Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature

被引:26
|
作者
Talukdar, Md Ibrahim [1 ]
Hassan, Rosilah [2 ]
Hossen, Md Sharif [1 ]
Ahmad, Khaleel [3 ]
Qamar, Faizan [2 ]
Ahmed, Amjed Sid [4 ]
机构
[1] Comilla Univ, Dept Informat & Commun Technol ICT, Cumilla, Bangladesh
[2] Univ Kebangsaan Malaysia UKM, Fac Informat Sci & Technol, Ctr Cyber Secur, Ukm Bangi 43600, Selangor, Malaysia
[3] Maulana Azad Natl Urdu Univ, Dept Comp Sci & Informat Technol, Hyderabad, India
[4] Global Coll Engn & Technol, Fac Engn, Dept Comp, Muscat, Oman
来源
WIRELESS COMMUNICATIONS & MOBILE COMPUTING | 2021年 / 2021卷
关键词
INTRUSION DETECTION SYSTEMS; AD HOC NETWORKS; ROUTING PROTOCOLS; MANETS; FRAMEWORK; SECURITY; QOS;
D O I
10.1155/2021/6693316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly, where there is no central administration. They are prone to different types of attacks such as the black hole, insider, gray hole, wormhole, faulty node, and packet drop, which considerably interrupt to perform secure communication. This paper has implemented the denial-ofservice attacks like black hole attacks on general-purpose ad hoc on-demand distance vector (AODV) protocol. It uses three approaches: normal AODV, black hole AODV (BH_AODV), and detected black hole AODV (D_BH_AODV), wherein we observe that black holes acutely degrade the performance of networks. We have detected the black hole attacks within the networks using two techniques: (1) intrusion detection system (IDS) and (2) encryption technique (digital signature) with the concept of prevention. Moreover, normal AODV, BH_AODV, and D_BH_AODV protocols are investigated for various quality of service (QoS) parameters, i.e., packet delivery ratio (PDR), delay, and overhead with varying the number of nodes, packet sizes, and simulation times. The NS2 software has been used as a simulation tool to simulate existing network topologies, but it does not contain any mechanism to simulate malicious protocols by itself; therefore, we have developed and implemented a D_ BH_AODV routing protocol. The outcomes show that the proposed D_BH_AODV approach for the PDR value delivers around 40 to 50% for varying nodes and packets. In contrast, the delay decreases from 300 to 100 ms and 150 to 50 ms with an increase in the number of nodes and packets, respectively. Furthermore, the overhead changes from 1 to 3 for various nodes and packet values. The outcome of this research proves that the black hole attack degrades the overall performance of the network, while the D_BH_AODV enhances the QoS performance since it detects the black hole nodes and avoids them to establish the communication between nodes.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Detection of black hole attack in enhanced AODV protocol
    Vadavi, J. V.
    Sugavi, Ashwini G.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 119 - 124
  • [2] Improved AODV Performance in DOS and Black Hole Attack Environment
    Gupta, Anurag
    Patel, Bhupendra
    Rana, Kamlesh
    Pradhan, Rahul
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 2, 2015, 32 : 541 - 549
  • [3] To Mitigate Black Hole Attack in AODV
    Kumar, Raushan
    Quyoom, Abdul
    Gouttam, Devki Nandan
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 307 - 311
  • [4] Preventing Black Hole Attack in AODV using Timer-Based Detection Mechanism
    Choudhary, Nidhi
    Tharani, Lokesh
    2015 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2015, : 1 - 4
  • [5] Mitigate Black Hole Attack using Trust with AODV in MANET
    Keerthika, V.
    Malarvizhi, N.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 470 - 474
  • [6] Performance Analysis of MANET Under Black Hole Attack Using AODV, OLSR and TORA
    Rahman, Fatin Hamadah M. A.
    Au, Thien Wan
    COMPUTATIONAL INTELLIGENCE IN INFORMATION SYSTEMS, CIIS 2016, 2017, 532 : 198 - 207
  • [7] Performance Evaluation of AODV routing Protocol under Black Hole attack with varying Black hole nodes
    2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [8] Performance Evaluation of AODV under Black Hole Attack in MANET using NS2
    Madhuri, K.
    Viswanath, N. Kasi
    Gayatri, P. Usha
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [9] Prevention of Black hole Attack on AODV in MANET using hash function
    Aware, Anand A.
    Bhandari, Kiran
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [10] Impact of black hole and gray hole attack in AODV protocol
    20144600188160
    (1) Department of Computer Science and Engineering, Thapar University, Patiala, India, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):