Abstract
Mobile Ad hoc Network (MANET) is a self-configurable, self-maintenance network with wireless, mobile nodes. Special features of MANET like dynamic topology, hop-by-hop communications and open network boundary, made security highly challengeable in this network. From security aspect, routing protocols are highly vulnerable against a wide range of attacks like black hole. In black hole attack malicious node injects fault routing information to the network and leads all data packets toward it-self. In this paper, we proposed an approach to detect and eliminate cooperative malicious nodes in MANET with AODV routing protocol. A data control packet is used in order to check the nodes in selected path; also, by using an Extended Data Routing Information table, all malicious nodes in selected path are detected, then, eliminated from network. For evaluation, our approach and a previous work have been implemented using Opnet 14 in different scenarios. Referring to simulation results, the proposed approach decreases packet overhead and delay of security mechanism with no false positive detection. In addition, network throughput is improved by using the proposed approach.
Similar content being viewed by others
References
Kies, A., Mehar, S., Rodwane, B., & Maaza, Z. M. (2012). Self-organization framework for mobile ad hoc networks. In 8th international wireless communications and mobile computing conference (IWCMC).
Kaur, T., Toor, A. S., & Saluja, K. K. (2014). Defending MANETs against flooding attacks for military applications under group mobility. Engineering and Computational Sciences (RAECS), 2014 Recent Advances in IEEE (pp. 1–6). Chandigarh. doi:10.1109/RAECS.2014.6799499.
Zehua, W., Yuanzhu, C., & Cheng, L. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 859–868.
Zahidi, S. Z. H., Aloul, F., Sagahyroon, A., & El-Hajj, W. (2013). Optimizing complex cluster formation in MANETs using SAT/ILP techniques. IEEE Sensors Journal, 13, 2400–2412.
Dorri, A., & Nikdel, H. (2015). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In 7th conference on information and knowledge technology (IKT), (pp. 1–6). 26.
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). DoS attacks in mobile ad hoc networks: A survey. In Second international conference on advanced computing & communication technologies (ACCT). f.
Sharma, D., Gajkumar Shah, P., & Huang, X. (2010). Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In NSS ‘10 proceedings of the fourth international conference on network and system security.
Dorri, A., Kamel, S. R., & Kheyrkhah, E. (2015). Security challenges in mobile ad hoc network: A Survey. International journal of Computer science and engineering survey (IJCSES),. doi:10.5121/ijcses.2015.6102.
Khan, Z. A., & Islam, M. H. (2012). Wormhole attack: A new detection technique. In International conference on emerging technologies (ICET).
Morshed, M. M., Ko, F. I. S., Dongwook, L., & Rahman, M. H. (2010). Performance evaluation of DSDV and AODV routing protocols in mobile ad hoc networks. In 4th international conference on new trends in information science and service science (NISS).
Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Third international conference on advanced computing and communication technologies (ACCT).
Ismail, Z., & Hassan, R. (2010). Performance of AODV routing protocol in mobile ad hoc network. In International symposium in information technology (ITSim) (Vol. 1).
Dhurandher, S. K., Woungang, I., Mathur, R., & Khurana, P. (2013). GAODV: A modified AODV against single and collaborative black hole attacks in MANETs. In 27th international conference on advanced information networking and applications workshops (WAINA).
Bagwari, A., Jee, R., Joshi, P., & Bisht, S. (2012). Performance of AODV routing protocol with increasing the MANET nodes and its effects on QoS of mobile ad hoc networks. In International conference on communication systems and network technologies (CSNT).
Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent black hole and gray hole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12.
Mishra, A., Jaiswal, R., & Sharma, S. (2012). A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network. In IEEE.
Jaisankar, N., Saravanan, R., & Durai Swamy, K. (2010). A novel security approach for detecting black hole attack in MANET. Information Processing and Management Communications in Computer and Information, Science, 70, 217–223.
Nath, I., & Chaki, R. (2012). BHAPSC: A new black hole attack prevention system in clustered MANET. International Journal of Advanced Research in Computer Science and Software Engineering, 2(8), 113–121.
Surana, K. A., Rathi, S. B., Thosar, T. P., & Mehatre, S. (2012). Securing black hole attack in routing protocol AODV in MANET with watchdog mechanisms. World Research Journal of Computer Architecture, 1(1), 19–23.
Jain, S., Jain, M., & Kandwal, H. (2010). Advanced algorithm for detection and prevention of cooperative black and gray hole attacks in mobile ad hoc networks. International Journal of Computer Applications, 1(7), 37–42.
Rutvij, H. J., Sankita, J. P., & Devesh, C. J. (2012). A novel approach for grayole and black hole attacks in mobile ad hoc networks. In Second international conference on advanced computing and communication technologies, IEEE.
Thachil, F., & Shet, K. C. (2012). A trust based approach for AODV protocol to mitigrate black hole attack in MANET. In International conference on computing science.
Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of cooperative black hole and gray hole attacks in MANETs. In International conference on system engineering and technology, IEEE.
Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In Second international conference on intelligent systems, modelling and simulation (ISMS).
Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking, FGCN (Vol. 2).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Dorri, A. An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. Wireless Netw 23, 1767–1778 (2017). https://doi.org/10.1007/s11276-016-1251-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-016-1251-x