Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Reliable approach to prevent Blackhole and Grayhole attacks in mobile ad hoc networks

Reliable approach to prevent Blackhole and Grayhole attacks in mobile ad hoc networks

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Dynamic Ad-Hoc Networks — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Due to user's requirement of wireless connectivity irrespective of his geographical position the dynamic ad hoc networking (DANET) is gaining popularity to its peak today. In mobile ad hoc networks (MANETs), autonomous mobile devices connect with each other forming a temporary network without any centralized administration. The widely accepted ad hoc routing protocols do not address possible security threats at the network layer of MANETs. In this chapter, we investigate Blackhole and Grayhole attacks that cause denial-of-service and badly disrupt normal network functionalities. We present an algorithm that introduces security aspect in the route discovery process of ad hoc On-Demand Distance Vector (AODV) protocol to protect MANETs against these two attacks; a node identifies malicious node by detecting unusual routing information and alerts other nodes about the adversary using default routing packets. The proposed approach detects and isolates multiple malicious nodes during route discovery process to assure safe and secure communication among mobile nodes. We analyse our approach theoretically and evaluate its performance using Network Simulator-2 (NS-2).

Chapter Contents:

  • 12.1 Introduction
  • 12.2 Scope and objective
  • 12.3 Theoretical background and related work
  • 12.3.1 Introduction to MANET
  • 12.3.1.1 Challenges
  • 12.3.2 Routing protocols
  • 12.3.2.1 Ad hoc on-demand distance vector
  • 12.3.3 Security issues in MANET
  • 12.3.3.1 Types of security attacks
  • 12.3.3.2 Attacks on different layers
  • 12.3.3.3 Blackhole and Grayhole attacks
  • 12.3.4 Related work
  • 12.4 Reliable-AODV: mechanism to thwart Blackhole and Grayhole attacks
  • 12.4.1 The proposed approach
  • 12.4.2 Algorithm analysis
  • 12.5 Implementation methodology
  • 12.5.1 Simulator choice
  • 12.5.2 Experimental setup
  • 12.5.2.1 Simulation parameters
  • 12.5.2.2 Performance metrics
  • 12.6 Simulation results and analysis
  • 12.6.1 Effect of network size
  • 12.6.2 Effect of traffic load
  • 12.7 Further developments
  • 12.8 Conclusions
  • Acknowledgements
  • References

Inspec keywords: telecommunication security; routing protocols; mobile ad hoc networks

Other keywords: DANET; dynamic ad hoc networking; ad hoc on-demand distance vector; routing packet; malicious node identification; route discovery process; wireless connectivity; security threat; denial-of-service; NS-2; blackhole attack; AODV protocol; Network Simulator-2; autonomous mobile device; ad hoc routing protocol; mobile ad hoc network; grayhole attack; MANET network layer

Subjects: Communication network design, planning and routing; Mobile radio systems; Protocols; Data security

Preview this chapter:
Zoom in
Zoomout

Reliable approach to prevent Blackhole and Grayhole attacks in mobile ad hoc networks, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte059e/PBTE059E_ch12-1.gif /docserver/preview/fulltext/books/te/pbte059e/PBTE059E_ch12-2.gif

Related content

content/books/10.1049/pbte059e_ch12
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address