INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.7, No.10, Sep. 2015

A Cross Layer for Detection and Ignoring Black Hole Attack in MANET

Full Text (PDF, 571KB), PP.42-49


Views:113   Downloads:7

Author(s)

Azza Mohammed, Boukli Hacene Sofiane, Faraoun kamel Mohamed

Index Terms

Mobile Ad hoc Networks routing;Blackhole attack;cross layer interaction

Abstract

MANET Mobile Ad hoc Network are evolved through various characteristics such as shared media, this property make a routing protocols vulnerable. AODV is a reactive routing where each intermediate node cooperates in the process of route discovery. In this case, the node that behaves as malicious exploit the malfunction of specified service. The black hole attack uses the sequence number that is used to select the freshest route and attract all exchanged data packets to destroy them. Many researchers have dealt with this attack and many solutions have been proposed. These solutions target the network layer only. In this paper, we present our approach to counter black hole attack. This approach is entitled CrossAODV and it is based on verification and validation process. The key point of our approach is the use of the inter layer interaction between networks layer and medium access within the distributed coordination function (DCF) to efficiently detect and isolate malicious nodes. During the route discovery, the verification process uses the RTS / CTS frame that contains information about the requested path. The validation process consists of comparing the routing information with the result of verification phase. Our Approach have been implemented, simulated and compared to two related studies using the well know NS2 Simulator. The obtained results show the efficacy our proposal in term of packet delivery with a neglected additional delay.

Cite This Paper

Azza Mohammed, Boukli Hacene Sofiane, Faraoun kamel Mohamed,"A Cross Layer for Detection and Ignoring Black Hole Attack in MANET", IJCNIS, vol.7, no.10, pp.42-49, 2015.DOI: 10.5815/ijcnis.2015.10.05

Reference

[1]S. K. Sarkar, T. G. Basavaraju, and C. Puttamadappa, Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications. Boston, MA, USA: Auerbach Publications, 1st ed., 2007.

[2]Aarti & Tyagi S. S., "Study of MANET: Characteristics, Challenges, Application and Security Attacks", International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 5, pp. 252-257, May 2013.

[3]D. Kaur, and N. Kumar, "Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks", I. J. Computer Network and Information Security, vol. 5, no, 3, pp. 39-46, 2013. 

[4]J. Kumar, M. Kulkarni, D. Gupta, "Effect of Black Hole Attack on MANET Routing Protocols", I. J. Computer Network and Information Security, vol. 5, no, 5, pp. 64-72, 2013.

[5]C. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," pp. 90–100, 1999.

[6]C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (aodv) routing," 2003.

[7]E. Belding-Royer and C. Perkins, "Evolution and future directions of the ad hoc on-demand distance-vector routing protocol," Ad Hoc Networks Journal, vol. 1, no. 1, pp. 125–150, 2003.

[8]Bianchi, G.; Tinnirello, I, "Remarks on IEEE 802.11 DCF performance analysis," Communications Letters, IEEE , vol.9, no.8, pp.765,767, Aug 2005

[9]A. K. Rai, R. R. Tewari and S. K. Upadhyay, "Different types of attacks on integrated manet-internet communication," International Journal of Computer Science and Security (IJCSS) Vol.4, No.3, pp. 265-372, 2010.

[10]P. Rajakumar, V.T Prasanna and A. Pitchaikkannu, "Security attacks and detection schemes in MANET," Electronics and Communication Systems (ICECS), 2014 International Conference on Electronics and Communication Systems (ICECS) , vol., no., pp.1,6, 13-14 Feb. 2014.

[11]M. Roopak, Prof.BVR Reddy, "Blackhole Attack implementation in AODV Routing Protocol" International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 402 ISSN 2229-5518. 

[12]M. KS and G. Aghila, "A survey on black hole attacks on aodv protocol in manet," International Journal of Computer Applications, vol. 34, pp. 23–30, November 2011. Published by Foundation of Computer Science, New York, USA.

[13]M. Abdelhaq, S. Serhan, R. Alsaqour, and R. Hassan, "A local intrusion detection routing security over manet network," International Conference on Electrical Engineering and Informatics (ICEEI), pp. 1–6, July 2011.

[14]A.Vani and R. Dr.D.Sreenivasa, "Removal of black hole attack in ad hoc wireless networks to provide confidentiality security service," International Journal of Engineering Science and Technology (IJEST), vol. 3, pp. 2154–2159, March 2011.

[15]H. Lalit, V. Vishal, and N. Chand, "Preventing aodv routing protocol from black hole attack," International Journal of Engineering Science and Technology (IJEST), vol. 3, pp. 3927–3932, May 2011.

[16]D. N. P. Subash Chandra Mandhata, "counter measure to black hole attack on aodv based mobile ad-hoc networks," International Journal of Computer and Communication Technology (IJCCT), vol. 2, no. 6, 2011.

[17]M. Nital, C. J. Devesh, and Z. Mukesh, "Improving aodv protocol against blackhole attacks," Proceedings of the International MultiConference of Engineers and Computer Scientists, vol. 2, march 2010.

[18]R. Yerneni and A. K. Sarje, "Enhancing performance of aodv against black hole attack," in Proceedings of the CUBE International Information Technology Conference, (New York, NY, USA), pp. 857–862, ACM, 2012.

[19]S. Harsh, Pratap and S. Sharma, "Guard against cooperative black hole attack in mobile ad-hoc network," International Journal of Engineering Science and Technology (IJEST), vol. 3, no. 7, pp. 5629–5634, 2011.

[20]P. N. Raj and P. B. Swadas, "Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet," International Journal of Computer Science Issues, vol. abs/0909.2371, 2009.

[21]C. Bettstetter, G. Resta, and P. Santi, "The node distribution of the random waypoint mobility model for wireless ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, pp. 257–269, jul 2003.

[22]S. Talapatra and A. Roy "Mobility based Cluster head selection algorithm for mobile ad-hoc Network" I.J. Computer Network and Information Security, p.p. 42-49, June 2014