580 research outputs found

    Disruption of Black Hole attacks in MANET

    Full text link
    An Ad hoc network in a wireless system consist of an autonomous system, without centralization which results forming of mobile nodes. In MANET, each node works in a dual form that consists of a router as well as hosts. These nodes configure dynamically and communicate using hop to hop. Due to its simplicity it is used in mobile conferencing, military communication. In MANET nodes can join and leave the network so MANET becomes vulnerable. Certain factors like dynamic network configures, distribution cooperation, open medium terrorized in routing which give rise to security issues. Once such protocol AODV has been a victim of security. In existing, MANET faces a severe problem known as the Black Hole problem. This Black hole problem is mostly found in reactive routing protocol called AODV.The black hole conducts its Malicious node during route discovery process. Black hole node is a severe threat in AODV protocol that easily employed and becomes vulnerable in MANET. In this paper various techniques are discussed to overcome the Black hole attack

    IMPACT ANALYSIS OF BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS PERFORMANCE

    Get PDF
    A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases

    A Hierarchical Secure Routing Protocol Against Black Hole Attacks in Sensor Networks

    Get PDF
    A black hole attack is a severe attack that can be easily employed against routing in sensor networks. In a black hole attack, a malicious node spuriously announces a short route to the sink node (the destination) to attract additional traffic to the malicious node and then drops them. In this paper, we propose a hierarchical secure routing protocol for detecting and defending against black hole attacks. The proposed protocol uses only symmetric key cryptography to discover a safe route against black hole attacks. The comparison of the proposed protocol with two other existing approaches proves that the proposed scheme is faster in detecting black hole attacks with much lower message overhead

    Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles

    Get PDF
    Detection of Black Hole attacks is one of the most challenging and critical routing security issues in vehicular ad hoc networks (VANETs) and autonomous and connected vehicles (ACVs). Malicious vehicles or nodes may exist in the cyber-physical path on which the data and control packets have to be routed converting a secure and reliable route into a compromised one. However, instead of passing packets to a neighbouring node, malicious nodes bypass them and drop any data packets that could contain emergency alarms. We introduce an intelligent black hole attack detection scheme (IDBA) tailored to ACV. We consider four key parameters in the design of the scheme, namely, Hop Count, Destination Sequence Number, Packet Delivery Ratio (PDR), and End-to-End delay (E2E). We tested the performance of our IDBA against AODV with Black Hole (BAODV), Intrusion Detection System (IdsAODV), and EAODV algorithms. Extensive simulation results show that our IDBA outperforms existing approaches in terms of PDR, E2E, Routing Overhead, Packet Loss Rate, and Throughput

    Analysis of Black Hole Attack in MANET Based on Simulation through NS3.26

    Get PDF
    This research paper presentsanalysis of Black hole attacks in Mobile Adhoc network (MANET) routing protocol Ad Hoc On-Demand Distance Vector (AODV). Weuse 25 nodes in wireless sensor network with no attack, one attack, three attacks and five numbers of attacks nodes treated with reactive routing protocol AODV. A Simulations have been conducted in ns-3.26, which is the latest version of ns3 network simulator on Ubuntu 16.04.2 LTS version platform. The performance resultsare analyzed based on Throughput, Packet loss and Delay time with same simulation time for different numbers of malicious nodes in black hole attacks on MANET?s

    A parallel prevention algorithm for black hole attacks in MANET

    Get PDF
    In this paper, we propose a parallel algorithm for MANETs that optimizes both routing discovery and security in an Ad Hoc On Demand Distance Vector (AODV). The new algorithm, termed as Parallel Grid Optimization by the Daddy Long-Legs Algorithm (PGO-DLLA), simulates the behavior of the biological spiders known as daddy long-legs spiders.Experiments were conducted on an NS2 simulator to demonstrate the efficiency and robustness of the proposed algorithm.The results indicate better performance than the AntNet algorithm with respect to all metrics that used in experiments such as packet delivery ratio (PDR), end-to-end delay (EtoE) and Packet loss (PL) except throughput, for which AntNet is the better algorithm.In addition, the results show that PGO-DLLA outperforms the standard AODV algorithm in simulations of both a peaceful environment and a hostile environment represented by a black hole attacks

    Modified IDS-AODV for Prevention of Black Hole Attacks in MANIT

    Get PDF
    Mobile ad hoc network is a self-configuring and decentralizing network which is proficient to structure network dynamically. Due to its dynamic behavior and lack of central authority security becomes the challenging task for this network. In this most of the nodes can get compromised from various types of threats such as worm hole, black hole and denial of service. Black hole attack is a serious threat which inject false route over the network by broadcasting itself as a shortest route. In this work, we use the light-weight versions of symmetric encryption protocols PRESENT and HIGHT because the goal is to provide better security by minimizing the number of computations used for encryption so as to reduce the energy consumption. The simulation of our proposed mechanism is performed in NS-2.34 network simulator and the analysis of proposed mechanism is done using performance measuring metrics like PDR, Throughput, Routing load and End-to End delay. The experimental results of our work outperforms than the other ones. Keywords: Ad hoc network, Black hole, PDR, Cipher, Network Simulato

    A Black Hole Attack Model for Reactive Ad-Hoc Protocols

    Get PDF
    Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR

    Performance Analysis of Routing Protocols in MANET under Malicious Attacks

    Get PDF
    MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, gray-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyze and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy
    • …
    corecore