skip to main content
10.1145/3479243.3487296acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

A Novel Indirect Trust Mechanism for Addressing Black hole Attacks in MANET

Published: 22 November 2021 Publication History

Abstract

Mobile Ad hoc Networks (MANETs) are emerging wireless networks with many distinct characteristics. MANET has the potential to be useful in many different commercial applications. However, before using MANET in commercial application, it is necessary to address different security issues related to MANET. Data routing is one of the fundamental operations in the MANET. This research work addresses security issues related to MANET routing protocols. In this paper, we consider the performance of MANETs routing protocols subject to black hole attacks. Trust management techniques aim to protect a network from the malicious behaviour of the participating nodes. This research work proposed a novel trust-based routing protocol for MANET called ITAODV, which is derived from regular AODV protocol. The proposed protocol uses an indirect trust mechanism, which takes into account the reliability of the nodes while forwarding the packets. The performance evaluation of AODV and ITAODV was carried out using Network Simulator 3 (NS-3). The experimental results demonstrate effectiveness of the ITAODV protocol against black hole attacks.

References

[1]
Mohamed A. Abdelshafy and Peter J.B. King. 2013. Analysis of security attacks on AODV routing. 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013 (2013), 290--295. https://doi.org/10.1109/ICITST.2013.6750209
[2]
Ali Alzahrani, Hassan Jari, and Nigel Thomas. 2019. Analysing the Effect of Mobility on the Performance of MANET Routing Protocols. 35th UK Performance Engineering Workshop (2019).
[3]
Ali Alzahrani, Hassan Jari, and Nigel Thomas. 2020. Performance Evaluation of MANET Trust-based AODV Protocol in the Presence of Blackhole Attacks. In Proceedings of the 36th Annual UK Performance Engineering Workshop (UKPEW 2020).
[4]
Sandeep Dhende, Sandeep Musale, Suresh Shirbahadurkar, and Anand Najan. 2017. SAODV: Black hole and gray hole attack detection protocol in MANETs. In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). 2391--2394. https://doi.org/10.1109/WiSPNET.2017.8300188
[5]
Raihana Ferdous, Vallipuram Muthukkumarasamy, and Abdul Sattar. 2010. Trust Management Scheme for Mobile Ad-Hoc Networks. In 2010 10th IEEE International Conference on Computer and Information Technology. 896--901. https://doi.org/10.1109/CIT.2010.167
[6]
Danista Khan and Mahzaib Jamil. 2017. Study of detecting and overcoming blackhole attacks in MANET: A review. In 2017 International Symposium on Wireless Systems and Networks (ISWSN). 1--4. https://doi.org/10.1109/ISWSN.2017.8250039
[7]
Marek Natkaniec. 2009. Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications (Sarkar, S. K. et al.; 2008) [Book Review]. IEEE Communications Magazine 47, 5 (2009), 12--14. https://doi.org/10.1109/MCOM.2009.4939268
[8]
Suniti Purbey. 2018. a Review on Manet (Mobile Ad Hoc Network). International Journal of Emerging Trends in Engineering and Development 1, 9 (2018), 7--12. https://doi.org/10.26808/rs.ed.i9v1.02
[9]
Raghavendar L. Raju and C. R.K. Reddy. 2019. Node activity based trust and reputation estimation approach for secure and QoS routing in MANET. International Journal of Electrical and Computer Engineering 9, 6 (2019), 5340--5350. https://doi.org/10.11591/ijece.v9i6.pp5340--5350
[10]
Venkata Latha Sai Saranya Kasa, C. Shoba Bindu, and Nageswararao Sirisala. 2018. Trusted Quality of Service Routing Protocol in Mobile Ad-hoc Networks. In 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT). 2269--2273. https://doi.org/10.1109/RTEICT42901.2018.9012483
[11]
Nageswararao Sirisala and C.Shoba Bindu. 2014. Weightage based trusted QoS protocol in Mobile Adhoc Networks. In 2014 IEEE Global Conference on Wireless Computing Networking (GCWCN). 283--287. https://doi.org/10.1109/GCWCN.2014.7030895
[12]
Sandeep A Thorat and P J Kulkarni. 2014. Design issues in trust based routing for MANET. In Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on. IEEE, 1--7.
[13]
Sandeep A. Thorat and Prakash J. Kulkarni. 2017. Uncertainty analysis framework for trust based routing in MANET. Peer-to-Peer Networking and Applications 10, 4 (01 Jul 2017), 1101--1111. https://doi.org/10.1007/s12083-016-0510-z
[14]
Meisam Yadollahzadeh-Tabari. 2021. An Stochastic Reward net Model for Performance Analysis of Network layer in Mobile Ad Hoc Network Under the Workload of Misbehvaior Nodes. Wireless Personal Communications 118, 2 (2021), 1087--1109. https://doi.org/10.1007/s11277-020-08060-0
[15]
Han Yu, Zhiqi Shen, Chunyan Miao, Cyril Leung, and Dusit Niyato. 2010. A Survey of Trust and Reputation Management Systems in Wireless Communications. Proc. IEEE 98, 10 (2010), 1755--1772. https://doi.org/10.1109/JPROC.2010.2059690

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DIVANet '21: Proceedings of the 11th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications
November 2021
82 pages
ISBN:9781450390811
DOI:10.1145/3479243
  • General Chair:
  • Mirela Notare,
  • Program Chair:
  • Peng Sun
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 November 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AODV
  2. MANET
  3. NS-3
  4. black hole attack
  5. indirect trust
  6. trust-based routing

Qualifiers

  • Research-article

Conference

MSWiM '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 70 of 308 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media