Abstract
The mobile ad hoc networks (MANETS) are decentralized, multi-hop networks in which the intermediate nodes play an role of routers to pass data packets to destination. The Routing protocols are playing very vital role in effectiveness of MANETS due to mobility and dynamically changing of topology. Due to the nature of broadcast wireless medium and not have central control now many routing protocols are vulnerable to attacks. These attacks are black hole attack, greyhole attack, sinkhole attack, byzantine attack, sleep deprivation attack and wormhole attack. The paper is discussing all these attacks. From these routing protocols, one of protocol is ad hoc on-demand distance vector routing (AODV). It is a very trendy routing protocol and it is very susceptible to black hole attacks. In black hole attack a mobile node mistakenly publicize the route and sinks data packets to incorrect destination instead of sending to accurate destination. It analyzes the related work and position a solution based on analysis.
Similar content being viewed by others
References
Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K (2003) Prevention of cooperative black hole attack in wireless ad hoc networks. In: 2003 International conference on wireless networks (ICWN 03), Las Vegas, Nevada, USA
Kurosawa S, Nakayama H, Kato N, Jamalipour A, Nemoto Y (2007) Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int J Netw Secur 5(3):338–346
Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in MANET. J Netw 3(5):13–20
Weerasinghe H, Fu H (2008) Prevention of co-operative black hole attack in MANET: simulation implementation and evaluation. Int J Softw Eng Appl 2(3)
Su MY, Chiang K-L, Liao W-C (2010) Mitigation of black hole attack nodes in mobile ad hoc network. In: International symposium on parallel and distributed processing with application. IEEE Conference, Taipei, Taiwan
Gupta S, Kar S, Daramraja S (2011) BAAP: black hole attack avoidance protocol for wireless sensor network. In: 2nd International conference on computer and communication technology (ICCCT), IEEE, Allahabad, India
Jhaveri RH, Patel SJ, Jinwala DC (2012) A novel approach for gray hole attack and black hole attacks in mobile Ad hoc networks. In: 2nd international on advanced computer and communication technologies (ACCT), IEEE, Rohtak, Haryana, India
Chatterje N, Mandal JK (2013) Detection of black hole behavior using triangular encryption in NS2. In: 1st international conference on computational intelligence: modeling techniques and applications (CIMTA), Procedia Technology Elsevier, pp 524–529
Tan S, Kim K (2013) Secure route discovery for preventing black hole attacks on AODV based MANETS. ICT Convergence (ICTC). In: 2013 International conference, Jeju
Perkins CE, Royer EM (1999) Ad hoc on demand distance vector routing, mobile computing system and applications. In: Second IEEE workshop on mobile computing systems and applications, WMCSA IEEE, New Orleans, USA
Jamal T, Butt SA (2017) Low-energy adaptive clustering hierarchy (LEACH) enhancement for military security operations. J Basic Appl Sci Res 7(5):12–17 (ISSN 2090-4304)
Jamal T, Alam M, Umair MM (2017) Detection and prevention against RTS attacks in wireless LANs. In: International conference on communication, computing and digital systems (C-CODE), IEEE, Islamabad, Pakistan
Jamal T, Mendes P (2014) Cooperative relaying in user-centric networking under interference conditions. In: IEEE communications magazine, vol. 52, no. 12, pp. 18–24. https://doi.org/10.1109/MCOM.2014.6979947
Makwana S, Vaghela K (2015) Detection and elimination of gray hole attack using dynamic credit based technique in MANET. Int J Comput Appl 125(4):975–8887
Sharma R (2016) Gray-hole attack in mobile ad hoc networks: a survey. IJCSIT 7
Gandhewar N, Patel R (2012) Detection & prevention of sinkhole attack on AODV protocol in mobile adhoc network. In: Fourth international conference on computational intelligence and communication networks, IEEE, Mathura, India
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1:293–315
Jhaveriand RH, Patel AD (2010) MANET routing protocols and wormhole attack against AODV. IJCSNS Int J Comput Sci Netw Secur 10(4):12–18
Geetha A, Sreenath N (2016) Byzantine attacks and its security measures in mobile adhoc networks. Int J Comput Commun Instrum Engg (IJCCIE) 3(1)
Sarkar M, Roy DB (2011) Prevention of sleep deprivation attacks using clustering. In: 3rd international conference on electronics computer technology (ICECT), IEEE, Kanyakumari, India
Pirretti M, Zhu S (2006) The sleep deprivation attack in sensor networks: analysis and methods of defense. Int J Distrib Sens Netw SAGE 2:267–287
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jamal, T., Butt, S.A. Malicious node analysis in MANETS. Int. j. inf. tecnol. 11, 859–867 (2019). https://doi.org/10.1007/s41870-018-0168-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-018-0168-2