Skip to main content
Log in

A dynamic threshold based approach for mitigating black-hole attack in MANET

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile ad-hoc network is an infrastructure less type of network which does not require any kind of fixed infrastructure. It provides multi-hop communication between the source and destination nodes which are not within the direct range of each other through the intermediate nodes. These intermediate nodes cooperate with other nodes in finding an optimum and shortest route toward the destination. However, in holistic environments, some nodes do not cooperate with other nodes in finding the optimal route towards the destination and intentionally give the false route information of having the shortest path toward the destination with a high destination sequence number in order to attract the traffic toward itself and start dropping of the data packets instead of forwarding it. This type of routing misbehaviour is generally called as black hole attack or full packet dropping attack which is one of the most severe destructive attacks that lead to the network degradation. In this paper, we have proposed a protocol called as Mitigating Black Hole effects through Detection and Prevention (MBDP-AODV) based on a dynamic threshold value of the destination sequence number. In order to validate the efficiency of proposed protocol, the NS-2.35 simulator is used. The simulation results show that proposed protocol performs better as compared with existing one under black hole attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. Balaji, S., & Rajaram, M. (2016). SIPTAN: Securing inimitable and plundering track for ad hoc network. Wireless Personal Communications. doi:10.1007/s11277-016-3187-y.

    Article  Google Scholar 

  2. Hwang, R. J., & Hsiao, Y. K. (2013). An anonymous distributed routing protocol in mobile ad-hoc networks. Journal Supercomputing, 66, 888–906. doi:10.1007/s11227-013-0920-0.

    Article  Google Scholar 

  3. Singh, T., Singh, J., & Sharma, S. (2016). Energy efficient secured routing protocol for MANETs. Wireless Networks. doi:10.1007/s11276-015-1176-9.

    Article  Google Scholar 

  4. Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications. doi:10.1007/s11277-016-3318-5.

    Article  Google Scholar 

  5. Perkins, C. E., Beliding-Royer, E., & Das, S. (2004). Ad hoc on-demand distance vector (AODV) routing. IETF Internet Draft, MANET working group.

  6. Johnson, D. B., Maltz, D. A., & Hu, Y.-C. (2004). The dynamic source routing protocol for mobile ad-hoc network (DSR). IETF Internet Draft.

  7. Dorri, A. (2016). An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. Wireless Networks. doi:10.1007/s11276-016-1251-x.

    Article  Google Scholar 

  8. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). DoS attacks in mobile ad hoc networks: A survey. In IEEE 2nd international conference on advanced computing and communication technologies.

  9. Verma, K., Hasbullah, H., & Kumar, A. (2013). Prevention of DoS attacks in VANET. Wireless Personal Communications, 73, 95–126. doi:10.1007/s11277-013-1161-5.

    Article  Google Scholar 

  10. Laxmi, V., Lal, C., Gaur, M. S., & Mehta, D. (2015). JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. Journal of Information Security and Applications, 22, 99–112.

    Article  Google Scholar 

  11. Faghihniya, M. J., Hosseini, S. M., & Tahmasebi, M. (2016). Security upgrade against RREQ flooding attack by using balance index on vehicular adhoc network. Wireless Networks. doi:10.1007/s11276-016-1259-2.

    Article  Google Scholar 

  12. Djahel, S., Abdesselam, F. N., & Zhang, Z. (2011). Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. In IEEE communications survey and tutorial (pp. 658–672).

    Article  Google Scholar 

  13. Dabideen, S., & Aceves, J. J. G. L. (2012). Secure routing in MANETs using local times. Wireless Networks, 18, 811–826. doi:10.1007/s11276-012-0435-2.

    Article  Google Scholar 

  14. Gurung, S., & Chauhan, S. (2016). A novel approach for mitigating grayhole attack in MANET. Wireless Networks. doi:10.1007/s11276-016-1353-5.

    Article  Google Scholar 

  15. Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 21, 2781–2798. doi:10.1007/s11276-015-0945-9.

    Article  Google Scholar 

  16. Gurung, S., & Saluja, K. K. (2014). Mitigating impact of black hole attack in MANET. In Proceedings of the 5th international conference on recent trends in information, telecommunication and computing.

  17. Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2015). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Networks. doi:10.1007/s11276-015-1032-y.

    Article  Google Scholar 

  18. Gurung, S., & Siddhartha, S. (2017). A review of black-hole attack mitigation techniques and its drawbacks in mobile ad-hoc network. In Proceedings of the 2nd IEEE international conference on WiSPNET, (pp. 2409–2415).

  19. Shi, F., Liu, W., Jin, D., & Song, J. (2014). A cluster-based countermeasure against blackhole attacks in MANETs. Telecommunication Systems, 57(2), 119–136.

    Article  Google Scholar 

  20. Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75. doi:10.1109/JSYST.2013.2296197.

    Article  Google Scholar 

  21. Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Proceedings of IEEE conference on information and communication technologies (pp. 479–484).

  22. Su, M. Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34(1), 107–117. doi:10.1016/j.comcom.2010.08.007.

    Article  Google Scholar 

  23. Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers and Electrical Engineering, 40, 530–538.

    Article  Google Scholar 

  24. Lacey, T. H., Mills, R. F., Mullins, B. E., Raines, R. A., Oxley, M. E., & Rogers, S. K. (2012). RIPsec: Using reputation-based multilayer security to protect MANETs. Computer and Security, 31, 122–136.

    Article  Google Scholar 

  25. Dokurer, S., Erten, Y. M., & Acar, C. E. (2007). Performance analysis of ad-hoc networks under black hole attacks. In Proceedings of the IEEE SoutheastCon.

  26. The network simulator-ns-2. (2016). http://www.isi.edu/nsnam/ns/.

Download references

Acknowledgements

The first author would like to thank Department of Electronics and Information Technology (DEITY), Government of India, for supporting Ph.D. research scholar under Visvesvaraya Scheme. The authors would also like to thank the editor and anonymous reviewers for providing helpful comments in improving this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shashi Gurung.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gurung, S., Chauhan, S. A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Netw 24, 2957–2971 (2018). https://doi.org/10.1007/s11276-017-1514-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1514-1

Keywords

Navigation