ABSTRACT
The black hole attack is a main kind of attack against the ad hoc on demand distance vector (AODV) protocol in ad hoc networks. A much greater threat is a joint attack of multiple black holes. To prevent black hole attacks, this paper proposes an authentication chain mechanism based on the secure recursive function, by which the successive nodes of a route are unified only on the deterministic state transition relation of the recursive function to implement a unique association for security, such that the whole route forms an authentication chain. With the mechanism of this paper, even if a pseudorandom linear sequence is adopted as a kind of simple recursive function, as long as its linear complexity is greater than the number of nodes in the authenticating chain, the attacker cannot obtain continuous state values of more than two times the linear complexity of the sequence, Thus the secure authentication of the route can be guaranteed. Therefore, the mechanism and method presented in this paper represent a novel and effective approach to defend against black hole attacks.
- Sanzgiri K, Dahill B, Laflamme D. Routing for Ad hoc Networks[C]. IEEE Journal on Selected Areas in Communications (Special Issue on Wireless Ad hoc Networks), 2005, 23(3): 598--610Google ScholarDigital Library
- Das S R, Beldingroyer E M, Perkins C E. Ad hoc On-Demand Distance Vector (AODV) Routing[M]. RFC Editor, 2003.Google Scholar
- S Othmen, f arai, a belghith et al, Secure routing protocol based on Weil paring for multi-hop cellular network (SRPMCN) [J], Int. J. Comput. Sci. Netw. Security, vol. 16, no. 6, pp. 117--124,2016.Google Scholar
- Y C Hu, A Perrig, D B Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks[J], Wireless Netw., vol. 11, nos. 1-2, pp. 21--38, 2005Google ScholarDigital Library
- S Othmen, F Zarai, M S Obaidat, et al, Secure and optimal routing protocol for multi-hop cellular networks[J], in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), San Diego, CA, USA,2015, pp. 1--8.Google ScholarCross Ref
- W J Fan, L Zhou. Mechanism and method of secure routing authentication based on SEND [J]. Journal of Beijing university of information science and technology (natural science), 2015(2):14--19.Google Scholar
- Y. C. Hu, d. Johnson, a. Perrig, Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks[C], in Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), pp. 3--13, June 2002Google Scholar
- Zapata M G, Asokan N. Securing Ad Hoc Routing Protocols[C]// Proceedings of the 2002 ACM Workshop on Wireless Security, Atlanta, GA, USA, September 28, 2002. ACM, 2002.DOI= http://doi.acm.org/10.1145/570681.570682Google Scholar
- M Yu, M Zhou, W Su, A secure routing protocol against byzantine attacks for MANETs in adversarial environments[J], IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp. 449--461, 2009.Google ScholarCross Ref
- P Sachan, P M Khilar, Securing AODV routing protocol in MANET based on cryptographic authentication mechanism[J], International Journal of Network Security and Its Applications (IJNSA), vol. 3, no. 5, 2011Google Scholar
- Jalil K A, Ahmad Z, Manan J L A, Securing routing table update in AODV routing protocol[C]// 2011 IEEE Conference on Open Systems. IEEE, 2011.Google Scholar
- N Nissar, N Naja, A Jamali, Lightweight authentication-based scheme for AODV in ad-hoc networks[C], 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), Fez, 2017, pp. 1--6.Google ScholarCross Ref
- R Kumar, S Tripathi, R Agrawal, A secure handshaking aodv routing protocol (SHS-AODV) [C], 2018-4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, 2018, pp. 1--5.Google Scholar
- Z Wan. Algebra and coding [M]. Higher education press, 2007.Google Scholar
Index Terms
- Routing Authentication Chain Mechanism to Resist AODV Black Hole Attacks
Recommendations
Performance Analysis of AODV, OLSR, DSDV Routing Protocols in MANET Under Black Hole Attack
ICCA 2020: Proceedings of the International Conference on Computing AdvancementsPresently Mobile ad hoc network (MANET) is going more exoteric for its wireless structure, and its demand is increasing day by day. MANET is basically used in such type of application where the infrastructure of a cable connection is limited and ...
Black hole attack prevention in MANET using enhanced AODV protocol
DATA '19: Proceedings of the Second International Conference on Data Science, E-Learning and Information SystemsMobile Ad-hoc Network (MANET) is highly vulnerable to attacks due to infrastructure as well as wireless communication. One of the major attacks in MANET is the black hole attack, this attack is classified as one of the Denial of Service (DoS) attacks. ...
An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET
TRUSTCOM '12: Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and CommunicationsInterest in the area of Mobile Ad-hoc Network (MANET) is growing since last few years because of its practical applications and requirement of communication in mobile devices. However, in comparison to wired network or infrastructure-based wireless ...
Comments