Preventing Black Hole Attack in AODV Routing Protocol Using Dynamic Trust Handshake Based Malicious Behavior Detection
Keywords:
AODV, DTH-AODV, Dynamic Trust Handshake, Performance, ThroughputAbstract
Detection of black hole is a challenging task. Further, isolating such malicious nodes from communication is also a great challenge. Several previous works addresses trust based model for detection and prevention of malicious nodes. Trust based models will consume time to study the neighbor transmissions and will try to identify trustable nodes based on their data forwarding behavior. But this approach will need considerable quantity of time to identify malicious nodes by constantly monitoring the traffic of the neighbor nodes. Another drawback in this model is, false positives – that is, the standard trust based detection mechanisms may wrongly mark a trustable node as non-trustable node if that node, by chance, is not participating in communication even without any bad intention. In this work, the performance of the algorithm is increased using a Dynamic Trust Handshake based detection mechanism (DTH-AODV). Dynamic Trust Handshake based detection mechanism will detect the malicious nodes very quickly and efficiently in a short time military rescue like MANETSscenario without much increase in overhead. To prove its better working, a MANETSshort time communication scenario is simulated and the performance of standard AODV with and without black hole attack is measured using NS2.35 and compared it with Dynamic Packet Forwarding based Trust AODV (DTH-AODV) protocol in terms of different metrics like total number of packets sent received and dropped, throughput, EED, battery consumed etc. The proposed DTH-AODV will use a Dynamic Trust Handshake mechanism for the reliable detection of malicious behavior in MANET.
How to cite this article:
Gupta B, Verma AK, Raheja LR. Preventing Black Hole Attack in AODV Routing Protocol Using. J Engr Desg Anal 2021; 4(1): 20-33.
References
VII. REFERENCES
Chlamtac, Imrich, Marco Conti, and Jennifer J-N. Liu. "Mobile ad hoc networking: imperatives and challenges." Ad hoc networks 1.1 (2003): 13-64.
Perkins and E Royer, “Ad Hoc On-Demand Distance Vector Routing,” 2nd IEEE Wksp. Mobilecomp. Sys. And Apps., 1999.
Kaur, Dilpreet, and Sheetal Kundra. "Comparative Analysis and Improvement in AODV Protocol for Path Establishment in manets." International Journal of Computer Science and Information Security 14.12 (2016): 213.
Sajid, Ahthasham, et al. "Performance Evolution of Reactive, Proactive and Hybrid Routing Protocols in MANET." International Journal of Computer Science and Information Security 14.12 (2016): 144.
Kodole, Amruta, and P. M. Agarkar. "A survey of routing protocols in mobile ad hoc networks." Multi-Disciplinary Journal of Research in Engineering and Tech 2.1 (2015): 336-41.
Neeli, Jyoti, and Dr Nk Cauvery. "Comparative Study of Secured Routing Protocols in Wireless Ad hoc Networks: A Survey." International Journal of Computer Science and Mobile Computing 4.2 (2015): 225-229.
Belding-Royer, E.M. and Toh C.K. “A Review of Current Routing Protocols for Ad-hoc Mobile wireless networks”, IEEE Personal Communications Magazine, pp. 46–55, 1999.
Verma, A.K. and Mayank Dave and Joshi, R.C. “Classification of Routing Protocols in MANET”,National Symposium on Emerging Trends in Networking & Mobile Communication (NSNM-2003), pp. 132-139, 2003.
Abolhasan, M. And Wysocki, T. And Dutkiewicz, E. “A Review of Routing Protocols for Mobile Ad hoc Networks”, Ad Hoc Networks vol. 2(1), pp. 1–22, 2004.
Khan, Muhammad Saleem, et. Al. "Isolating Misbehaving Nodes in MANETS with an Adaptive Trust Threshold Strategy." Mobile Networks and Applications (2017): 1-17.
Das, Debjit, Koushik Majumder, and Anurag Dasgupta. "Selfish node detection and low cost data transmission in MANET using game theory." Procedia Computer Science 54 (2015): 92-101.
