Securing ad hoc on-demand distance vector routing protocol against the black hole DoS attack in MANETs

Rohi Tariq, Sheeraz Ahmed, Raees Shah Sani, Dr.Zeeshan Najam, Shahryar Shafique
{"title":"Securing ad hoc on-demand distance vector routing protocol against the black hole DoS attack in MANETs","authors":"Rohi Tariq, Sheeraz Ahmed, Raees Shah Sani, Dr.Zeeshan Najam, Shahryar Shafique","doi":"10.7287/peerj.preprints.27905v1","DOIUrl":null,"url":null,"abstract":"Mobile Ad hoc network is the collection of nodes without having any physical structure involved i.e. access points, routers etc. MANETs are wide-open to similar forms of threats as other wireless mobile communication systems. In Ad-hoc Network nodes performing both as end-points of the communication and routers which makes the Ad-hoc routing protocols further prone towards the security attacks. Black Hole attack is a common security issue encountered in MANET routing protocols. The Black-Hole attack is security attack in which a malicious node imposters themselves as a node with the shortest hop count to the destination node during a packet transmission. A malicious node is capable of disturbing the network with Black Hole attack pretends to have the minimum hop-count route to the destination node (DS). This node responds to all route requests (RREQ) messages in positive and thus catches all the transmission to it. The source node (SN) not knowing the malicious nature of the Black-Hole node thus transmits all the important data. The Black Hole node discards all the important data packets. In this paper a comparatively effective, efficient and easy implemented way for identifying and therefore eluding the attacks of Black-Hole in mobile Ad-hoc networks is presented. The Network Simulator (NS-2) has been used for the implementation of our proposed solution to assess its work in terms of Network Routing load, End-to-End delay and Packet delivery ratio. The results show a considerable improvement in the performance metrics.","PeriodicalId":93040,"journal":{"name":"PeerJ preprints","volume":"79 1","pages":"e27905"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"PeerJ preprints","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7287/peerj.preprints.27905v1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Mobile Ad hoc network is the collection of nodes without having any physical structure involved i.e. access points, routers etc. MANETs are wide-open to similar forms of threats as other wireless mobile communication systems. In Ad-hoc Network nodes performing both as end-points of the communication and routers which makes the Ad-hoc routing protocols further prone towards the security attacks. Black Hole attack is a common security issue encountered in MANET routing protocols. The Black-Hole attack is security attack in which a malicious node imposters themselves as a node with the shortest hop count to the destination node during a packet transmission. A malicious node is capable of disturbing the network with Black Hole attack pretends to have the minimum hop-count route to the destination node (DS). This node responds to all route requests (RREQ) messages in positive and thus catches all the transmission to it. The source node (SN) not knowing the malicious nature of the Black-Hole node thus transmits all the important data. The Black Hole node discards all the important data packets. In this paper a comparatively effective, efficient and easy implemented way for identifying and therefore eluding the attacks of Black-Hole in mobile Ad-hoc networks is presented. The Network Simulator (NS-2) has been used for the implementation of our proposed solution to assess its work in terms of Network Routing load, End-to-End delay and Packet delivery ratio. The results show a considerable improvement in the performance metrics.
保护自组织按需距离矢量路由协议免受黑洞DoS攻击
移动自组织网络是不涉及任何物理结构的节点集合,即接入点、路由器等。与其他无线移动通信系统一样,manet对类似形式的威胁是开放的。在Ad-hoc网络中,节点既是通信的终端又是路由器,这使得Ad-hoc路由协议更容易受到安全攻击。黑洞攻击是MANET路由协议中常见的安全问题。黑洞攻击(Black-Hole attack)是一种安全攻击,在报文传输过程中,恶意节点将自己伪装成到达目的节点跳数最短的节点。恶意节点通过黑洞攻击,假装拥有到达目的节点(DS)的最小跳数路由,从而干扰网络。该节点对所有的路由请求(RREQ)消息都是积极响应的,因此捕获所有发送到它的报文。源节点(SN)不知道黑洞节点的恶意性质,因此传输所有重要数据。黑洞节点将丢弃所有重要的数据包。本文提出了一种相对有效、高效和易于实现的方法来识别和避免移动自组织网络中的黑洞攻击。网络模拟器(NS-2)已被用于实现我们提出的解决方案,以评估其在网络路由负载,端到端延迟和数据包传输比率方面的工作。结果显示性能指标有了相当大的改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信