Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

α
Ephantus G. Mwangi
Ephantus G. Mwangi
σ
Geoffrey Muchiri Muketha
Geoffrey Muchiri Muketha
ρ
Gabriel Ndung’u Kamau
Gabriel Ndung’u Kamau
α Murang'a University of Technology Murang'a University of Technology

Send Message

To: Author

Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

Article Fingerprint

ReserarchID

CSTNWS41C3F

Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3 Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackhole is a denial of service attack under active attacks. Blackhole nodes work in collaboration forming cooperative black hole attacks. The attacks drop or redirecting data packets on transit. Cooperative blackhole attacks are dangerous in operations where communication is critical. This paper proposes a Trust-Based Resilient Cooperative Bait Detection Technique (TB-RCBDT), an integration of the Resilient Cooperative Bait Detection Technique (RCBDT) and Optimized Trust-Based Dynamic Source Routing (OTB-DSR).

References

30 Cites in Article
  1. H Rutvij,J Jhaveri,P Sankita,C Jinwala (2012). A Novel Solution for Gray hole Attack in AODV Based MANETs.
  2. Azzedine Boukerche,Begumhan Turgut,Nevin Aydin,Mohammad Ahmad,Ladislau Bölöni,Damla Turgut (2011). Routing protocols in ad hoc networks: A survey.
  3. S Jeenat,A Tasnuva Securing AOMDV Protocol in Mobile Ad-hoc Network with Elliptic Curve Cryptography.
  4. R Sagar,P Chatur,B Nikhil (2016). AODV-Based Secure Routing Against Blackhole Attack in MANET.
  5. D Soufiene,N Farid,Z Zonghua (2011). Mitigating Packet Dropping Problem in Mobile Ad-hoc Networks: Proposals and Challenges.
  6. Mohamed Abdelshafy,Peter King (2016). Resisting blackhole attacks on MANETs.
  7. R Sukanesh,Eisha Edsor,M Aarthylakshmi (2016). Energy efficient malicious node detection scheme in wireless networks.
  8. Jaydip Sen,Sripad Koilakonda,Arijit Ukil (2011). A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks.
  9. Shabnam Sharma (2010). Prevention of Blackhole Attack over AODV and DSR MANET Routing Protocol.
  10. Ming-Yang Su,Kun-Lin Chiang,Wei-Cheng Liao (2010). Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks.
  11. Saurabh Gupta,Subrat Kar,S Dharmaraja (2011). BAAP: Blackhole attack avoidance protocol for wireless network.
  12. Himadri Saha,Debika Bhattacharyya,A Bandhyopadhyay,P Banerjee (2012). Two-Level Secure Re-routing (TSR) in Mobile Ad Hoc Networks.
  13. Amol Bhosle,T Thosar,S Mehatre (2012). Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET.
  14. Fidel Thachil,K Shet (2012). A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET.
  15. G Bindra (2012). Detection and Removal of Cooperative Blackhole and Gray hole Attacks in MANETs.
  16. A Ukey,M Chawla,V Singh (2013). I-2ACK: Preventing Routing Misbehavior in Mobile Ad-hoc Networks.
  17. Vani Hiremani,Manisha Jadhao (2013). Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET.
  18. V Gaikwad,L Ragha (2015). Security Agents for Detecting and Avoiding Cooperative Blackhole Attacks in MANET.
  19. Pradeep Dumne,Arati Manjaramkar (2016). Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs.
  20. P Emimajuliet,V Thirilogasundari (2016). Defending collaborative attacks in MANETs using Modified Cooperative Bait Detection Scheme.
  21. Géraud Allard,Pascale Minet,Dang-Quan Nguyen,Nirisha Shrestha (2006). Evaluation of the Energy Consumption in MANET.
  22. M Bheemalingaiah,M Naidu,D Rao (2017). Energy Aware Clustered Based Multipath Routing in Mobile Ad Hoc Networks.
  23. Lijuan Cao,Teresa Dahlberg,Yu Wang (2007). Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols.
  24. F Rango,F Guerriero,P Fazio (2012). Link-Stability and Energy-aware Routing Protocol in Distributed Wireless Networks.
  25. Ali Dorri,Seyed Kamel (2015). Security Challenges in Mobile Ad Hoc Networks: A Survey.
  26. Z Guo,B Malakooti (2007). Energy-Aware Proactive MANET Routing with Prediction on Energy Consumption.
  27. Asif Shabbir,Fayyaz Khalid,Syed Shaheed,Jalil Abbas,M Zia-Ul-Haq (2015). Security: A Core Issue in Mobile <i>Ad hoc</i> Networks.
  28. C-K Toh (2001). Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks.
  29. E Mwangi,G Muketha,G Kamau (2020). Design and Implementation of Resilient Cooperative Bait Detection Technique to Curb Cooperative Black Hole Attacks in MANETs Using DSR Protocol.
  30. E Mwangi,G Muketha,G Kamau Optimized Trust-Based DSR Protocol to Curb Cooperative Blackhole Attacks in MANETs Using NS-3.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Ephantus G. Mwangi. 2020. \u201cTrust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 20 (GJCST Volume 20 Issue E3): .

Download Citation

Issue Cover
GJCST Volume 20 Issue E3
Pg. 39- 54
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: C.2.0
Version of record

v1.2

Issue date

December 5, 2020

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 4223
Total Downloads: 1015
2026 Trends
Related Research

Published Article

The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackhole is a denial of service attack under active attacks. Blackhole nodes work in collaboration forming cooperative black hole attacks. The attacks drop or redirecting data packets on transit. Cooperative blackhole attacks are dangerous in operations where communication is critical. This paper proposes a Trust-Based Resilient Cooperative Bait Detection Technique (TB-RCBDT), an integration of the Resilient Cooperative Bait Detection Technique (RCBDT) and Optimized Trust-Based Dynamic Source Routing (OTB-DSR).

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

Ephantus G. Mwangi
Ephantus G. Mwangi Murang'a University of Technology
Geoffrey Muchiri Muketha
Geoffrey Muchiri Muketha
Gabriel Ndung’u Kamau
Gabriel Ndung’u Kamau

Research Journals