DETECTION AND VERIFICATION OF MALICIOUS NODE IN BLACK HOLE ATTACK USING DSA
Main Article Content
Abstract
Mobile Adhoc Networks are temporary networks which are built for performing any operations. In another word, MANET is taken to be the collection of mobile nodes. Mobile Ad hoc Network (MANET) is concerned as a self-configuring infrastructure less network. Mobile Adhoc network is a set of wireless mobile nodes and it is formed dynamically as the temporary network. In MANET Network, Black hole attack is one of the security threat in which the traffic is redirected to such a node that really does not exist in the network. In this paper, a native approach has been used to detect the intruder node using a threshold value.  After analyzing the malicious node, verifying it authenticity with the help of DSA (Digital Signature Algorithm).
Â
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Vishnu Sharma and Akansha Vij “Security Issues in Mobile Adhoc Network: A Survey Paper †International
Conference on Computing, Communication and Automation (ICCCA2016) IEEE page 561-page 566
S.V. VASANTHA and DR. A. DAMODARAM “Bulwark AODV against Black hole and Gray hole attacks in MANET â€, 2015 IEEE International Conference on Computational Intelligence and Computing Research
Nirbhay Chaubey “Effect of Pause Time on AODV and TSDRP Routing Protocol under Black Hole Attack and DOS Attacks in MANET â€,2015 2nd InternationalConference on Computing for SustainableGlobal Development(INDIACom) IEEE page 1807-page 1812
David Airehrour, Jairo Gutierrez “GradeTrust: A Secure Trust Based Routing Protocol ForMANETsâ€, 2015 International Telecommunication Networks and Applications Conference (ITNAC) IEEE page 65-page 70.
Sandeep Kumar Arora and Mubashir Yaqoob Mantoo “Performance Measurement in MANET †, 2014 5th InternationalConference- Confluence The Next Generation Information Technology Summit (Confluence) IEEE page 406-page 410
K.Das and A. Taggu “A Comprehensive Analysis of DoS Attacks in Mobile Adhoc Networks â€,2014 InternationalConference on Advancesin Computing,Communicationsand Informatics (ICACCI)page 2273-page 2278
Anishi Gupta “Black Hole Attack Mitigation Method based on Route Discovery Mechanism in AODV Protocol â€, 2013 IEEE International Conference on Computational Intelligence and Computing Research
Ehsan, H., & Khan, F. A. (2012, June). Malicious AODV: implementation and analysis of routing attacks in MANETs. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 1181-1187). IEEE.
Ashok M.Kanthe, Dina Simunic and Ramjee Prasad “Effects of Malicious Attacks in Mobile Ad–hoc Networks†2012 IEEE International Conference on Computational Intelligence and Computing Research.
Zaid Ahmad and J.A. Manan†Performance Evaluation on Modified AODV Protocols â€,2012 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE 2012), December 11 - 13, 2012, Melaka, Malaysia page 158-page 163
Rutvij H. Jhaveri and S.J.Patel “DoS Attacks in Mobile Ad-hoc Networks: A Survey â€,2012 Second International Conference on Advanced Computing & Communication Technologies IEEE page 535-page 541
Mehdi Medadian and M.H. Yektaie†Combat with Black Hole Attack in AODV routing protocol in MANET â€,2009 IEEE.
Marjan Kuchaki Rafsanjani “Identifying Monitoring Nodes in MANET by Detecting Unauthorized and Malicious Nodes â€,2008 IEEE.
Frank Kargl, Stefan Schlott, Michael Weber “Identiï¬cation in Ad hoc Networks â€,Proceedings of the 39th Hawaii International Conference on System Sciences – 2006 IEEE page 1-page 9
Dr. Shish Ahmad “Detection and Prevention of Black Hole Attack and Gray Hole Attack in MANET, A Critical Survey published in International Conference on Advanced Computer Engg and Information Technology (ACEIT-16) held on 12 March 2016
Anjana Tiwari and Inderjeet Kaur “Performance Evaluation of Energy Efficient For MANET Using AODV Routing Protocol â€, 3rd IEEE International Conference on "Computational Intelligence and Communication Technology" (IEEE-CICT 2017)page 1-5