Detection and Prevention of Black Hole and Wormhole Attacks in MANET Using Optimized Secure Routing Algorithms

Authors

  • Ms. Bhawana Devi, Dr. Nidhi Mishra

Keywords:

Mobile Ad Hoc Networks, MANET Security, Black Hole Attack, Wormhole Attack, Secure Routing Algorithm, Intrusion Detection, Trust Management.

Abstract

Mobile Ad Hoc Networks have emerged as one of the most important wireless communication technologies because of their ability to establish communication without fixed infrastructure or centralized administration. MANETs consist of mobile wireless nodes that communicate dynamically through multi-hop wireless communication links. These networks are highly suitable for military communication systems, disaster management operations, emergency rescue services, intelligent transportation systems, healthcare monitoring environments, industrial automation applications, and temporary communication infrastructures. The decentralized nature, flexible topology, and self-organizing characteristics of MANETs provide several advantages in dynamic communication environments where conventional communication infrastructure is unavailable or difficult to establish. However, the absence of centralized management and the open wireless communication medium expose MANETs to various security threats and routing vulnerabilities.

Among different security threats affecting MANETs, black hole attacks and wormhole attacks are considered highly destructive because they directly target routing operations and packet forwarding mechanisms. In black hole attacks, malicious nodes advertise false routing information and attract network traffic before intentionally dropping communication packets. Wormhole attacks create unauthorized communication tunnels between malicious nodes and manipulate routing paths by forwarding packets through fake communication links. These attacks significantly reduce Packet Delivery Ratio, communication reliability, throughput, network stability, and Quality of Service while increasing communication delay and routing overhead. Existing routing protocols including AODV, DSR, OLSR, and DSDV often fail to detect and prevent sophisticated routing attacks effectively under dynamic network conditions.

References

Perkins, C. E. and Royer, E. M. (1999). Ad hoc on-demand distance vector routing. Proceedings of IEEE WMCSA, pp.90-100.

Johnson, D. B. and Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing, 353, pp.153-181.

Clausen, T. and Jacquet, P. (2003). Optimized link state routing protocol. RFC 3626, IETF.

Hu, Y. C., Perrig, A. and Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks. Proceedings of IEEE INFOCOM, pp.1976-1986.

Karlof, C. and Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), pp.293-315.

Deng, H., Li, W. and Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10), pp.70-75.

Papadimitratos, P. and Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. Proceedings of CNDS, pp.27-31.

Zhang, Y., Lee, W. and Huang, Y. A. (2003). Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5), pp.545-556.

Sen, J. (2010). A survey on wireless sensor network security. International Journal of Communication Networks and Information Security, 1(2), pp.55-78.

Pathan, A. S. K. (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC Press.

Perrig, A., Stankovic, J. and Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), pp.53-57.

Ganeriwal, S. and Srivastava, M. B. (2004). Reputation-based framework for high integrity sensor networks. Proceedings of ACM SASN, pp.66-77.

Yu, Z. and Cho, B. H. (2006). A trust model for wireless sensor networks. Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, pp.1-10.

Xiao, B., Yu, B. and Gao, C. (2006). CHEMAS: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11), pp.1218-1230.

Mishra, A., Nadkarni, K. and Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11(1), pp.48-60.

Wang, Y., Attebury, G. and Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2), pp.2-23.

Wood, A. D. and Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), pp.54-62.

Roman, R., Zhou, J. and Lopez, J. (2006). Applying intrusion detection systems to wireless sensor networks. IEEE Consumer Communications and Networking Conference, pp.640-644.

Sharma, S. and Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. ICTACT Journal on Communication Technology, 1(2), pp.42-45.

Singh, S. K., Singh, M. P. and Singh, D. K. (2010). Routing protocols in wireless sensor networks. International Journal of Computer Science and Engineering Survey, 1(2), pp.63-83.

Jain, A. and Tokekar, V. (2012). Trust based secure routing in wireless sensor networks. International Journal of Engineering Research and Applications, 2(3), pp.246-251.

Liu, D. and Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. Proceedings of ACM CCS, pp.52-61.

Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), pp.393-422.

Al-Karaki, J. N. and Kamal, A. E. (2004). Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11(6), pp.6-28.

Akkaya, K. and Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), pp.325-349.

Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D. and Anderson, J. (2002). Wireless sensor networks for habitat monitoring. Proceedings of ACM WSNA, pp.88-97.

Conti, M., Passarella, A. and Erol-Kantarci, M. (2018). The Internet of People, Things and Services. Elsevier.

Perkins, C. (2001). Ad hoc networking. Addison-Wesley.

Stallings, W. (2017). Wireless communications and networks. Pearson Education.

Tanenbaum, A. S. and Wetherall, D. J. (2011). Computer networks. Pearson Education.

Downloads

How to Cite

Ms. Bhawana Devi, Dr. Nidhi Mishra. (2023). Detection and Prevention of Black Hole and Wormhole Attacks in MANET Using Optimized Secure Routing Algorithms. International Journal of Engineering Science & Humanities, 13(1), 128–142. Retrieved from https://www.ijesh.com/j/article/view/884

Similar Articles

<< < 21 22 23 24 25 26 

You may also start an advanced similarity search for this article.