Preventing Collaborative Black Hole Attack in IoT Construction Using a CBHA–AODV Routing Protocol

2020 ◽  
Vol 12 (2) ◽  
pp. 25-46
Author(s):  
T. Aditya Sai Srinivas ◽  
S S Mani Manivannan

Workers or labors who are working in construction sites are prone to severe risks such as death, injuries happened due to accidents, falls and stuck in between objects. Internet of things (IoT) based sensors can be utilized to monitor the behavior of workers when they are in danger zones/areas. To safeguard site workers, supervisors or site managers should monitor and alert them when they are in danger. Data will be routed from site worker to supervisor, during this routing process data is subjected to routing attacks such as black hole attack and so on, due to wireless transmission. This article addresses the problem of black hole attack that happens during the wireless transmission between nodes and the base station (BS) of IoT-based civil construction. The proposed solution Collaborative Black Hole Attack – Ad Hoc On-Demand Distance Vector routing protocol (CBHA-AODV) prevents the collaborative black hole attack by 87.72%.

Ad-hoc network is vulnerable to different types of attacks because of its vigorously changing topology, limited storage capacity, absence of centralized infrastructure etc. Adhoc On Demand Distance Vector (AODV) is established protocol for routing for this type of networks. AODV is exposed to black hole attack due to the inadequacy of security consideration. The malicious nodes drop all information packets rather than sending it to the neighboring node. In this research paper, Anomaly based intrusion detection system (IDS) known as Particle swarm optimization (PSO) is purposefully utilized to detect the misbehavior activities in the network. In AODV routing protocol, swarm agents are used for identifying misbehavior activities of nodes based on dropping behavior of data packets. An intrusion response system (IRS) is activated after the detection of an intrusion. It is necessary to take action against black hole attack or reduce the effect of the damage caused by the attack. IDS and a response system are integrated for detection and removal of the source of an attack respectively. The guard nodes are placed in the network with the aim to oppose black hole attackers and in this way IR is initiated. The malevolent nodes detected by PSO are bypassed and new routing paths are established using guard nodes. This research has been carried out for analyzing the influence of malicious nodes and guard nodes on varying network size vice versa. The simulation study of proposed technique integrated particle swarm optimization intrusion detection response system (IPSO-IDRS) explains how it is better in terms of the performance metric like throughput and PDR.


2019 ◽  
Vol 20 (4) ◽  
pp. 631-639 ◽  
Author(s):  
Suresh Kumar ◽  
Kiran Dhull ◽  
Payal Arora ◽  
Ashish Kumar Luhach

Wireless Sensor Networks (WSN’s) have gained a considerable importance and are used for a variety of applications. In WSN, an arrangement of sensor nodes is done to sense and collect information from its nearby environment and to send it back to the base station using routing protocol. The biggest challenges are how to handle the routing problems and to optimize the energy consumption in WSN. In this paper, performance evaluation of three energy models, Generic, Micaz and Micamotes, is presented using Ad-Hoc On demand Distance Vector (AODV) routing protocol. The performance evaluation is done using several parameters: Throughput, Jitter, Average End-to-End Delay (AEED), Total Packets Received (TPR) and Energy consumption inthree modes (transmit, receive and idle). Based on the evaluation, it has been found that Micamotes energy model using AODV routing protocol consumes less energy by 80.46% and 428.57% in transmit mode , 102.94% and 335.6% in receive mode from Micaz and Generic energy models, respectively.


Vehicular ad hoc networks (VANETs) are upcoming prominent technology in the field of communication with vehicles. It is a combination of mobile and sensor network features. The random change in position of vehicles in VANET made the system more vulnerable to attacks. The most important attack in VANETs to be considered is Black hole attack which increases the chances for packet loss and in turn to accidents. There is a necessity to develop the techniques to detect Black hole attacks and reduce number of accidents. In this paper, a technique called “Detection of Black hole in VANET using AODV (DBVANETuAODV)” is proposed to find and prevent Black hole attack and thereby reducing occurrence of accidents. The proposed solution is implemented using AODV Routing protocol in VANET.The experiments are conducted with SUMO and NS2 simulators to depict network environment in an inexpensive way. The proposed method “DBVANETuAODV” is compared with AODV with black hole and the result shows the proposed method provides a significant improvement.


Author(s):  
Mohamed Amine Ferrag ◽  
Mehdi Nafa ◽  
Salim Ghanemi

In this chapter, first, the authors briefly introduce the two new systems “MASN-OLSR” (Mobile Ad Hoc Social Networks with OLSR) and “MASN-AODV” (Mobile Ad Hoc Social Networks with AODV). Then they choose wormhole and black hole attack methods, because they are not completely solved, especially in a setting where MASN is used as OLSR or AODV routing protocol. The authors give a definition of the wormhole and black hole attacks on an ad hoc network using OLSR or AODV as routing protocol and then examine the various existing proposals in the literature to overcome this attack. With an analysis of these methods, they then determine the advantages and disadvantages of each of these new systems.


2010 ◽  
Vol 40-41 ◽  
pp. 457-461
Author(s):  
Xiao Yun Chen ◽  
Yu Kai Yao ◽  
Guo Hua Liu ◽  
Long Jie Li

Mobile Ad hoc Network (MANET) has attracted lots of research efforts these years, mainly due to its appealing applications in no infrastructure situations such as battle fields and disaster recovery operations [1]. In this paper, we explore wireless Ad Hoc network focusing on its Routing Protocol AODV, we in depth analyze its operation principles and the problems exist in AODV routing protocol. AODV routing protocol is vulnerable, it is always exposed to many attacks, such as DoS, black hole, etc. [2] Through exhaustive researching the behaviors of black hole attack in NS2 simulation platform, and we finally propose a new routing security strategy to defense the black hole attack in AODV. Simulation results show that the strategy we proposed can not only effectively defense the black hole nodes, but also has better routing performance for moderate or small scale Ad Hoc Networks.


2014 ◽  
Vol 989-994 ◽  
pp. 4482-4487
Author(s):  
Xiao Jing Meng ◽  
De Yu Lin ◽  
De Qin Lin ◽  
Rong Hua

Mobile Ad Hoc network is a self-composing network with a highly dynamic network topology. Although it has many advantages, there are still some safety problems in it. One of these problems is the black hole attack. The black hole attack is a typical attack to the Ad Hoc network and is also the main threat facing it. In this paper, the safety problems exist in the AODV protocol, which is a kind of routing protocol in the Ad Hoc, has been analyzed in detail. In the meanwhile, an improved Secure Ad Hoc On-Demand Distance Vector Routing called OSAODV has been proposed and realized based on the NS2. Finally, three set of experiments have been made, the results have shown that the OSADOV can avoid the black hole attack very well.


Author(s):  
Ali Ayid Ahmad ◽  
Ahmed Chalak Shakir

Mobile Ad Hoc Network is an infrastructure less wireless network where the mobile nodes leaves and joins the mobile network very frequently. The routing of the packets from source node to destination node, the routing protocol is used. On Demand Distance Vector Routing protocol is very common and implemented with Mobile Ad Hoc Network nodes to handle the operations of packet routing from by any node as a source node to destination node. In this paper prevention of black hole attack by modifying the On Demand Distance Vector routing protocol. The sequence number of 32 bit is initiated with the Route Reply and route sequence packet broadcast to determine the request reply from black hole node under the Mobile Ad Hoc Network. The sequence number and On demand Distance Vector Routing protocol are integrated with a mechanism to find the Request Reply of message containing routing information from source to destination node in Mobile Ad Hoc Network.


Sign in / Sign up

Export Citation Format

Share Document