Khan, Muhammad Saleem, Qasim Khan Jadoon, and Majid I. Khan. "A Comparative Performance Analysis of manetsrouting Protocols under Security Attacks." Mobile and Wireless Technology 2015. Springer Berlin Heidelberg, 2015. 137-145.
Ferdous, Raihana, and Vallipuram Muthukkumarasamy. "A Comparative Performance Analysis of manets Routing Protocols in Trust-Based Models." Computational Science and Computational Intelligence (CSCI), 2016 International Conference on. IEEE, 2016.
Simaremare, Harris, et al. "Security and performance enhancement of AODV routing protocol." International Journal of Communication Systems 28.14 (2015): 2003-2019.
Gharehkoolchian, Mahsa, AM Afshin Hemmatyar, and Mohammad Izadi. "Improving Security Issues in MANETS AODV Routing Protocol." International Conference on Ad Hoc Networks. Springer International Publishing, 2015.
Ngadi, Md. A. And Khokhar, R. H. And Mandala, S. “ A Review Current Routing Attacks in Mobile Ad-hoc Networks”, International Journal of Computer Science and Security, vol. 2 (3). Pp. 18-29. 2008.
Ponsam, J. Godwin, and Dr R. Srinivasan. "A survey on MANET security challenges, attacks and its countermeasures." International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) 3.1 (2014).
Yih-Chun, Hu, and Adrian Perrig. "A survey of secure wireless ad hoc routing." IEEE Security & Privacy 2.3 (2004): 28-39.
Nguyen, Hoang Lan, and Uyen Trang Nguyen. "A study of different types of attacks on multicast in mobile ad hoc networks." Ad Hoc Networks 6.1 (2008): 32-46.
Wu, Bing, Jianmin Chen, Jie Wu, and Mihaela Cardei. "A survey of attacks and countermeasures in mobile ad hoc networks." Wireless network security (2007): 103-135.
Bala, Kanchan. "A Survey of Black Hole Detection Policies in Mobile Ad Hoc Networks." International Journal of Future Generation Communication and Networking 9.12 (2016): 295-304.
Praveen, K. S., H. L. Gururaj, and B. Ramesh. "Comparative Analysis of Black Hole Attack in adhoc Network Using AODV and OLSR Protocols." Procedia Computer Science 85 (2016): 325.
Khanna, Nitin. "Avoidance and Mitigation of All Packet Drop Attacks in manetsusing Enhanced AODV with Cryptography." International Journal of Computer Network and Information Security (IJCNIS) 8.4 (2016): 37.
Shahabi, Sina, Mahdieh Ghazvini, and Mehdi Bakhtiarian. "A modified algorithm to improve security and performance of AODV protocol against black hole attack." Wireless Networks 22.5 (2016): 1505-1511.
Ghugar, Umashankar, Jayaram Pradhan, and Monalisa Biswal. "A Novel Intrusion Detection System for Detecting Black Hole Attacks in Wireless Sensor Network using AODV Protocol." IJCSN-International Journal of Computer Science and Network 5.4 (2016).
Mjahidi, Mohamedi M. "A Survey on Security Solutions of AODV Routing Protocol against blackhole Attack in MANET." International Journal of Computer Applications 113.15 (2015).
Kumar, Sushil, Deepak Singh Rana, and Sushil Chandra Dimri. "Analysis and Implementation of AODV Routing Protocol against Black Hole Attack in MANET." International Journal of Computer Applications 124.1 (2015).
Kumar, Vimal, and Rakesh Kumar. "An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network." Procedia Computer Science 48 (2015): 472-479.
Jayachandra, S. H., et al. "Analysis of Black Hole Attack in Ad Hoc Network Using AODV and AOMDV Protocols." Emerging Research in Computing, Information, Communication and Applications. Springer India, 2016. 99-108.
