Skip to main content
Log in

Random-Session and K-Neighbour Based Suspected Node Analysis Approach for Cooperative Blackhole Detection in MANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cooperative Blackhole is generated by two or more attackers with mutual handshaking. The nodes behave normally in reciprocal interaction and communication. In this paper, a session based suspected node evaluation model is presented to detect and prevent the cooperative blackhole attacks. A session is established for prior communication estimation as the communication begins. The parameter specific evaluation is performed over the session to identify the distrusted nodes. After this session, the continuous observation on behaviour of suspected nodes is performed throughout the communication. K-neighbour evaluation method is applied to recognize the cooperative attack behaviour of the suspected nodes. The evaluation is performed randomly on smaller separate sessions during the communication. The status update on nodes is also done based to recognize the attacker or safe node. The degree of conjunctive interaction in a flow is observed to recognize the cooperative attacker nodes. The proposed model is simulated on the multiple networks with variations in terms of the number of nodes, node speed and the number of attacker nodes. The evaluations are taken against the independent blackhole and cooperative blackhole nodes. The comparative evaluation against AODV, Probabilistic Blackhole Detection methods verified the reliability and effectiveness of the proposed model. The qualified evaluation performed on PDR and lossrate parameters verified that the investigated model has improved the PDR ratio significantly for highly infected, scattered and dense networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Dorri, A., & Nikdel, H. (2015). A new approach for detecting and eliminating cooperative black hole nodes in MANET. In 7th Conference on information and knowledge technology (IKT), Urmia (pp. 1–6).

  2. Kanthe, A. M., Simunic, D., & Wahane, G. (2014). Detection of cooperative black hole attack using crosschecking with truelink in MANET. In IEEE international conference on computational intelligence and computing research, Coimbatore (pp. 1–6).

  3. Jaiswal, R., Sharma, S., & Mishra, A. (2013). A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network. In 3rd IEEE international advance computing conference (IACC), Ghaziabad (pp. 499–504).

  4. Yamamoto, R., Tanaka, Y., & Yang, B. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In 16th International conference on advanced communication technology, Pyeongchang (pp. 223–232).

  5. Koilakonda, S., Ukil, A., & Sen, J. (2011). A mechanism for detection of cooperative black hole attack in mobile ad hoc networks. In 2nd International conference on intelligent systems, modelling and simulation, Kuala Lumpur (pp. 338–343).

  6. Min, Z., & Jiliu, Z. (2009). Cooperative black hole attack prevention for mobile ad hoc networks. In International symposium on information engineering and electronic commerce, Ternopil (pp. 26–30).

  7. Ntantogian, C., Malliaros, S., Xenakis, C., & Panos, C. (2017). Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Computer Networks,113, 94–110.

    Article  Google Scholar 

  8. Belmehdi, A., & Baadache, A. (2014). Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. Computer Networks,73, 173–184.

    Article  Google Scholar 

  9. Weerasinghe, H., & Fu, H. (2007). Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. In Future generation communication and networking (FGCN 2007), Jeju (pp. 362–367).

  10. Kumar, R., & Kumar, V. (2015). An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Computer Science,48, 472–479.

    Article  Google Scholar 

  11. Rana, V., Gupta, S., & Rana, A. (2015). EMAODV: Technique to prevent collaborative attacks in MANETs. Procedia Computer Science,70, 137–145.

    Article  Google Scholar 

  12. Su, M.-Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications,34, 107–117.

    Article  Google Scholar 

  13. Ragha, L., Marathe, N., & Choudhury, D. R. (2015). Implementing and improving the performance of AODV by receive reply method and securing it from black hole attack. Procedia Computer Science,45, 564–570.

    Article  Google Scholar 

  14. Alameri, I., Onaizah, A. N., & Kamel, M. B. M. (2017) STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET. In IEEE 2nd advanced information technology, electronic and automation control conference (IAEAC), Chongqing (pp. 1278–1282).

  15. Yamamoto, R., Tanaka, Y., & Yang, B. (2012). Historical evidence based trust management strategy against black hole attacks in MANET. In 14th International conference on advanced communication technology (ICACT), PyeongChang (pp. 394–399).

  16. Bhandare, A. S., & Patil, S. B. (2015). Securing MANET against co-operative black hole attack and its performance analysis—A case study. In International conference on computing communication control and automation, Pune (pp. 301–305).

  17. Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In 3rd International conference on advanced computing and communication technologies (ACCT), Rohtak (pp. 254–260).

  18. Sminesh, C. N., & Arathy, K. S. (2016). A novel approach for detection of single and collaborative black hole attacks in MANET. Procedia Technology,25, 264–271.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kapil Juneja.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Juneja, K. Random-Session and K-Neighbour Based Suspected Node Analysis Approach for Cooperative Blackhole Detection in MANET. Wireless Pers Commun 110, 45–68 (2020). https://doi.org/10.1007/s11277-019-06711-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06711-5

Keywords

Navigation