Skip to main content
Log in

A New Mathematical and Correlation Coefficient Based Approach to Recognize and to Obstruct the Black Hole Attacks in Manets Using DSR Routing

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile Adhoc networks (MANETs) is new exemplar of wireless networks which has some unparalleled features such like dynamically altering topology, baseless network, conveyance range, routing process and the reliability. Black hole attack is one such consequence number based prevalent attack, which depreciate the effectiveness and fidelity of a network in the form of dripping all the inward packets by the wicked node. This black void node purports to bluff each and every bit of node involved in the network that wishes to connect with some other node by dispatching a forged route reply packets and by feigning that it has the perfect and quickest path to the receiver node. This paper proposes a new secured and a reliable method to obstruct black hole attacks in Manets, which is an advancement of already suggested method and a correlation coefficient technique is exerted to confirm the presence of wicked node. The simulation conclusions portrays that this propounded technique will heightens the efficiency of a networking system in relation to the network parametrics such like packet delivered ratio, end to end delay, packet drip ratio when equated with existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Bakshi, A., Sharma, A. K., Mishra, A. (2013). Significance of mobile adhoc networks (MANETS). International Journal of Innovative Technology and Exploring Engineering 2(4), ISSN- 2278-3078.

  2. Burbank, J. L., Chimento, P. F., Haberman, B. K., & Kasch, W. T. (2009). Key challenges of military tactical Netw. And elusive promise of MANET technology. IEEE Communication Magazine, 44(11), 39–45.

    Article  Google Scholar 

  3. Mirza, S., & Bakshi, S. Z. (2018). Introduction to MANET. International Research Journal of Engineering and Technology, 5(1), 17–20.

    Google Scholar 

  4. Yasin, A., & Zant, M. A. (2018). Detecting and isolating blackhole attacks in manets using timer based baited technique. Wireless Communication and Mobile computing. https://doi.org/10.1155/2018/9812135.

    Article  Google Scholar 

  5. Perkins, C., Royer, E. (1999).Adhoc on demand distance vector routing. In Proceeding of the second IEEE workshop on mobile computing systems and applications, New Orleans.

  6. Jain, S., Jain, M., & Kandal, H. (2010). Advanced algorithm for detection and prevention of cooperative black-hole attack and greyhole attacks in mobile adhoc networks. International Journal of Computer Applications, 1(7), 37–42.

    Article  Google Scholar 

  7. Anitha, E. A. M., & Vasudevan, V. (2010). Blackhole attack prevention in multicast routing protocols for mobile adhoc networks using certificate chaining. International Journal of Computer Applications, 1(2), 21–28.

    Google Scholar 

  8. Lo, N. W. (2013). A securing routing protocol to present cooperative blackhole attack in MANETs. Intelligent Technologies and Engineering Systems (pp. 59–65), Springer.

  9. Rajesh Babu, M., Moses Dian, S., Chelladurai, Siva, & Palaniappan, Mathiyalagan. (2015). Proactive alleviation procedure to handle blackhole and its version. Scientific World Journal. https://doi.org/10.1155/2015/715820.

    Article  Google Scholar 

  10. Issac, Sanjay Kumar, Obaidat, Mohammad S., & Dheeraj, Rajender. (2013). A DSR based routing protocol for mitigating blackhole attacks on mobile adhoc networks. Security and Communication Network, 9(5), 420–428. https://doi.org/10.1002/sec.766.

    Article  Google Scholar 

  11. Singh, M. M., & Mandal, J. K. (2018). Effect of blackhole attack on manets reliability in DSR routing protocol. Advances in Intelligent Systems and Computing. https://doi.org/10.1007/978-981-10-4603-2_26.

    Article  Google Scholar 

  12. Chang, J.-M., Tsou, P.-C., Woungang, I., Chao, H.-C., & Lai, C.-F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65–75.

    Article  Google Scholar 

  13. Shu, Tao, & Krunz, Marwan. (2014). Privacy preserving and truthful detection of packet dropping attack in wireless adhoc networks. IEEE Transaction on Mobile Computing, 14(4), 813–828. https://doi.org/10.1109/tmc.2014.2330818.

    Article  Google Scholar 

  14. Yasin, Adwan, & Zant, Mahmoud Abu. (2018). Detecting and isolating blackhole attacks in manets using timer based baited technique. Wireless Communication and Mobile Computing. https://doi.org/10.1155/2018/9812135.

    Article  Google Scholar 

  15. Arora, S. K., Vijan, S., & Gaba, G. S. (2016). Detection and analysis of blackhole attack using IDS. Indian Journal of Science and Technology, 9(20), 1–5.

    Article  Google Scholar 

  16. Kaur, H., & Mangat, K. (2017). Black hole attacks in mobile adhoc networks: A review. International Journal of Advance Research, Ideas and Innovations in Technology, 3(2), 189–191.

    Google Scholar 

  17. Gurung, S., Chauhan, S. (2019). A survey of Blackhole attack Mitigation techniques in MANET: Merits, drawbacks and suitability. Wireless Networks, springer link (pp. 1–19).

  18. Thebiga, M., Pramila, S. R. An efficient and composite trust based stochastic approach to defy packet dripping attack in manets with predominant network factors Paper submitted (unpublished).

  19. Gurung, S., & Chauhan, S. (2017). A dynamic threshold based approach for mitigating Blackhole attack in MANET. Wireless Networks, 24(8), 2957–2971. https://doi.org/10.1007/s11276-017-1514-1.

    Article  Google Scholar 

  20. Thebiga, M., & Pramila, R. S. (2020). A survey on assorted subsisting approaches to recognize and preclude Blackhole attacks in Mobile adhoc networks. International Journal of Interactive Mobile Technologies (iJIM), 14(01), 96–108.

    Article  Google Scholar 

  21. Johnson, D., Maltz, D. (1996). Dynamic source routing in adhoc wireless networks. Mobile Computing (pp. 153–181).

  22. Murthy, R. M., Manoj, B. S. (2004). Adhoc wireless networks: Architectures and protocols. Prentice Hall communication engineering and emerging Technology Series, Pearson Education, 2004. ISBN 0-13-147023-X.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Thebiga.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thebiga, M., SujiPramila, R. A New Mathematical and Correlation Coefficient Based Approach to Recognize and to Obstruct the Black Hole Attacks in Manets Using DSR Routing. Wireless Pers Commun 114, 975–993 (2020). https://doi.org/10.1007/s11277-020-07403-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07403-1

Keywords

Navigation