Abstract
The rapid advancement of mobile computing and wireless networking technology has resulted in a massive increase in the number of mobile users around the world. This reality is at the heart of modern mobile ad-hoc network deployments and the delivery of reliable communication services to users. Owing to a lack of resources and a complex network topology, providing dependable service is difficult. Trust protocols for mobile ad hoc network have developed as an active research topic in modern years due to the development of trust protocols to enable mobile community-based applications. Since there is no central coordination and the wireless medium is shared, reliable communications in ad hoc wireless networks is much more complicated than in wired networks. The intend of Quality-of-Service provisioning is to accomplish more deterministic network operations, allowing for more effective distribution of network information and better use of network resources. In this paper, we use the weighted method to suggest a composite trust-based approach. The packet delivery ratio, buffer length and energy utilization rate must be considered when calculating the weighted trust. In this case, the computed weight serves as the system’s positive trust, while the negative trust is also computed. MANET has established a defense against black-hole attacks using both trusts. The provided technique’s experimental results demonstrate safe data communication and optimized efficiency of the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dani V, Bhati N, Bhati D (2021) EECT: energy efficient clustering technique using node probability in ad-hoc network. In: Innovations in bio-inspired computing and applications, IBICA 2020. Advances in intelligent systems and computing, vol 1372. Springer, pp 187–195
Dani V, Birchha V (2015) An improved wormhole attack detection and prevention method for wireless mesh networks. Int J Adv Res Comput Commun Eng 4(12)
Jøsang A (2007) Trust and reputation systems. In: Foundations of security analysis and design IV. Springer, Heidelberg, pp 209–245
Kephart JO, Chess DM (2003) The vision of autonomic computing. Computer 36(1):41–50
Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75
Djahel S, Nait-Abdesselam F, Zhang Z (2010) Mitigating packet dropping problem in mobile ad hoc networks: proposals and challenges. IEEE Commun Surv Tutor 13(4):658–672
Dani V (2022) iBADS: an improved black-hole attack detection system using trust based weighted method. J Inf Assur Secur 17(3)
Pirzada A, Datta A, McDonald C (2004) Trust-based routing for ad-hoc wireless networks. In: Proceedings of the international conference on networks, vol 1, pp 326–330
Dani V, Bhonde R, Mandloi A (2022) iWAD: an improved wormhole attack detection system for wireless sensor network. In: International conference on intelligent systems design and applications. Springer, Cham, pp 1002–1012
Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf Secur 6(2):77–83
Patel NJK, Tripathi K (2018) Trust value based algorithm to identify and defense gray-hole and black-hole attack present in MANET using clustering method. Int J Sci Res Sci Eng Technol 4:281–287
Arulkumaran G, Gnanamurthy RK (2019) Fuzzy trust approach for detecting black hole attack in mobile adhoc network. Mobile Netw Appl 24(2):386–393
Kamel MBM, Alameri I, Onaizah AN (2017) STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET. In: IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC), pp 1278–1282
Kshirsagar VH, Kanthe AM, Simunic D (2018) Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Pers Commun 100:311–320
Naveena S, Senthilkumar C, Manikandan T (2020) Analysis and countermeasures of black-hole attack in MANET by employing trust-based routing. In: 2020 6th international conference on advanced computing and communication systems (ICACCS), pp 1222–1227
The Network Simulator. NS-2 Available Online at: http://www.isi.edu/nsnam/ns/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dani, V., Kokate, P., Umre, J. (2022). STABA: Secure Trust Based Approach for Black-Hole Attack Detection. In: Unhelker, B., Pandey, H.M., Raj, G. (eds) Applications of Artificial Intelligence and Machine Learning. Lecture Notes in Electrical Engineering, vol 925. Springer, Singapore. https://doi.org/10.1007/978-981-19-4831-2_58
Download citation
DOI: https://doi.org/10.1007/978-981-19-4831-2_58
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-4830-5
Online ISBN: 978-981-19-4831-2
eBook Packages: Computer ScienceComputer Science (R0)