DETECTION AND VERIFICATION OF MALICIOUS NODE IN BLACK HOLE ATTACK USING DSA

Main Article Content

Sana Zeba
Shish Ahmad

Abstract

Mobile Adhoc Networks are temporary networks which are built for performing any operations. In another word, MANET is taken to be the collection of mobile nodes. Mobile Ad hoc Network (MANET) is concerned as a self-configuring infrastructure less network. Mobile Adhoc network is a set of wireless mobile nodes and it is formed dynamically as the temporary network. In MANET Network, Black hole attack is one of the security threat in which the traffic is redirected to such a node that really does not exist in the network. In this paper, a native approach has been used to detect the intruder node using a threshold value.  After analyzing the malicious node, verifying it authenticity with the help of DSA (Digital Signature Algorithm).

 

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

Vishnu Sharma and Akansha Vij “Security Issues in Mobile Adhoc Network: A Survey Paper †International

Conference on Computing, Communication and Automation (ICCCA2016) IEEE page 561-page 566

S.V. VASANTHA and DR. A. DAMODARAM “Bulwark AODV against Black hole and Gray hole attacks in MANET â€, 2015 IEEE International Conference on Computational Intelligence and Computing Research

Nirbhay Chaubey “Effect of Pause Time on AODV and TSDRP Routing Protocol under Black Hole Attack and DOS Attacks in MANET â€,2015 2nd InternationalConference on Computing for SustainableGlobal Development(INDIACom) IEEE page 1807-page 1812

David Airehrour, Jairo Gutierrez “GradeTrust: A Secure Trust Based Routing Protocol ForMANETsâ€, 2015 International Telecommunication Networks and Applications Conference (ITNAC) IEEE page 65-page 70.

Sandeep Kumar Arora and Mubashir Yaqoob Mantoo “Performance Measurement in MANET †, 2014 5th InternationalConference- Confluence The Next Generation Information Technology Summit (Confluence) IEEE page 406-page 410

K.Das and A. Taggu “A Comprehensive Analysis of DoS Attacks in Mobile Adhoc Networks â€,2014 InternationalConference on Advancesin Computing,Communicationsand Informatics (ICACCI)page 2273-page 2278

Anishi Gupta “Black Hole Attack Mitigation Method based on Route Discovery Mechanism in AODV Protocol â€, 2013 IEEE International Conference on Computational Intelligence and Computing Research

Ehsan, H., & Khan, F. A. (2012, June). Malicious AODV: implementation and analysis of routing attacks in MANETs. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 1181-1187). IEEE.

Ashok M.Kanthe, Dina Simunic and Ramjee Prasad “Effects of Malicious Attacks in Mobile Ad–hoc Networks†2012 IEEE International Conference on Computational Intelligence and Computing Research.

Zaid Ahmad and J.A. Manan†Performance Evaluation on Modified AODV Protocols â€,2012 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE 2012), December 11 - 13, 2012, Melaka, Malaysia page 158-page 163

Rutvij H. Jhaveri and S.J.Patel “DoS Attacks in Mobile Ad-hoc Networks: A Survey â€,2012 Second International Conference on Advanced Computing & Communication Technologies IEEE page 535-page 541

Mehdi Medadian and M.H. Yektaie†Combat with Black Hole Attack in AODV routing protocol in MANET â€,2009 IEEE.

Marjan Kuchaki Rafsanjani “Identifying Monitoring Nodes in MANET by Detecting Unauthorized and Malicious Nodes â€,2008 IEEE.

Frank Kargl, Stefan Schlott, Michael Weber “Identiï¬cation in Ad hoc Networks â€,Proceedings of the 39th Hawaii International Conference on System Sciences – 2006 IEEE page 1-page 9

Dr. Shish Ahmad “Detection and Prevention of Black Hole Attack and Gray Hole Attack in MANET, A Critical Survey published in International Conference on Advanced Computer Engg and Information Technology (ACEIT-16) held on 12 March 2016

Anjana Tiwari and Inderjeet Kaur “Performance Evaluation of Energy Efficient For MANET Using AODV Routing Protocol â€, 3rd IEEE International Conference on "Computational Intelligence and Communication Technology" (IEEE-CICT 2017)page 1-5