, B., Pandey, H.M., Raj, G. (eds) Applications of Artificial Intelligence and Machine Learning. Lecture Notes in Electrical Engineering, vol 925. Springer, Singapore. https://doi.org/10.1007/978-981-19-4831-2_58

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-4831-2_58

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-4830-5

  • Online ISBN: 978-981-19-4831-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics