Weight based Trust Approach against Blackhole Attack Detection
Authors: Monika Labana, Mohit Jain
Certificate: View Certificate
Abstract
The fast growth of mobile communication in recent years is especially observed in the field of mobile system, wireless local area network, and ubiquitous computing. Security is a main concern for protected communication between mobile nodes in an unfriendly environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers.The issues rise when the nodes are mobile and poor routing techniques allow a user to change or modify the information during data transmission because, during network communication the data is transmitted through the intermediate routers where any node can leave or join the network any time. Black-hole is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on-demand routing protocols. In this research work we proposed weight based trust approach against black-hole attack. In this approach we compute weight of all network nodes on the basis of threshold computation. Implementation is performed in NS2 environment and results are provided to demonstrate the effectiveness of our approach, using the packet delivery ratio, Network throughput, remain energy and end to end delay, as performance factors.
Introduction
In recent years, the explosive growth of mobile computing devices, which mainly include laptops, personal digital assistants (PDAs) and handheld digital devices, has impelled a revolutionary change in the computing world: computing will not merely rely on the capability provided by the personal computers, and the concept of ubiquitous computing emerges and becomes one of the research hotspots in the computer science society. The Mobile Ad Hoc Network is one of the wireless networks that have attracted most concentrations from many researchers. In ad hoc networks the communicating nodes do not necessarily rely on a fixed infrastructure, which sets new challenges for the necessary security architecture they apply. In addition, as ad hoc networks are often designed for specific environments and may have to operate with full availability even in difficult conditions, security solutions applied in more traditional networks may not directly be suitable for protecting them. In concern of network security different attack harm the privacy of system gradually. One of the most popular and serious attacks in wireless ad hoc networks is Denial of Service attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. Therefore the proposed work is dedicated to find the solution for mobile ad hoc network based routing attack. During investigation a number of different routing attacks are establish persons are much regularly deploy in network and hard to recover. Thus Black-hole attack is selected for investigation and solution development.
Conclusion
MANETs require a reliable, efficient, and scalable most importantly, a secure protocol as they are highly insecure, self-organizing, rapidly deployed and they use dynamic routing. The mobile ad hoc network is one of the most popular network technologies now in these days. In this paper, Black-hole attack is targeted for the investigation and research study. In black hole attack attacker node capture the packets and drop without forwarding them. Due to this behavior it is very complicated for the network to figure out this attack. Therefore, we proposed a secure routing algorithm which is based on different factor by we find specific value. From this value we use each node weight and found average value which will make the decision for malicious attacker behaviour. Therefore final checks show the availability of black-hole nodes. For configure the proposed concept we have modified AODV protocol for processing of work.
Copyright
Copyright © 2025 Monika Labana, Mohit Jain. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.