Alem, Yibeltal Fantahun, and Zhao Cheng Xuan. "Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection." Future Computer and Communication (ICFCC), 2010 2nd International Conference on. Vol. 3. IEEE, 2010.
Patel, Ankit D., and Kartik Chawda. "Dual security against grayhole attack in manets." Intelligent computing, communication and devices. Springer India, 2015. 33-37.
Chhabra, Meghna, and B. B. Gupta. "An efficient scheme to prevent ddos flooding attacks in mobile ad-hoc network (MANET)." Research Journal of Applied Sciences, Engineering and Technology 7.10 (2014): 2033-2039.
Chhabra, Meghna, Brij Gupta, and Ammar Almomani. "A novel solution to handle DDOS attack in MANET." Journal of Information Security 4.03 (2013): 165.
Gupta, Anurag, et al. "Improved AODV Performance in DOS and Black Hole Attack Environment." Computational Intelligence in Data Mining-Volume 2. Springer India, 2015. 541-549.
Patel, Bipin N., and Tushar S. Patel. "A Survey on Detecting Wormhole Attack in Manet." Journal of Engineering Research and Applications 4.3 (2014): 653-656.
Shastri, Ashka, and Jignesh Joshi. "A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention." Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. ACM, 2016.
Sharma, Dhruvi, Vimal Kumar, and Rakesh Kumar. "Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET." Computational Intelligence in Data Mining— Volume 2. Springer India, 2016. 475-485.
Shastri, Ashka, and Jignesh Joshi. "A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention." Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. ACM, 2016.
Kar, Sumit, Srinivas Sethi, and Manmath Kumar Bhuyan. "Security challenges in cognitive radio network and defending against Byzantine attack: a survey." International Journal of Communication Networks and Distributed Systems 17.2 (2016): 120-146.
Agrawal, Neha, Krishna Kumar Joshi, and Neelam Joshi. "Performance Evaluation of Byzantine Rushing Attack in ADHOC Network." International Journal of Computer Applications 123.6 (2015).
Patel, Neelam Janak Kumar, and Khushboo Tripathi. "Trust Value based Algorithm to Identify and Defense Gray-Hole and Black-Hole attack present in MANET using Clustering Method." (2018).
Tseng, Fan-Hsun, Hua-Pei Chiang, and Han-Chieh Chao. "Black Hole along with Other Attacks in manets: A Survey." Journal of Information Processing Systems 14.1 (2018).
Nayak, Divyashree, and Y. C. Kiran. "Malicious Node Detection by Identification of Gray and Black Hole Attacks using Control Packets in manets." Imperial Journal of Interdisciplinary Research 3.7 (2017).
Yadav, Sakshi, et al. "Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme." Electrical, Computer and Electronics (UPCON), 2017 4th IEEE Uttar Pradesh Section International Conference on. IEEE, 2017.
Khan, Shariq Mahmood, Rajagopal Nilavalan, and Abdulhafid F. Sallama. "A Novel Approach for Reliable Route Discovery in Mobile Ad-Hoc Network." Wireless Personal Communications 83.2 (2015): 1519-1529.
Gupta, Brij, Dharma P. Agrawal, and Shingo Yamaguchi, eds. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, 2016.
Yadav, Anita, Yatindra Nath Singh, and R. R. Singh. "Improving routing performance in AODV with link prediction in mobile Adhoc Networks." Wireless Personal Communications 83.1 (2015): 603-618.
Mathew, Melvin, G. Shine Let, and G. Josemin Bala. "Modified AODV routing protocol for multi- hop cognitive radio ad hoc networks." Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Springer India, 2015. 89-97.
Rathee, Geetanjali, and Hemraj Saini. "Secure Modified Ad Hoc On-Demand Distance Vector (MAODV) Routing Protocol." International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 8.1 (2017): 1-18.
Yang, Hua, and Zhiyong Liu. "A Genetic-Algorithm-Based Optimized AODV Routing Protocol." International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystems. Springer, Singapore, 2016.
