Skip to main content
Log in

An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile Ad hoc Network (MANET) is a self-configurable, self-maintenance network with wireless, mobile nodes. Special features of MANET like dynamic topology, hop-by-hop communications and open network boundary, made security highly challengeable in this network. From security aspect, routing protocols are highly vulnerable against a wide range of attacks like black hole. In black hole attack malicious node injects fault routing information to the network and leads all data packets toward it-self. In this paper, we proposed an approach to detect and eliminate cooperative malicious nodes in MANET with AODV routing protocol. A data control packet is used in order to check the nodes in selected path; also, by using an Extended Data Routing Information table, all malicious nodes in selected path are detected, then, eliminated from network. For evaluation, our approach and a previous work have been implemented using Opnet 14 in different scenarios. Referring to simulation results, the proposed approach decreases packet overhead and delay of security mechanism with no false positive detection. In addition, network throughput is improved by using the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Kies, A., Mehar, S., Rodwane, B., & Maaza, Z. M. (2012). Self-organization framework for mobile ad hoc networks. In 8th international wireless communications and mobile computing conference (IWCMC).

  2. Kaur, T., Toor, A. S., & Saluja, K. K. (2014). Defending MANETs against flooding attacks for military applications under group mobility. Engineering and Computational Sciences (RAECS), 2014 Recent Advances in IEEE (pp. 1–6). Chandigarh. doi:10.1109/RAECS.2014.6799499.

  3. Zehua, W., Yuanzhu, C., & Cheng, L. (2014). PSR: A lightweight proactive source routing protocol for mobile ad hoc networks. IEEE Transactions on Vehicular Technology, 63, 859–868.

    Article  Google Scholar 

  4. Zahidi, S. Z. H., Aloul, F., Sagahyroon, A., & El-Hajj, W. (2013). Optimizing complex cluster formation in MANETs using SAT/ILP techniques. IEEE Sensors Journal, 13, 2400–2412.

    Article  Google Scholar 

  5. Dorri, A., & Nikdel, H. (2015). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In 7th conference on information and knowledge technology (IKT), (pp. 1–6). 26.

  6. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). DoS attacks in mobile ad hoc networks: A survey. In Second international conference on advanced computing & communication technologies (ACCT). f.

  7. Sharma, D., Gajkumar Shah, P., & Huang, X. (2010). Protecting from attacking the man-in-middle in wireless sensor networks with elliptic curve cryptography key exchange. In NSS ‘10 proceedings of the fourth international conference on network and system security.

  8. Dorri, A., Kamel, S. R., & Kheyrkhah, E. (2015). Security challenges in mobile ad hoc network: A Survey. International journal of Computer science and engineering survey (IJCSES),. doi:10.5121/ijcses.2015.6102.

    Google Scholar 

  9. Khan, Z. A., & Islam, M. H. (2012). Wormhole attack: A new detection technique. In International conference on emerging technologies (ICET).

  10. Morshed, M. M., Ko, F. I. S., Dongwook, L., & Rahman, M. H. (2010). Performance evaluation of DSDV and AODV routing protocols in mobile ad hoc networks. In 4th international conference on new trends in information science and service science (NISS).

  11. Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Third international conference on advanced computing and communication technologies (ACCT).

  12. Ismail, Z., & Hassan, R. (2010). Performance of AODV routing protocol in mobile ad hoc network. In International symposium in information technology (ITSim) (Vol. 1).

  13. Dhurandher, S. K., Woungang, I., Mathur, R., & Khurana, P. (2013). GAODV: A modified AODV against single and collaborative black hole attacks in MANETs. In 27th international conference on advanced information networking and applications workshops (WAINA).

  14. Bagwari, A., Jee, R., Joshi, P., & Bisht, S. (2012). Performance of AODV routing protocol with increasing the MANET nodes and its effects on QoS of mobile ad hoc networks. In International conference on communication systems and network technologies (CSNT).

  15. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent black hole and gray hole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12.

    Google Scholar 

  16. Mishra, A., Jaiswal, R., & Sharma, S. (2012). A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network. In IEEE.

  17. Jaisankar, N., Saravanan, R., & Durai Swamy, K. (2010). A novel security approach for detecting black hole attack in MANET. Information Processing and Management Communications in Computer and Information, Science, 70, 217–223.

    Article  Google Scholar 

  18. Nath, I., & Chaki, R. (2012). BHAPSC: A new black hole attack prevention system in clustered MANET. International Journal of Advanced Research in Computer Science and Software Engineering, 2(8), 113–121.

    Google Scholar 

  19. Surana, K. A., Rathi, S. B., Thosar, T. P., & Mehatre, S. (2012). Securing black hole attack in routing protocol AODV in MANET with watchdog mechanisms. World Research Journal of Computer Architecture, 1(1), 19–23.

    Google Scholar 

  20. Jain, S., Jain, M., & Kandwal, H. (2010). Advanced algorithm for detection and prevention of cooperative black and gray hole attacks in mobile ad hoc networks. International Journal of Computer Applications, 1(7), 37–42.

    Article  Google Scholar 

  21. Rutvij, H. J., Sankita, J. P., & Devesh, C. J. (2012). A novel approach for grayole and black hole attacks in mobile ad hoc networks. In Second international conference on advanced computing and communication technologies, IEEE.

  22. Thachil, F., & Shet, K. C. (2012). A trust based approach for AODV protocol to mitigrate black hole attack in MANET. In International conference on computing science.

  23. Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of cooperative black hole and gray hole attacks in MANETs. In International conference on system engineering and technology, IEEE.

  24. Sen, J., Koilakonda, S., & Ukil, A. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In Second international conference on intelligent systems, modelling and simulation (ISMS).

  25. Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking, FGCN (Vol. 2).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Dorri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dorri, A. An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. Wireless Netw 23, 1767–1778 (2017). https://doi.org/10.1007/s11276-016-1251-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1251-x

Keywords

Navigation