Mitigation of Black Hole Attack in Mobile Ad-Hoc Network Using Artificial Intelligence Technique
Keywords:
MANET, AODV routing protocol, GA (Genetic algorithm), NN (neural network).Abstract
This research has dealt with the detection and mitigation of black hole attack in MANET. Generally, the black hole attack can be easily deployed with an adversary. It is one of the known security threats in the network. Black hole occurs because of the malicious nodes that draw the data packet with the false route. In this research, AODV routing protocol is being used. Genetic algorithm for the optimization of the route from the source to the destination has been used with the neural network that detects and prevents the network from the black hole attack. The simulation has been carried out in MATLAB environment and the performance is being calculated with the number of parameters, like, Throughput, PDR, Delay and energy consumption.
References
- Tønnesen, A. (2004). Mobile ad-hoc networks. Courtesy of http://www. olsr. org/docs/wos3-olsr. pdf.
- Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad hoc networks, 2(1), 1-22.
- Subbaiah, K. V., & Naidu, M. M. (2010). Mobile Ad Hoc Network. Simulation, 1(04), 246-251.
- Royer, E. M., & Perkins, C. E. (2000). An implementation study of the AODV routing protocol. In Wireless Communications and Networking Confernce, 2000. WCNC. 2000 IEEE (Vol. 3, pp. 1003-1008). IEEE.
- Chakeres, I. D., & Belding-Royer, E. M. (2004, March). AODV routing protocol implementation design. In Distributed Computing Systems Workshops, 2004. Proceedings. 24th International Conference on (pp. 698-703). IEEE.
- Royer, E. M., & Perkins, C. E. (2000). An implementation study of the AODV routing protocol. In Wireless Communications and Networking Confernce, 2000. WCNC. 2000 IEEE (Vol. 3, pp. 1003-1008). IEEE.
- Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2016). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Networks, 22(5), 1505-1511.
- Abdelshafy, M. A., & King, P. J. (2016, January). Resisting blackhole attacks on MANETs. In Consumer Communications & Networking Conference (CCNC), 2016 13th IEEE Annual(pp. 1048-1053). IEEE.
- Biswas, S., Nag, T., & Neogy, S. (2014, February). Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In Applications and Innovations in Mobile Computing (AIMoC), 2014 (pp. 157-164). IEEE.
- Yen, Y. S., Chan, Y. K., Chao, H. C., & Park, J. H. (2008). A genetic algorithm for energy-efficient based multicast routing on MANETs. Computer Communications, 31(10), 2632-2641.
- Sahin, C. S., Urrea, E., Uyar, M. U., Conner, M., Hokelek, I., Conner, M., ... & Pizzo, C. (2008, July). Genetic algorithms for self-spreading nodes in MANETs. In Proceedings of the 10th annual conference on Genetic and evolutionary computation(pp. 1141-1142). ACM.
- Sahin, C. S., Urrea, E., Uyar, M. U., Conner, M., Hokelek, I., Conner, M., ... & Pizzo, C. (2008, July). Genetic algorithms for self-spreading nodes in MANETs. In Proceedings of the 10th annual conference on Genetic and evolutionary computation(pp. 1141-1142). ACM.
- Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless communications, 14(5).
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.