Mitigation of Black Hole Attack in Mobile Ad-Hoc Network Using Artificial Intelligence Technique

Authors

  • Rajni Garg  Computer Engineering Department, Guru Nanak College, Moga, Punjab, India
  • Vikas Mongia  Computer Engineering Department, Guru Nanak College, Moga, Punjab, India

Keywords:

MANET, AODV routing protocol, GA (Genetic algorithm), NN (neural network).

Abstract

This research has dealt with the detection and mitigation of black hole attack in MANET. Generally, the black hole attack can be easily deployed with an adversary. It is one of the known security threats in the network. Black hole occurs because of the malicious nodes that draw the data packet with the false route. In this research, AODV routing protocol is being used. Genetic algorithm for the optimization of the route from the source to the destination has been used with the neural network that detects and prevents the network from the black hole attack. The simulation has been carried out in MATLAB environment and the performance is being calculated with the number of parameters, like, Throughput, PDR, Delay and energy consumption.

References

  1. Tønnesen, A. (2004). Mobile ad-hoc networks. Courtesy of http://www. olsr. org/docs/wos3-olsr. pdf.
  2. Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad hoc networks, 2(1), 1-22.
  3. Subbaiah, K. V., & Naidu, M. M. (2010). Mobile Ad Hoc Network. Simulation, 1(04), 246-251.
  4. Royer, E. M., & Perkins, C. E. (2000). An implementation study of the AODV routing protocol. In Wireless Communications and Networking Confernce, 2000. WCNC. 2000 IEEE (Vol. 3, pp. 1003-1008). IEEE.
  5. Chakeres, I. D., & Belding-Royer, E. M. (2004, March). AODV routing protocol implementation design. In Distributed Computing Systems Workshops, 2004. Proceedings. 24th International Conference on (pp. 698-703). IEEE.
  6. Royer, E. M., & Perkins, C. E. (2000). An implementation study of the AODV routing protocol. In Wireless Communications and Networking Confernce, 2000. WCNC. 2000 IEEE (Vol. 3, pp. 1003-1008). IEEE.
  7. Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2016). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Networks, 22(5), 1505-1511.
  8. Abdelshafy, M. A., & King, P. J. (2016, January). Resisting blackhole attacks on MANETs. In Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual(pp. 1048-1053). IEEE.
  9. Biswas, S., Nag, T., & Neogy, S. (2014, February). Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In Applications and Innovations in Mobile Computing (AIMoC), 2014 (pp. 157-164). IEEE.
  10. Yen, Y. S., Chan, Y. K., Chao, H. C., & Park, J. H. (2008). A genetic algorithm for energy-efficient based multicast routing on MANETs. Computer Communications, 31(10), 2632-2641.
  11. Sahin, C. S., Urrea, E., Uyar, M. U., Conner, M., Hokelek, I., Conner, M., ... & Pizzo, C. (2008, July). Genetic algorithms for self-spreading nodes in MANETs. In Proceedings of the 10th annual conference on Genetic and evolutionary computation(pp. 1141-1142). ACM.
  12. Sahin, C. S., Urrea, E., Uyar, M. U., Conner, M., Hokelek, I., Conner, M., ... & Pizzo, C. (2008, July). Genetic algorithms for self-spreading nodes in MANETs. In Proceedings of the 10th annual conference on Genetic and evolutionary computation(pp. 1141-1142). ACM.
  13. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless communications, 14(5).

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Rajni Garg, Vikas Mongia, " Mitigation of Black Hole Attack in Mobile Ad-Hoc Network Using Artificial Intelligence Technique, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1168-1174, January-February-2018.