Skip to main content
Log in

Mitigate Black Hole Attack Using Hybrid Bee Optimized Weighted Trust with 2-Opt AODV in MANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A Mobile Ad hoc Network (MANET) is susceptible to several security threats. This work aims at securing a MANET against black hole attacks. Based on MANET characteristics, a trust based secure routing protocol known as Ad hoc On-Demand Vector Routing has been proposed, which protects a MANET from black hole attack. This work presents an algorithm which decreases the probability of black hole attacks known as a hybrid Weighted Trust based Artificial Bee Colony 2-Opt algorithm. Optimal secure paths can be detected using the ABC algorithm. The hybridization of the algorithm has been performed using the 2-opt as local search. This algorithm’s efficiency can be improvised using the current solutions on the basis of their fitness for generating new solutions. Proposed method enhances the performance parameters such as packet delivery ratio, hops to sink and end to end delay.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Akay, B., Aydogan, E., & Karacan, L. (2011). 2-Opt based artificial bee colony algorithm for solving travelling salesman problem. In 2nd world conference on information technology (WCIT-2011) (pp. 666–672).

  2. Badiwal, S., Kulshrestha, A., & Garg, N. (2017). Analysis of black hole attack in MANET using AODV routing protocol. International Journal of Computer Applications, 168(8), 27–33.

    Google Scholar 

  3. Bhattercharjee, A., & Paul, S. (2014). A review on some aspects of black hole attack in MANET. International Journal of Engineering Trends and Technology (IJETT), 10(8), 396–401.

    Article  Google Scholar 

  4. Croes, G. A. (1958). A method for solving travelling salesman problems. Operations Research, 6(6), 791–812.

    Article  MathSciNet  Google Scholar 

  5. Gao, W., Zhao, B., Zhou, G. T., Wang, Q. Y., & Yu, C. Y. (2014). Improved artificial bee colony algorithm based gravity matching navigation method. Sensors, 14(7), 12968–12989.

    Article  Google Scholar 

  6. Garg, R., & Mongia, V. (2018). Mitigation of black hole attack in Mobile Ad-Hoc Network using artificial intelligence technique. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 3(1), 1168–1174.

    Google Scholar 

  7. Jayavenkatesan, R., & Mariappan, A. (2017). Energy efficient multipath routing for MANET based on hybrid ACO-FDRPSO. International Journal of Pure and Applied Mathematics, 115(6), 185–191.

    Google Scholar 

  8. Kalucha, R., & Goyal, D. (2014). A review on artificial bee colony in MANET. International Journal of Computer Science and Mobile Computing, 3(7), 34–40.

    Google Scholar 

  9. Karaboga, D. (2005). An idea based on honey bee swarm for numerical optimization. Technical Report TR06. Erciyes University, Engineering Faculty, Computer Engineering Department.

  10. Pirzada, A. A., & McDonald, C. (2006). Trust establishment in pure ad-hoc networks. Wireless Personal Communications, 37(1–2), 139–168.

    Article  Google Scholar 

  11. Prasad, P. S., & Rao, S. K. M. (2017). HIASA: Hybrid improved artificial bee colony and simulated annealing based attack detection algorithm in Mobile Ad hoc Networks (MANETs). Bonfring International Journal of Industrial Engineering and Management Science, 7(2), 01–12.

    Article  Google Scholar 

  12. Sardar, M., & Majumder, K. (2013). A survey on trust based secure routing in MANET. In: IccSEA, SPPR, cSIA (pp. 243–253).

  13. Simaremare, H., Abouaissa, A., Sari, R. F., & Lorenz, P. (2014, June). Performance analysis of optimized trust AODV using ant algorithm. In Communications (ICC), 2014 IEEE international conference on (pp. 1843–1848). IEEE.

  14. Sood, M., & Rani, P. (2017). Removal of black hole attack using AODV protocol in MANET. International Journal of Engineering and Management Research (IJEMR), 7(3), 72–75.

    Google Scholar 

  15. Ullah, I., & Rehman, S. U. (2010). Analysis of black hole attack on MANETs using different MANET routing protocols. Karlskrona: Blekinge Institute of Technology.

    Google Scholar 

  16. Xu, G., Xu, C., Tian, X., Zhang, L., Li, X., & Li, W. (2012, November). PSO-TPS: An optimal trust path selection algorithm based on particle swarm optimization in small world network. In Cloud and green computing (CGC), 2012 second international conference on (pp. 594–600). IEEE.

  17. Yadav, S., Trivedi, M. C., Singh, V. K., & Kolhe, M. L. (2017, October). Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme. In Electrical, computer and electronics (UPCON), 2017 4th IEEE Uttar Pradesh Section International Conference on (pp. 1–4). IEEE.

  18. Zafar, S., & Soni, M. K. (2014, February). Trust based QOS protocol (TBQP) using meta-heuristic genetic algorithm for optimizing and securing MANET. In Optimization, reliability, and information technology (ICROIT), 2014 international conference on (pp. 173–177). IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Keerthika.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Keerthika, V., Malarvizhi, N. Mitigate Black Hole Attack Using Hybrid Bee Optimized Weighted Trust with 2-Opt AODV in MANET. Wireless Pers Commun 106, 621–632 (2019). https://doi.org/10.1007/s11277-019-06182-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06182-8

Keywords

Navigation