Open Access Open Access  Restricted Access Subscription or Fee Access

Prevention of Wormhole and Blackhole Attacks by Detecting Wormhole Nodes Using Countermeasure with AHP

A. Ayisha Parveen, M. Saithun Bushra, M. Islabudeen

Abstract


Mobile Ad hoc Network (MANET) is an accumulation of mobile devices that dynamically form a temporary network. The purpose of MANET is used to communicate with nodes without the help of network infrastructure or any centralized administration. Mobile ad hoc networks are harmful to large group of attacks like wormhole attack, blackhole attack, etc., Most of the existing papers use the attack detection techniques to detect specific attack of MANET. In our project, We aims to prevent wormhole attack and blackhole attack using countermeasure with Analytical Hierarchy Process(AHP) to elect some special nodes, named the Local Most Trustable nodes(LMT) for the source and the destination node respectively. The elected nodes are then required to implement our scheme for avoiding wormhole and blackhole attacks. We have   not only detected wormhole attack and blackhole attack, but also located wormhole and blackhole nodes, i.e., identify the malicious nodes which possess misbehavior. The solution for blackhole and colluding wormhole attacks, we present a countermeasure named Bi-directional location mechanism with effective parameters for the calculation of node’s weight. 


Keywords


Mobile Ad Hoc Networks -Wormhole - Blackhole - Analytical Hierarchy Process - Local Most Trustable Node - Bi-Directional Location Mechanism.

Full Text:

PDF

References


Ramandeep Kaur, Jaswinder Singh ”Towards Security against Malicious Node Attack in Mobile Ad Hoc Network” International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X Volume 3, Issue 7, July 2013.

Gurpinder Singh, Asst. Prof. Jaswinder Singh ”MANET: Issues and Behavior Analysis of Routing Protocols” International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X Volume 2, Issue 4, April 2012.

Reshmi Maulik1 and Nabendu Chaki “A Study on Wormhole Attacks in MANET” International Journal of Computer Information Systems and Industrial Management Applications ISSN 2150-7988 Volume 3 pp. 271-279, 2011.

Tan, Z. “An efficient identity-based tripartite authenticated key agreement protocol” Journal of Electronic Commerce Research, 12(4), 505–518, 2012.

Misra, S. K., & Wickamasinghe, N. “Security of a mobile transaction: a trust model” Journal of Electronic Commerce Research, 4(4), 359–372, 2004.

Pooja Jaiswal, Dr. Rakesh Kumar ”Prevention of Black Hole Attack in MANET” IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 Vol.2, No5, October 2012.

Fei Shi,Jaejong Baek,Jooseok Song,Weijie Liu “A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks” Telecommun Syst 52:2397–2406 DOI 10.1007/s11235-011-9552-y, 2013.

Fei Shi, Weijie Liu, Dongxu Jin & Jooseok Song “A countermeasure against wormhole attacks in MANETs using Analytical Hierarchy Process methodology” Electron Commer Res.doi:10.1007/s10660-13-9122-3, 2013.

K.SeshadriRamana, Dr.A.A.Charipro, F.N.Kasiviswanth “A Survey On Trust Management For Mobile Ad Hoc Networks” International Journal of Network Security & Its Applications (IJNSA) , 2010.

Gagandeep, Aashima, Pawan Kumar “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012.

Bobby Sharma Kakoty “Simulation and Analysis of Blackhole Attack in MANETs for Performance Evaluation” International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 2 ISSN: 2278-621X January 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.