Zone-Based Hierarchical Link State for Detecting Malicious Node and Black Hole Attack Detection for Mobile Ad-hoc Networks

K. Thamizhmaran*, T. Priyanka**
* Department of Electronics and Communications Engineering, Government College of Engineering, Bodinayakkanur, Theni, India.
** Department of Electrical Communication Engineering, Annamalai University, Chidambaram, Tamil Nadu, India.
Periodicity:July - December'2022
DOI : https://doi.org/10.26634/jwcn.11.1.18949

Abstract

One of the most common types of network attacks involves non-forwardable bandwidth nodes that pretend to be intermediate nodes on the route to certain destinations and drop every packet that subsequently passes through it. This paper proposes attacks through black holes as an analysis method for detecting malicious nodes in Mobile Ad-hoc Networks (MANET). Because the mechanism and protocol are collaborative, it can confidently analyse and identify malicious hosts. To test the effectiveness of this approach, it uses a hybrid Hierarchical Link State routing protocol based on Modified-ZoneBased Hierarchical Link State Routing Protocol (M-ZHLS) in Network Simulations 2 (NS2) with mobile nodes. As the mobility rate changes and the topology size changes, it can be seen that the detection rate of black holes and malicious nodes is extremely high, the average delay is reduced, and the packet delivery rate is increased compared to the Zone-Based Hierarchical Link State Routing Protocol (ZHLS).

Keywords

MANET, Black Hole, Hybrid Protocol, ZHLS, M-ZHLS.

How to Cite this Article?

Thamizhmaran, K., and Priyanka, T. (2022). Zone-Based Hierarchical Link State for Detecting Malicious Node and Black Hole Attack Detection for Mobile Ad-hoc Networks. i-manager’s Journal on Wireless Communication Networks, 11(1), 1-8. https://doi.org/10.26634/jwcn.11.1.18949

References

[1]. Ad hoc On-Demand Distance Vector Routing. (n.d). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Ad_hoc_On-Demand_Distance_Vector_Routing#
[2]. Bhalaji, N., Banerjee, S., & Shanmugam, A. (2008). A novel routing technique against packet dropping attack in adhoc networks. Journal of Computer Science, 4, 538-544.
[3]. Deswal, S., & Singh, S. (2010). Implementation of routing security aspects in AODV. International Journal of Computer Theory and Engineering, 2(1), 135-138.
[4]. Hamma, T., Katoh, T., Bista, B. B., & Takata, T. (2006, September). An efficient zhls routing protocol for mobile ad hoc networks. In 17th International Workshop on Database and Expert Systems Applications (DEXA'06), (pp. 66-70). IEEE. https://doi.org/10.1109/DEXA.2006.24
[5]. Krishnamoorthy, T., & Arivazhagan, A. D. (2015, January). Energy efficient routing protocol with ad hoc on-demand distance vector for MANET. In 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), (pp. 1-6). IEEE. https://doi.org/10.1109/ISCO.2015.7282309
[6]. Mohebi, A., Kamal, E., & Scott, S. (2013). Simulation and Analysis of AODV and DSR Routing Protocol under Black Hole Attack. International Journal of Modern Education & Computer Science, 5(10), 19-26. https://doi.org/10.5815/ijmecs.2013.10.03
[7]. Raj, P. N., & Swadas, P. B. (2009). Dpraodv: A dyanamic learning system against blackhole attack in aodv based manet. International Journal of Computer Science Issues, 2, 54-59. https://doi.org/10.48550/arXiv.0909.2371
[8]. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., & Nygard, K. E. (2003, June). Prevention of cooperative black hole attack in wireless ad hoc networks. In International Conference on Wireless Networks, 2003, 570-575.
[9]. Saini, A., & Kumar, H. (2010, March). Comparison between various black hole detection techniques in MANET. In National Conference on Computational Instrumentation, Chandigarh, India, (pp. 19-20).
[10]. Singh, R. K., Joshi, R., &Singhal, M. (2013). Analysis of security threats and vulnerabilities in mobile ad hoc network (Manet). International Journal of Computer Applications, 68(4),25-29.
[11]. Thamizhmaran, K., Mahto, R. S. K., &Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols in MANET. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 651-654.
[12]. Toh, C. K. (2002). Ad Hoc Mobile Wireless Networks: Protocols & Systems. 2nd Edition, Prentice Hall, Inc.
[13]. Yau, P. W., & Mitchell, C. J. (2003, October). Reputation methods for routing security for mobile ad hoc networks. In SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications, (pp. 130-137). IEEE. https://doi.org/10.1109/TIC.2003.1249106
[14]. Yu, C. W., Wu, T. K., Cheng, R. H., Yu, K. M., & Chang, S. C. (2009). A distributed and cooperative algorithm for the detection and elimination of multiple black hole nodes in ad hoc networks. IEICE Transactions on Communications, 92(2), 483-490. https://doi.org/10.1587/transcom.E92.B.483
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.