Abstract
Mobile Ad hoc Network (MANET) is a type of wireless networks that provides numerous applications in different areas. Security of MANET had become one of the hottest topics in networks fields. MANET is vulnerable to different types of attacks that affect its functionality and connectivity. The black‐hole attack is considered one of the most widespread active attacks that degrade the performance and reliability of the network as a result of dropping all incoming packets by the malicious node. Black‐hole node aims to fool every node in the network that wants to communicate with another node by pretending that it always has the best path to the destination node. AODV is a reactive routing protocol that has no techniques to detect and neutralize the black‐hole node in the network. In this research, we enhanced AODV by integrating a new lightweight technique that uses timers and baiting in order to detect and isolate single and cooperative black‐hole attacks. During the dynamic topology changing the suggested technique enables the MANET nodes to detect and isolate the black‐hole nodes in the network. The implementation of the proposed technique is performed by using NS‐2.35 simulation tools. The results of the suggested technique in terms of Throughput, End‐to‐End Delay, and Packet Delivery Ratio are very close to the native AODV without black holes.
Highlights
Wireless communication network could be controlled by a central infrastructure that controls communication between nodes in the network, or it could be an infrastructure-less which is called Ad hoc Networks
Mobile Ad hoc Network (MANET) energy is one of the most important connectivity factors, as each node in the network has a limited amount of energy; we should work with an efficient mechanisms and protocols that avoid any unnecessary energy consumption
Denial of Service (DoS) attack is considered one of the most serious threats to MANET, in which a malicious attacker node drains the battery of other nodes by requesting them to forward a huge amount of data
Summary
Wireless communication network could be controlled by a central infrastructure that controls communication between nodes in the network, or it could be an infrastructure-less which is called Ad hoc Networks. A malicious attacker node may alter the connection link or drop the forwarded data. The attacker nodes work to affect the MANET operation, by Wireless Communications and Mobile Computing dropping the forwarded data, altering the connection links, or draining the nodes batteries. It is an active attack type where the attacker node claims that it has the shortest route to any desired node in the network even if it does not have any route to it; all the packets will pass through it and this enables the black-hole node to forward or discard packets during the data transmission. When black-hole node receives this request it immediately sends a reply to the broadcaster claiming that it has the freshest and the shortest path to the destination node. In a single black-hole attack, only one attacker node is active while in a cooperative black-hole attack, there is a group of attacker nodes that work together [4] in order to degrade the network reliability
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.