Affiliation:
1. Department of Information Sciences, Tokyo University of Science, Chiba 278-8510, Japan
Abstract
Ad hoc networks, formed by multiple wireless communication devices without any connection to wired or intermediary devices such as by access points, are widely used in various situations to construct flexible networks that are not restricted by communication facilities. Ad hoc networks can rarely use existing infrastructure, and no authentication infrastructure is included in these networks as a trusted third party. Hence, distinguishing between ordinary and malicious terminals can be challenging. As a result, black hole attacks are among the most serious security threats to Ad hoc On-demand Distance Vector (AODV) routing, which is one of the most popular routing protocols in mobile ad hoc networks. In this study, we propose a defense method against black hole attacks in which malicious nodes are actively detected to prevent attacks. We applied the proposed method to a network containing nodes engaging in black hole attacks, confirming that the network’s performance is dramatically improved compared to a network without the proposed method.
Subject
Critical Care Nursing,Pediatrics
Reference18 articles.
1. The Application Trends to the Real Systems of an Ad Hoc Network;Matsui;J. Reliab. Eng. Assoc. Jpn.,2012
2. Al-shareeda, M.A., Alazzawi, M.A., Anbar, M., Manickam, S., and Al-Ani, A.K. (2021, January 25–26). A Comprehensive Survey on Vehicular Ad Hoc Networks (VANETs). Proceedings of the 2021 International Conference on Advanced Computer Applications (ACA), Maysan, Iraq.
3. A Survey on MANETs in Disaster Rescue Operations;Ramakristanaiah;Int. J. Sci. Res. (IJSR),2015
4. Pandey, K., and Swaroop, A. (2011). A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols. IJCSI Int. J. Comput. Sci., 8.
5. Perkins, C., Belding-Royer, E., and Das, S. Adhoc On demand Distance Vector. Internet Engineering Task Force Request for Comments, July 2003.