Open Access   Article Go Back

A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV

Amit Saraf1 , Megha Singh2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-12 , Page no. 130-135, Dec-2015

Online published on Dec 31, 2015

Copyright © Amit Saraf , Megha Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amit Saraf , Megha Singh, “A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.130-135, 2015.

MLA Style Citation: Amit Saraf , Megha Singh "A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV." International Journal of Computer Sciences and Engineering 3.12 (2015): 130-135.

APA Style Citation: Amit Saraf , Megha Singh, (2015). A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV. International Journal of Computer Sciences and Engineering, 3(12), 130-135.

BibTex Style Citation:
@article{Saraf_2015,
author = {Amit Saraf , Megha Singh},
title = {A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2015},
volume = {3},
Issue = {12},
month = {12},
year = {2015},
issn = {2347-2693},
pages = {130-135},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=769},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=769
TI - A Trust Proxy Node (TPN) Based Black hole Attack Detection Mechanism in MANET Using AODV
T2 - International Journal of Computer Sciences and Engineering
AU - Amit Saraf , Megha Singh
PY - 2015
DA - 2015/12/31
PB - IJCSE, Indore, INDIA
SP - 130-135
IS - 12
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2491 2308 downloads 2260 downloads
  
  
           

Abstract

A mobile ad hoc network (MANET) is auto-configuring network without any infrastructure. It is temporary network created by, mobile nodes which are capable to communicating with each other without the use of network infrastructure. Ad hoc networks are vulnerable to many type of security attacks due to their open medium, dynamic topology, distributed co-operation. For successful data transfer nodes are depend on each other. To believe on the other node for wireless data transmission, consider as trust problem. Our aim in this review is to present schemes which are mainly focused on security based on trust value of node in MANET. This work proposes a approach for trust calculation based on Trust proxy node (TPN). The route discovery is achieved through a routing decision based on trust sequence certificate exchange by Trust proxy node (TPN). Trust proxy node (TPN) is an additional node having extra responsibility for trust calculation of Black hole node. Trust proxy node (TPN) will act as monitoring node for routing decision. After the trust value index is calculated the TPN node issues a certificate to every node in its network. To participate in routing the nodes must have two trust index (TI) certificates & can be consider as a reliable node by TPN. The directory of this certificate is maintained in a Trust Index (TI) Table. This TI table is shared with the server by this centralized TPN. This TPN will also monitors the behavior of nodes in a specific range continuously to avoid unwanted action.

Key-Words / Index Term

MANET, AODV, TPN(Trust proxy node), Milisious Node, Black Hole

References

[1] D He, C Chen, S Chen, J Bu & A B. Vasilakos, “ReTrust:Attack Resistant & Lightweight Trust for Sensor Network” in IEEE Transaction on IT in volume- 16/ No 4 Page No (623-632), July 2012.
[2] Z Min & Z Jiliu, “Cooperative Black Hole Attack Prevention for Mobile Ad Hoc Networks” in IEEE Transaction ISBN 978-0-7695- 3686 Page No(26-30),16-17 May 2009.
[3] S Ramaswamy, H Fu, M Sreekantaradhya, J Dixon & K Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks” in Department of Computer Science, IACC 258, Page No(1-7) March, 2008.
[4] K E Defrawy& G Tsudik, “Privacy-Preserving Location-Based OnDemand Routing in MANETs” in IEEE Transaction of selected Journal in communication, Volume 29 Issue 10, Page No(1926-1934), Dec. 2011.
[5] Xu Li, R Lu, X Liang, & X Shen, “Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks” in IEEE ICC, Nov.2011.
[6] E. A .Mary Anita & V. Vasudevan, “Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining” in IJCA (0975 – 8887) Volume 1 – No. 12, Page No (1-8), Jan 2010.
[7] P H. Yu and U W. Pooch, “Chapter on Security and Dynamic Encryption System in Mobile Ad-Hoc Network” in A&M University, Dept of CSE Texas, USA, ISBN 978-953-307-402-3 Page No(469-490), Jan 2011
[8] G. S. Mamatha& Dr. S. C. Sharma, “A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS” in IJCSS Volume 4, Issue 3, page No(275-284), July 2010.
[9] J Cal, P Yi, J Chen, Z Wang & N Liu, “An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network” in IEEE Proceedings, 1550-445X/10, 2010.
[10] R Karandikar, R K Khanuja, S Shukla, “Proposed solution to prevent Black Hole Attack in MANET” in IJRIM ,Vol 2, Issue 2, ISSN 2231- 4334, Page No(1-5), Feb 2012.
[11] H Weerasinghe and H Fu “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation” in IJCA, Volume 2 ,No 3 July, 2008.
[12] PoojaJaiswal& Dr. Rakesh Kumar “Prevention of Black Hole Attack in MANET” in IRACST, ISSN: 2250-3501 Voume.2, No5,Page No (599-606) October 2012.
[13] Sarita Choudhary & Kriti Sachdeva “Discovering a Secure Path in MANET by Avoiding Black/Gray Holes” in IJRTE ISSN: 2277-3878, Volume-1, Issue-3 Page No(1-6), August 2012.
[14] M S Ashraf & M Raheel, “RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks” in IJCSI, ISSN (Online): 1694-0814 Volume. 9, Issue 2, No 2, Page No (306-313),March 2012.