Abstract

The Network Layer in wireless mesh networks is responsible for routing packets making it a prime target for intruders and hackers. Black-hole attack is a type of denial-of-service attack which when carried out can disrupt the services of this layer. This paper takes a look at some important detection and mitigation techniques and presents the drawbacks. After analysis of current mechanisms, the paper proposes RID-AODV, a security solution for multiple black-hole attack in wireless mesh networks. Based on the backbone of AODV, RID-AODV combines the ability of route skipping of IDSAODV and route failure correction using reverse route establishment of RAODV. The enhanced protocol RID-AODV, AODV, IDSAODV, and RAODV are implemented in a simulated environment using ns-2.35 simulator. The networks for each protocol are bombarded with up to ten black-hole nodes starting from zero. The results obtained are then analyzed and compared and a discussion is presented.

Highlights

  • IntroductionWhen developing a secure network, whether it is wired or wireless, the following five main attributes are considered authentication, confidentiality, integrity, access, and non-repudiation [1]

  • Network security is a very important requirement in emerging networks

  • The average packet delivery ratio (APDR) of a 20 node network for the following scenarios: Normal operation and black-hole attack with increasing number of malicious nodes are shown in the Figure 3

Read more

Summary

Introduction

When developing a secure network, whether it is wired or wireless, the following five main attributes are considered authentication, confidentiality, integrity, access, and non-repudiation [1]. None of these properties have ever been ensured. The main four constraints are limited central processing unit (CPU) power, limited battery life, and limited bandwidth among nodes and node mobility which produces latency in convergence of the network These constraints present the following security issues: signal jamming, denial-of-service, battery exhaustion, authenticity, integrity, and confidentiality [4]. We know that black-hole attack is a WSN

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call