Malicious Node Isolation Under Black Hole Attack in Wireless Mobile Ad Hoc Network

2019 ◽  
Author(s):  
Mahendra sharma ◽  
Mahtab Alam
2019 ◽  
Vol 8 (4) ◽  
pp. 9203-9210

A wireless mobile ad-hoc network (WMANET) is endless self-organizing, infrastructure-less collection of movable devices which are connected by using a wireless communication system. In other word’s WMANET is an autonomous, decentralized, dynamic topology, provisional network system having wireless movable devices (nodes) moving randomly without an infrastructure of the network. Furthermore, the nodes communicate with every supplementary node, through forwarding data-packets toward other nodes in the WMANET. The node finds a path to the destination node by applying routing techniques. Due to the dynamic topology of movable nodes wireless mobile network is more vulnerable to security and unprotected to attacks by the malicious node. One of the attacks is Blackhole malware Attack, a malicious-node wrongly advertises shortest to the destination node among an intention of disrupting the network communication. Because the data packets did not arrive at the destination node due to this attack data is lost. In the literature, researchers have been proposed various preventive detection techniques. These techniques used to detect and prevent the black-hole malware attacks. Furthermore, in this paper Novel Detection and Prevention mechanism (INCMAODV) has been simulated the black-hole attack in WMANET scenario. The proposed technique tried to find quality of service (QoS) parameters for instance throughput (Th), packet delivery ratio (PDR) and delay of the network and compared with the state of the art.


Author(s):  
Ms Khushbu ◽  
R. K. Bathla

Mobile ad hoc network (MANET) is a self-configuring network that is formed via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. Each mobile node can move freely in any direction, and changes their links to other devices frequently. Security is an essential part of ad hoc networks. Due to its dynamic topology, resource constraints, no centralized infrastructure and limited security, it is vulnerable to various attacks and black hole attack is one of them. In a black hole attack, a malicious node impersonates a destination node by sending a spoofed route reply packet to a source node that initiates a route discovery. By doing this, the malicious node can deprive the traffic from the source node. In order to prevent this kind of attack, it is crucial to detect the abnormality occurs during the attack. In conventional schemes, anomaly detection is achieved by defining the normal state from static training data. However, in mobile ad hoc networks where the network topology dynamically changes, such static training method could not be used efficiently.


Mobile Ad hoc network is a temporary network. It helps to communicate two or more devices for short range. Routing Protocols are use to establish a communication in MANET. As it is a open network , it has many vulnerabilities from security point. Black hole Attack is one of the major concern in MANET. In this paper, we have implemented Black hole Attack in random mobility environment and analyse its impact on MANET using various parameters for single and multiple connection in MANET. Black hole attack disturbs one of the connection in the network while remaining connection are unaffected. During our analysis, we found that performance result of black hole attack in multiple connection network give a similar kind of output mentioned in various research paper related to gray hole attack, which will make difficult to analysis the type of attack in the network.


2019 ◽  
Author(s):  
Rohi Tariq ◽  
Sheeraz Ahmed ◽  
Raees Shah Sani ◽  
Zeeshan Najam ◽  
Shahryar Shafique

Mobile Ad hoc network is the collection of nodes without having any physical structure involved i.e. access points, routers etc. MANETs are wide-open to similar forms of threats as other wireless mobile communication systems. In Ad-hoc Network nodes performing both as end-points of the communication and routers which makes the Ad-hoc routing protocols further prone towards the security attacks. Black Hole attack is a common security issue encountered in MANET routing protocols. The Black-Hole attack is security attack in which a malicious node imposters themselves as a node with the shortest hop count to the destination node during a packet transmission. A malicious node is capable of disturbing the network with Black Hole attack pretends to have the minimum hop-count route to the destination node (DS). This node responds to all route requests (RREQ) messages in positive and thus catches all the transmission to it. The source node (SN) not knowing the malicious nature of the Black-Hole node thus transmits all the important data. The Black Hole node discards all the important data packets. In this paper a comparatively effective, efficient and easy implemented way for identifying and therefore eluding the attacks of Black-Hole in mobile Ad-hoc networks is presented. The Network Simulator (NS-2) has been used for the implementation of our proposed solution to assess its work in terms of Network Routing load, End-to-End delay and Packet delivery ratio. The results show a considerable improvement in the performance metrics.


Sign in / Sign up

Export Citation Format

Share Document