COMPARATIVE STUDY ON TRUST-BASED MODEL AND BLACK HOLE DETECTION AND ELIMINATION IN MANETS
- Details
- Hits: 2497
Volume 2 (2), December 2019, Pages 113-121
Priya Paul1, Satyabrata Das1, Bata Krishna Tripathy2, Swagat Kumar Jena2
1 Veer Surendra Sai University of Technology, Sambalpur, Burla, Odisha, India, This email address is being protected from spambots. You need JavaScript enabled to view it.
2 Indian Institute of Technology Bhubaneswar, Odisha, India, This email address is being protected from spambots. You need JavaScript enabled to view it., This email address is being protected from spambots. You need JavaScript enabled to view it.
Abstract
A mobile ad hoc network (MANET) is a framework-less network consisting of several mobile nodes with wireless network interfaces. Due to node mobility in MANET, the stability of the network is affected by which the trust value of a node makes it reliable for packet transmission. The evaluation of the trust value of a node depends on three parameters, such as rank, remaining battery power, and stability factor of a node. In this paper, various trust-based models and their advantages and disadvantages have been studied. Various attacks affect the MANET from which the black hole attack is one of the security attacks. The black hole attack can be a single black hole attack or can be a cooperative black hole attack. The two properties of a black hole attack are the malicious node impersonates other nodes of having a valid route to the destination even the route is spurious and, second is the attacker consumes the packets without forwarding them. In order to combat this issue, various solutions have been studied.
Keywords:
Trust, stability, fidelity level, Blackhole attack.
DOI: https://doi.org/10.32010/26166127.2019.2.2.113.121
Reference
Al-Shurman, M., Yoo, S. M., & Park, S. (2004, April). Black hole attack in mobile ad hoc networks. In Proceedings of the 42nd annual Southeast regional conference (pp. 96-97). ACM.
Anita, E. M., & Vasudevan, V. (2010). Black hole attack prevention in multicast routing protocols for mobile ad hoc networks using certificate chaining. International Journal of Computer Applications, 1(12), 21-2.
Bar, R. K., Mandal, J. K., & Singh, M. M. (2013). QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack. Procedia Technology, 10, 530-537.
Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012, September). Detection and removal of co-operative blackhole and grayhole attacks in MANETs. In 2012 International Conference on System Engineering and Technology (ICSET) (pp. 1-5). IEEE.
Biswas, S., Nag, T., & Neogy, S. (2014, February). Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In 2014 Applications and Innovations in Mobile Computing (AIMoC) (pp. 157-164). IEEE.
Capra, L. (2004, May). Towards a human trust model for mobile ad-hoc networks.
Cho, J. H., Swami, A., & Chen, R. (2010). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562-583.
Gerhards-Padilla, E., Aschenbruck, N., Martini, P., Jahnke, M., & Tolle, J. (2007, October). Detecting black hole attacks in tactical MANETs using topology graphs. In 32nd IEEE Conference on Local Computer Networks (LCN 2007) (pp. 1043-1052). IEEE.
Himral, L., Vig, V., & Chand, N. (2011). Preventing aodv routing protocol from black hole attack. International Journal of Engineering Science and Technology (IJEST), 3(5), 3927-3932.
Jawandhiya, P. M., Ghonge, M. M., Ali, M. S., & Deshpande, J. S. (2010). A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology, 2(9), 4063-4071.
Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y. (2007). Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. IJ Network Security, 5(3), 338-346.
Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(2), 45-53.
Li, X., Lyu, M. R., & Liu, J. (2004, March). A trust model based routing protocol for secure ad hoc networks. In 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No. 04TH8720) (Vol. 2, pp. 1286-1295). IEEE.
Lu, S., Li, L., Lam, K. Y., & Jia, L. (2009, December). SAODV: a MANET routing protocol that can withstand black hole attack. In 2009 international conference on computational intelligence and security (Vol. 2, pp. 421-425). IEEE.
Min, Z., & Jiliu, Z. (2009, May). Cooperative black hole attack prevention for mobile ad hoc networks. In 2009 International Symposium on Information Engineering and Electronic Commerce (pp. 26-30). IEEE.
Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2016). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Networks, 22(5), 1505-1511.
Siddiqua, A., Sridevi, K., & Mohammed, A. A. K. (2015, January). Preventing black hole attacks in MANETs using secure knowledge algorithm. In 2015 International Conference on Signal Processing and Communication Engineering Systems (pp. 421-425). IEEE.
Sun, B., Guan, Y., Chen, J., & Pooch, U. W. (2003). Detecting black-hole attack in mobile ad hoc networks.
Tamilselvan, L., & Sankaranarayanan, V. (2008). Prevention of co-operative black hole attack in MANET. JNW, 3(5), 13-20.