IJISC
  • Indexed in

  • Latest News

    December 30, 2020
    Volume 9, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 25, 2020
    Associate Professor dr. Pradeep Kumar SINGH from Jaypee University of Information Technology, India, become Deputy Editor-in-Chief of IJISC
    June 22, 2020
    Volume 9, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET


    Author(s): SAIED, Jafarian; MEHDI, Sadeghzadeh

    Quick view | Full article | Citations | Views: 964


    Author(s) keywords: , , , ,


    Reference keywords:


    Abstract:

    Nowadays mobile ad hoc networks (MANETs) are much more popular and efficient than before. Therefore, the concept of security is of high importance in such networks. Security has become one of the most important issues in scientific debates in grounds of information exchange. Existence of destructive attacks is one of the problems that have challenged security in case networks. Black hole attack is one of the attacks in this case. In this research a new algorithm is introduced in order to identify destructive nodes of black holes in routing protocol of case networks. Through sending empty packets to efficient nodes that are located in the network, and considering the amount of nodes' input and output, the new algorithm, has tended to identify destructive nodes. The proposed method in comparison to similar methods is much more efficient and less complex. The structure of this algorithm has the capability to be implemented in a parallel way within several processors.



    References:

    [1]. S. Makki, N. Pissinou, and H. Huang: The Security issues in the ad-hoc on demand distance vector routing protocol (AODV), pp. 427-432, International Conference on Security and Management (SAM’04), 2004.

    [2]. N. Komninos, D.Vergados, and C. Douligeris: Detecting Unauthorized and Compromised Nodes in Mobile Ad-Hoc Networks, pp. 289-298, Journal in Ad Hoc Networks, Elsevier, 2007.

    [3]. C.E. Perkins, and S. Das: Ad hoc on-demand distance vector (AODV) routing, IETF Internet Draft, MANET working group, 2004.
    [4]. G.Manel, N.Zapata, and N. Asokan: Securing Ad-hoc Routing Protocol, ACM Workshop on Wireless Security, 2002.

    [5]. D. Ian, and M. Elizabeth, AODV Routing Protocol Implementation Design, International Conference on Distributed Computing Systems Workshops (ICDCSW’04), 2004.

    [6]. su.Ming-Yang: Prevention of Selective Black Hole Attacks on Mobile ad Hoc Networks Through Intrusion Detection Systems, Elsevier, 2010.

    [7]. A.Y. Fantahun, and X.Z. Cheng, Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection. International Conference on Future Computer and Communication, 2010.

    [8]. G. Ermanno, M. Giacomo, C. Girolamo, M. Agatino, and B. Ferdinando: A Black-hole Resilient Ad-hoc on demand distance Vector Outing for Tactical Communications, BRAVO, IEEE International Black Sea Conference on Communications and Networking (Black Sea Com), 2014.



    Additional Information

    Article Title: A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET
    Author(s): SAIED, Jafarian; MEHDI, Sadeghzadeh
    Date of Publication: 2015-06-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2015.01.04
    Issue: Volume 4, Issue 1, Year 2015
    Section: Studies and Analysis of Cybercrime Phenomenon
    Page Range: 27-32 (6 pages)



    Copyright ©2012-2021
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.