Author : Saurabh Kumar 1
Date of Publication :16th November 2017
Abstract: MANET (Mobile ad hoc network) is a self-governing network that comprises of moveable nodes that communicates with each other through wireless links. To find the route from source to destination, different routing protocols named as proactive, reactive and hybrid routing protocols are used. In the proposed work, AODV (Ad-hoc on demand) routing protocol is used. It is a packet routing protocol which is designed to use in MANET. Every node maintains a routing table that contains information about the destination node. In MANET, normally, numbers of attacks are routing protocol attacks. This research has dealt in detecting and mitigating black hole attack. The black hole attack is one of the well known security threat occurs in MANET. A black hole attack occurs due to malicious nodes that attract the data packet by addressing a false route. In the proposed work, ABC (Artificial Bee Colony) algorithm is used to optimize the route from source to destination. ANN (Artificial Neural network) is used to detect and prevent the network from black hole attack. The simulation is carried out in MATLAB simulator and the performance parameters, namely, throughput, packet delivery ratio, delay are measured..
Reference :
-
1. Tseng, F. H., Chou, L. D., & Chao, H. C, “A survey of black hole attacks in wireless mobile ad hoc networks,” Human-centric Computing and Information Sciences, vol.1, issue 1, 2011
2. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y, “Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method,” IJ Network Security, vol. 5, issue 3, pp. 338-346, 2007.
3. Keerthika, V., & Malarvizhi, N, “Mitigate black hole attack using trust with AODV in MANET,” Computing for Sustainable Global Development (INDIACom), pp. 470-474), 2016.
4. Woungang, I., Dhurandher, S. K., Koo, V., & Traore, I, “ Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks, Globecom Workshops (GC Wkshps), IEEE, pp. 1037-1041,2012.
5. Mukherjee, S., Chattopadhyay, M., & Chattopadhyay, S, “A novel encounter based trust evaluation for AODV routing in MANET,” Applications and Innovations in Mobile Computing (AIMoC), IEEE, pp. 141- 145, 2015.
6. Lupia, A., & De Rango, F, “Performance evaluation of secure AODV with trust management under an energy aware perspective,” Performance Evaluation of Computer and Telecommunication Systems, IEEE, pp. 599-606, 2014.
7. Abdelhaq, M., Serhan, S., Alsaqour, R., & Satria, A., “Security routing mechanism for black hole attack over AODV MANET routing protocol,” Australian Journal of Basic and Applied Sciences, vol. 5, issue 10, pp.1137- 1145,2011.
8. Lo, N. W., & Liu, F. L, “A secure routing protocol to prevent cooperative black hole attack in MANET,” Intelligent technologies and engineering systems, Springer, pp. 59-65, 2013.
9. Dhama, S., Sharma, S., & Saini, M, “Black hole attack detection and prevention mechanism for mobile ad-hoc networks,” Computing for Sustainable Global Development (INDIACom), IEEE, pp. 2993-2996, 2016.
10. Gupta, A. K., Sadawarti, H., & Verma, A. K, “ A review of routing protocols for mobile ad hoc networks,” SEAS Transactions on Communications, vol. 10, issue 11,pp. 331- 340,2011.
11. Cheng, H., & Cao, J, “A design framework and taxonomy for hybrid routing protocols in mobile ad hoc networks,” IEEE Communications Surveys & Tutorials, vol. 10, issue 3, 2008.
12. Karia, D. C., & Godbole, V. V, “New approach for routing in mobile ad-hoc networks based on ant colony optimisation with global positioning system,” IET networks, vol. 2, issue 3, pp.171- 180,2013.
13. Sarkar, S., & Datta, R, “Mobility-aware route selection technique for mobile ad hoc networks,” IET Wireless Sensor Systems, vol. 7, issue 3, pp55-64,2017.
14. Mohanapriya, M., & Krishnamurthi, I, “Modified DSR protocol for detection and removal of selective black hole attack in MANET,” Computers & Electrical Engineering, vol. 40, issue 2, pp. 530-538, 2014.
15. Taha, A., Alsaqour, R., Uddin, M., Abdelhaq, M., & Saba, T, “Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function,” IEEE Access, vol. 5, pp.10369-10381,2017.
16. Wahane, G., Kanthe, A. M., & Simunic, D, “Detection of cooperative black hole attack using crosschecking with truelink in MANET,” Computational Intelligence and Computing Research, IEEE International Conference ,pp. 1-6,2014.
17. Zhao, Z., Hu, H., Ahn, G. J., & Wu, R., “Riskaware mitigation for MANET routing attacks,” IEEE Transactions on dependable and secure computing, vol. 9, issue 2, pp.250- 260,2012.