Karthikeyan, B., S. Hari Ganesh, and Mrs N. Kanimozhi. "Security Improved Ad-Hoc on Demand Distance Vector Routing Protocol (sim AODV)." International Journal on Information Sciences and Computing 10.2 (2016).
Kaur, Pawanjeet, and Malkit Singh. "COMPARISION BETWEEN AODV AND MODIFIED AODV IN MANET." Global Journal of Computers & Technology 5.1 (2016): 239-240.
Yang, Licai, and Haiqing Liu. "A Data Transmitting Scheme Based on Improved AODV and RSU- Assisted Forwarding for Large-Scale VANET." Wireless Personal Communications 91.3 (2016): 1489-1505.
Choudhury, Debarati Roy, Leena Ragha, and Nilesh Marathe. "Implementing and improving the performance of AODV by receive reply method and securing it from Black hole attack." Procedia Computer Science 45 (2015): 564-570.
Cho, Jin-Hee, Ananthram Swami, and Ray Chen. "A survey on trust management for mobile ad hoc networks." IEEE Communications Surveys & Tutorials 13.4 (2011): 562-583.
Vijayan, R., and N. Jeyanthi. "A survey of trust management in mobile ad hoc networks." International Journal of Applied Engineering Research 11.4 (2016): 2833-2838.
Govindan, Kannan, and Prasant Mohapatra. "Trust computations and trust dynamics in mobile adhoc networks: A survey." IEEE Communications Surveys & Tutorials 14.2 (2012): 279-298.
Yan, Zheng, Peng Zhang, and Athanasios V. Vasilakos. "A survey on trust management for Internet of Things." Journal of network and computer applications 42 (2014): 120-134.
Subramaniam, Sridhar, and Baskaran Ramachandran. "Energy-and Trust-Based AODV for Quality- of-Service Affirmation in manets." Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Springer India, 2015. 601-607.
Babu, Nelson Kennedy. "Establishing Security in Manets Using Friend-Based Ad Hoc Routing Algorithms." Journal of Computer Science Engineering and Software Testing 4.1 (2018).
Janani, V. S., and M. S. K. Manikandan. "Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks." EURASIP Journal on Wireless Communications and Networking 2018.1 (2018): 25.
Ahmed, Adnan, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, and Abdul Waheed Khan. "A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks." Frontiers of Computer Science 9, no. 2 (2015): 280-296.
Cho, Jin-Hee, Ananthram Swami, and Ray Chen. "A survey on trust management for mobile ad hoc networks." IEEE Communications Surveys & Tutorials 13.4 (2011): 562-583.
A. A. Pirzada and C. Mcdonald, “Trust Establishment In Pure Ad-hoc Networks,” Wireless Personal Communications, Springer, pp. 139–163, 2006.
Fall, K., and K. Varadhan. "The ns manual. Notes and documentation on the software NS2-simulator, 2002." URL: www. Isi. Edu/nsnam/ns.
T. Ghosh, N. Pissinou, and K. Makki, “Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad Hoc Networks,” in Proc. 29th Annual IEEE International Conference on Local Computer Networks, pp. 224-231, 2004.
T. Ghosh, N. Pissinou, and K. Makki, “Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks,” Mobile Networks and Applications, Springer Science, vol. 10, pp. 985-995, 2005.
A. A. Pirzada, A. Datta, C. Mcdonald, “Trust-based routing for ad-hoc wireless networks,” IEEE, pp. 326-30, 2004.
X. Li, M. R. Lyu, and J. Liu, “A Trust Model Based Routing Protocol for Secure Ad Hoc Networks,” in Proc. Aerospace Conference, IEEE, vol. 2, pp. 1286-1295, 2004.
Eissa, Tameem, Shukor Abdul Razak, Rashid Hafeez Khokhar, and Normalia Samian. "Trust-based routing mechanism in MANET: Design and implementation." Mobile Networks and Applications 18, no. 5 (2013): 666-677.
Published
Issue
Section
Copyright (c) 2021 Journal of Engineering Design and Analysis
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
“_______________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
Important
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.