Full Paper View Go Back

On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks

Umesh Kumar Singh1 , Jalaj Patidar2 , Kailash Chandra Phuleriya3

Section:Research Paper, Product Type: Isroset-Journal
Vol.3 , Issue.1 , pp.11-15, Jan-2015


Online published on Feb 28, 2015


Copyright © Umesh Kumar Singh, Jalaj Patidar , Kailash Chandra Phuleriya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Umesh Kumar Singh, Jalaj Patidar , Kailash Chandra Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks,” International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.

MLA Style Citation: Umesh Kumar Singh, Jalaj Patidar , Kailash Chandra Phuleriya "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks." International Journal of Scientific Research in Computer Science and Engineering 3.1 (2015): 11-15.

APA Style Citation: Umesh Kumar Singh, Jalaj Patidar , Kailash Chandra Phuleriya, (2015). On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks. International Journal of Scientific Research in Computer Science and Engineering, 3(1), 11-15.

BibTex Style Citation:
@article{Singh_2015,
author = {Umesh Kumar Singh, Jalaj Patidar , Kailash Chandra Phuleriya},
title = {On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {11-15},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=166},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=166
TI - On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Umesh Kumar Singh, Jalaj Patidar , Kailash Chandra Phuleriya
PY - 2015
DA - 2015/02/28
PB - IJCSE, Indore, INDIA
SP - 11-15
IS - 1
VL - 3
SN - 2347-2693
ER -

2573 Views    2357 Downloads    2292 Downloads
  
  

Abstract :
Wireless or Mobile ad hoc Networks (MANETs) emerged to replace the wired networks. MANETs are extensively used in military and civilian applications. The wireless and dynamic nature of MANETs makes them more vulnerable to security attacks when compared with fixed networks. The existing routing protocols are optimized to perform the routing process without considering the security problems. In this paper, we have examined the effect of black holes attacks on the networks. We have also presented a protocol to identify multiple black holes collaborating with each other and a solution to determine a safe route to protect our network on cooperative black hole attack, while showing the future aspects.

Key-Words / Index Term :
MANETs, Black Hole, Routing, SAODV, DSR

References :
[1]. Umesh Kumar Singh, Kailash Phuleriya, Shailja Sharma, D.N. Goswami, A Comparative study of Collaborative Attacks on Mobile Ad-Hoc Networks, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 8, pp.183-187, August 2014.
[2]. Umesh Kumar Singh, Lokesh Laddhani and Kailash Chandra Phuleriya, An Analysis of MANET Routing Protocols with Effective Resource Management, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 6, pp. 724-729, June 2014.
[3]. Umesh Kumar Singh, Kailash Chandra Phuleriya, Shailja Sharma, and D.N. Goswami, On Protocols to Prevent Black Hole Attacks in Mobile Ad Hoc Networks, International Journal of Electronics Communication and Computer Engineering Volume 6, Issue 1, pp. 55-60, year 2015.
[4]. Pooja Jaiswal and Dr. Rakesh Kumar, Prevention of Black Hole Attack in MANET, IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.2, No5, pp. 599-606, October 2012.
[5]. Hongmei Deng, Wei Li, and Dharma P. Agarwal, “Routing Security in Wireless Ad Hoc Networks”, University of Cincinnati, IEEE Communications magazine,Vol.40, no.10, October 2002.
[6]. S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks. In mobile Computing and Networking (MOBICOM), pages 255–265, 2000.
[7]. P. Michiardi and R. Molva. Preventing denial of service and selfishness in adhoc networks. In Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland, June 2002.
[8]. Deng H., Li W. and Agrawal, D. P., "Routing security in wireless ad hoc networks," Communications Magazine, IEEE, vol.40, no.10, pp. 70- 75, October 2002.
[9]. Payal N. Raj1 and Prashant B. Swadas2, “DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009.
[10]. Charles E. Perkins, and Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector (AODV) routing,” Internet Draft, November 2002.
[11]. C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Computer Communications Review, pp. 234-244, October 1994.
[12]. D.Johnson, Y. Hu, and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4", RFC 4728, 2007.
[13]. Perkins C.E., Elizabeth M., Royer & Samir R., “Ad hoc On- Demand Distance Vector Routing, IEFT MANET Draft, Charles E. Perkins, Ad Hoc Networking, ISBN 0-201-30976-9, 2003.
[14]. Raja L., & Santhosh B., “Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA) in MANET”, International Journal of Engineering and Computer Science, Volume 2 Issue 3, PP. 707-718, 2013.
[15]. Bing Wu, Jianmin Chen, Jie Wu & Mihaela Cardei, A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, WIRELESS/MOBILE NETWORK SECURITY Y. Xiao, X. Shen, and D.-Z. Du (Eds.), Springer, pp. 1-38, 2006.
[16]. Nagpal C., Kumar C., Bhushan B. & Gupta S., A Study of Black Hole Attack on MANET Performance, I. J. Modern Education and Computer Science, pp. 47-53, 2012.
[17]. Manickam P. ,Baskar T &.Manimegalai D., “Performance Comparisons Of Routing Protocols In Mobile Ad Hoc Networks”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 1, pp. 98-106, 2011.
[18]. Johnson D. B., Maltz D. & Broch J., “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad hoc Network”, C.E. Perkins, Ed., Addison-Wesley, pp.139-172, 2001.
[19]. Prateek K., Arvind N.& Alaria S., “MANET-Evaluation of DSDV, AODV andDSR Routing Protocol”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2 Issue 1, pp.-99-104, 2013.
[20]. The network simulator. (http://www.isi.edu/nsnam/ns/).
[21].Umesh Kumar Singh, Kailash Chandra Phuleriya and Rakhi Sunhare, Wireless Sensor Networks: Comparative Study and Analysis of MAC Protocols, International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC), Vol. 4, Issue 2, pp. 107-114, Apr 2014.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation