Open Access   Article Go Back

Detection of Blackhole Attack Using RMBOPB Based Agent

Khondekar Lutful Hassan1 , J.K. Mandal2 , Md Saquib Zia3 , Deepshikha Shaw4

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 170-178, Jan-2019

Online published on Jan 20, 2019

Copyright © Khondekar Lutful Hassan, J.K. Mandal , Md Saquib Zia, Deepshikha Shaw . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Khondekar Lutful Hassan, J.K. Mandal , Md Saquib Zia, Deepshikha Shaw, “Detection of Blackhole Attack Using RMBOPB Based Agent,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.170-178, 2019.

MLA Style Citation: Khondekar Lutful Hassan, J.K. Mandal , Md Saquib Zia, Deepshikha Shaw "Detection of Blackhole Attack Using RMBOPB Based Agent." International Journal of Computer Sciences and Engineering 07.01 (2019): 170-178.

APA Style Citation: Khondekar Lutful Hassan, J.K. Mandal , Md Saquib Zia, Deepshikha Shaw, (2019). Detection of Blackhole Attack Using RMBOPB Based Agent. International Journal of Computer Sciences and Engineering, 07(01), 170-178.

BibTex Style Citation:
@article{Hassan_2019,
author = {Khondekar Lutful Hassan, J.K. Mandal , Md Saquib Zia, Deepshikha Shaw},
title = {Detection of Blackhole Attack Using RMBOPB Based Agent},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {170-178},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=614},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=614
TI - Detection of Blackhole Attack Using RMBOPB Based Agent
T2 - International Journal of Computer Sciences and Engineering
AU - Khondekar Lutful Hassan, J.K. Mandal , Md Saquib Zia, Deepshikha Shaw
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 170-178
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

In this paper a novel technique has been introduce to detect black hole attack using Recursive Modulo 2 and Bitwise Operations of Paired Bits (RMBOPB) agent, where RMBOPB agent is fired from a monitoring nodes. The RMBOPB agent traverses throughout the network. If the RMBOPB agent reached to any Blackhole node then it will send the message to the monitor node for the malicious status signal to the monitor node. To implement Blackhole attack in Adhoc On Demane Distance Vector (AODV) routing protocol is taken as MANET routing protocol, and Network Simulator 2 (NS 2.34) is taken as simulation tool. Simulations are done through various node densities and various scenarios. Number of packet receive, packet delivery ratio and throughput is taken as the metric for the compassion of performance of the network. After comparing the every simulation it is seen that the proposed method detect the black hole attack in the network and increase the performance of the network.

Key-Words / Index Term

RMBOPB, Blackhole Attack, MANET, AODV, NS2, Wireless Security, etc

References

[1] C.Siva Ram Murthy and B.S manoj” Ad Hoc Wireless networks architecture and protocols” Pearson Education India 2005.
[2] PrasantMohapatra, Srikanth Krishnamurthy “Ad hoc networks: technologies and protocols” Springer 2005.
[3] Chai-KeongToh “Ad hoc mobile wireless networks: protocols and systems ” Prentice Hall.
[4] Amitava Mishra “Security and Quality of Service in Adhoc Wireless Network”, Cambridge University Press .
[5] Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad hoc Mobile Wireless Networks: Principles, Protocols and Applications.Auerbach Publications (2008).
[6] TeerawatIssariyakul, EkramHossain “Introduction to Network Simulator NS2” Springer (2009)
[7] Marc Greis` Tutorial http://www.isi.edu/nsnam/ns/tutorial/208 Computer Science & Information Technology (CS & IT) (last visited on 15/5/2017 at 15:02 IST).
[8] Mubashir Husain Rehmani, Sidney Doria, and Mustapha RedaSenouci “A Tutorial on the Implementation of Ad-hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2)”
[9] Mandal, J. K.,Dutta, S.,Mal, S., “A Multiplexing Triangular Encryption Technique – A Move Towards Enhancing Security in E-Commerce, Proc. of Conference of Computer Association of Nepal, December, 2001.
[10] Mandal, J. K., Chatterjee R, “Authentication of PCSs with Triangular Encryption Technique”, Proceedings of 6th Philippine Computing Science Congress(PCSC 2006), Ateneo de Manila University, Manila, Philippine, March 28-29,2006.
[11] Dokurer, S. Ert, Y.M. ;Acar, C.E.” Performance analysis of ad-hoc networks under black hole attacks”, Proceedings. IEEE. pp. 148 – 153, 2007.
[12] Perkins, C.E., Royer, E.M., "Ad-hoc on-demand distance vector routing", www.cs.ucsb.edu/~ravenben/classes/papers/aodv-wmcsa99.pdf (last visited on 18/5/2017 at 09:45 IST).
[13] Deng, H., Li, W., Agrawal, D., "Routing Security in Wireless Ad Hoc Networks" IEEE Communication Magazine ( October 2002) pp. 70-75.
[14] Al-Shurman, M., Yoo, S., Park, S., "Black hole Attack in Mobile Ad Hoc Networks", ACM Southeast Regional Conference (2004) pp. 96-97.
[15] Mishra, A., Nadkarni, K., Patcha, A., "Intrusion detection in wireless ad-hoc networks", IEEE Wireless Communications, February 2004, pp. 48-60.
[16] MangeshGhonge, Prof. S. U. Nimbhorkar, “Simulation of AODV under Blackhole Attack in MANET” IJCSIR, Volume 2, Issue 2, February 2012.
[17] Johnson DB, Maltz DA: Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing. Volume 353. Edited by Imielinski T, Korth H. Kluwer Academic Publishers; 1996:153–181. 10.1007/978-0-585-29603-6_5.
[18] Park V, Corson S: Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification. Internet Draft, Internet Engineering Task Force MANET Working Group 1998.
[19] Deng H, Li W, Agrawal DP: Routing Security in Wireless Ad-hoc Networks. IEEE Communications Magazine 2002,40(10):70–75. doi: 10.1109/MCOM.2002.1039859. 94 .
[20] Sun B, Guan Y, Chen J, Pooch UW: Detecting Black-hole Attack in Mobile Ad Hoc Networks. Paper presented at the 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22–25 April 2003.
[21] Al-Shurman M, Yoo S-M, Park S: Black Hole Attack in Mobile Ad Hoc Networks. Paper presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE`42), Huntsville, Alabama, 2–3 April 2004.
[22] Tamilselvan L, Sankaranarayanan V: Prevention of Blackhole Attack in MANET. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27–30 August 2007.
[23] Djenouri D, Badache N: Struggling Against Selfishness and Black Hole Attacks in MANETs. Wireless Communications & Mobile Computing 2008,8(6):689–704. doi: 10.1002/wcm.v8:6.
[24] Kozma W, Lazos L: REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, 16–18 March 2009.
[25] Raj PN, Swadas PB: DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET. International Journal of Computer Science 2009, 2: 54–59. doi: abs/0909.2371.
[26] Jaisankar N, Saravanan R, Swamy KD: A Novel Security Approach for Detecting Black Hole Attack in MANET. Paper presented at the International Conference on Recent Trends in Business Administration and Information Processing, Thiruvananthapuram, India, 26–27 March 2010.
[27] Mistry N, Jinwala DC, IAENG, Zaveri M: Improving AODV Protocol Against Blackhole Attacks. Paper presented at the International MultiConference of Engineers and Computer Scientists, Hong Kong, 17–19 March, 2010.
[28] Su M-Y: Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems. IEEE Computer Communications 2011,34(1):107–117. doi:10.1016/j.comcom.2010.08.007.
[29] Oliveira R, Bhargava B, Azarmi M, Ferreira EWT, Wang W, Lindermann M: Developing Attack Defense Ideas for Ad Hoc Wireless Networks. Paper presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009.
[30] Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K: Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. Paper presented at the International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23–26 June 2003.