Author:
Chawhan Manish Devendra,Khan Ausaf Umar,Kulat Kishore Damodar,Neole Bhumika
Abstract
Mobile Nodes in Mobile Adhoc Network (MANET) interact wirelessly with the neighbor nodes without aid ofcentral management. They are subject to a variety of attacks, including as the black hole, insider, grey hole,wormhole, flooding attack, and packet drop, all of which severely impair secure communication. This paperincorporated an intrusion detection system (IDS) into a reactive MANET routing protocol, such as Adhoc OnDemand Distance Vector (AODV), for the detection and prevention of malicious nodes. To make a comparisonwith the implemented IDSAODV, the existing NetSim code of Intrusion Detection System (IDS) based on DynamicSource Routing (DSR) protocol is utilized. We created a Black-hole node to conduct malicious activities in thenetwork. The IDSAODV and IDSDSR are analyzed for different Quality of Service (QoS) characteristics suchas Packet Delivery Ratio (PDR), Throughput, Energy Consumption, and delay in a network size of 10 nodesfor simulation period of 100 seconds. The NetSim tool was utilized as a simulation tool for creating networkwith malicious node and to implement IDS. The results demonstrate that the IDSAODV and IDSDSR efficientlyidentify and prevent a BH attack on the network. The IDSAODV improves PDR and throughput while consumingmore energy and having a little higher delay
Publisher
Perpetual Innovation Media Pvt. Ltd.
Reference14 articles.
1. Chawhan, M. D., Kulat, K. D., Pokle, S. B., and Khan, A. U. 2020. An advanced trust-based routing protocol for mobile adhoc network under black-hole attack. Bioscience Biotechnology Research Communications Vol. 13, No. 14, pp. 120-124.
2. Datta, R. and Marchang, N. 2012. Security for mobile ad hoc networks. In Handbook on Securing Cyber-Physical Critical Infrastructure. pp.147-190.
3. Deny, J., Kumar, A. S., Sundarajan, M., and Khanna, V. 2017. Defensive against collaborative attacks by malicious nodes in manets: A cooperative bait detection approach. In International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies. IEEE, pp.1-5.
4. Fazeldehkordi, E. and Akanbi, O. 2015. A study of black hole attack solutions on aodv routing protocol in manet wireless network security. University Technology Malaysia Photonics Research Centre.
5. Hurley-Smith, D., Wetherall, J., and Adekunle, A. 2017. Superman: Security using pre existing routing for mobile ad hoc networks. IEEE Transactions on Mobile Computing Vol.6, No.10, pp.2927-2940.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Behavior of Dynamic Routing Protocol for Disaster Area Scenario;International Journal of Next-Generation Computing;2022-11-18