Skip to main content

Enhanced Security of MANETs Against Black Hole Attacks Using AS Technique

  • Conference paper
  • First Online:
  • 1108 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 500))

Abstract

A mobile ad hoc network (MANET) is an autonomous structureless arrangement of mobile nodes to figure a momentary network. Communication between any two nodes is possible directly if the two nodes belong to the same sensing range; otherwise communication can be achieved by means of the nodes which are present between source and destination. As the network nodes are mobile, any node can enter or leave the network at any particular time interval. Thus, whichever node is present in between the source and destination can perform as a router or the host node in the arranged network. Therefore this poses security challenges to MANETs. This paper presents a solution to black hole attacks. The presented method is easy to use and efficient in detecting black hole attacks. The presented approach is validated by the use of network simulator 2 (NS2).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and counter measures. AdHoc Netw J Spec Issue Sens Netw Appl Protoc 1(2–3):293–315

    Google Scholar 

  2. Douceur JR (2002) The Sybil attack. In: Druschel P, Kaashoek MF, Rowstron A (eds) IPTPS 2002, vol 2429. LNCS. Springer, Heidelberg, pp 251–260

    Google Scholar 

  3. Sanjeev R, Manpreet S (2011) Performance analysis of malicious node aware routing for MANET using two hop authentication. Int J Comput Appl 25(3):17–24

    Google Scholar 

  4. Chandrakant N (2013) Self protecting nodes for secured data transmission in energy efficient MANETs. Int J Adv Res Comput Sci Softw Eng 3(6):673–675

    Google Scholar 

  5. Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Adhoc networks. In: Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security: advanced communications and multimedia security, Portorosz, Slovenia, pp 107–121

    Google Scholar 

  6. Hu YC, Perrig A, Johnson DB (2005) Aridane: a secure on-demand routing protocol for Adhoc networks. Wireless Netw 11:21–38

    Article  Google Scholar 

  7. Sharma VC, Gupta A, Dimri V (2013) Detection of black hole attack in MANET under AODV routing protocol. Int J Adv Res Comput Sci Softw Eng 3(6):438–443

    Google Scholar 

  8. Deng H, Li W, Agrawal DP (2002) Routing security in wireless Adhoc networks. IEEE Commun Mag 40(10):70–75

    Article  Google Scholar 

  9. Lu S, Li L, Lem KY, Jia L (2009) SAODV: a MANET routing protocol that can withstand black hole attack. In: Proceedings of the 2009 international conference on computational intelligence and security (CIS 2009), vol 2, Beijng, China, pp 421–425

    Google Scholar 

  10. Deswal S, Sing S (2010) Implementation of routing security aspects in AODV. Int J Comput Theory Eng 2(1):135–138

    Article  Google Scholar 

  11. Kukreja D, Dhurandher SK, Reddy BVR (2017) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humaniz Comput 1–16

    Google Scholar 

  12. Adnan A, Abubakar K, Channa MI, Haseeb K, Khan AW (2016) A trust aware routing protocol for energy constraint wireless sensor networks. Telecommun Syst 61(1):123–140

    Article  Google Scholar 

  13. Ahmad SJ, Reddy VSK, Damodaram A, Krishna PR (2013) Location aware and energy efficient routing protocol for long distance MANETs. Int J Netw Virtual Organ (IJNVO) 13(4):327–350 Inderscience

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ishrath Unissa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Unissa, I., Ahmad, S.J. (2019). Enhanced Security of MANETs Against Black Hole Attacks Using AS Technique. In: Kumar, A., Mozar, S. (eds) ICCCE 2018. ICCCE 2018. Lecture Notes in Electrical Engineering, vol 500. Springer, Singapore. https://doi.org/10.1007/978-981-13-0212-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0212-1_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0211-4

  • Online ISBN: 978-981-13-0212-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics