![]() Gurung S, Chauhan S (2017) “Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET.” Wireless Networks. ![]() ![]() “Modelling and verifying the AODV routing protocol.” Distrib Comput 29 (4):279–315. Glabbeek R van, Höfner P, Portmann M, Wee Lum Tan. Gao H, Wu R, Cao M, Zhang C (2014) “Detection and defense technology of blackhole attacks in wireless sensor network.” Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) 8631 LNCS (PART 2):601–610. Int J Innov Comput Inf Control 8 (12):8231–8248 Ĭomputing Personal Engineering Management, Kuang-fu Road, Information Technology, and Sungai Besi Camp (2012) “A novel anomaly-network intrusion detection system”. ![]() (Elsevier)Ĭherkaoui B, Beni-hssane A (2017) “A clustering algorithm for detecting and handling black hole attack in vehicular ad hoc networks”. (Springer, London)Ĭhatterjee S, Swagatam Das (2014) “Ant colony optimization based enhanced dynamic source routing algorithm for mobile ad-hoc network.” Inf Sci. īrajevic I (2015) “Crossover-based artificial bee colony algorithm for constrained optimization problems.” Neural Comput Appl 26 (7):1587–1601. īica I, Naccache D, Simion E (2015) “Innovative security solutions for information technology and communications: 8th International Conference, SECITC 2015 Bucharest, Romania, June 11–12, 2015 Revised Selected Papers.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9522:III. (Elsevier)īansal JC, Sharma H, Jadon SS (2013) Artificial bee colony algorithm: a survey.” Int J Adv Intell Paradig 5(1/2):123. īaadache A, Belmehdi A (2014) “Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks.” Comput Netw 73:173–184. Network Security 4(3):328–339Īrdakani S, Pourroostaei J, Padget, Marina De Vos (2016) “US CR” Ad Hoc Networks. The above-mentioned factors led to the optimization of throughput.Ībraham A, Grosan C, Martin-vide C (2007) “Evolutionary design of intrusion detection programs”. Furthermore, thanks to the accuracy improvement in detecting black hole, lack of many conditions for RREQ and RREP and quick routing detection process, the delay in the proposed method was lower than other methods. Simulations results indicated that the percentage of the delivered data packets by the proposed algorithm is higher than that of Intrusion Detection System (IDS) algorithm. The method proposed in this paper was able to improve traffic load in the network, identify a short and secure route, detect a number of malicious nodes and optimize the criteria of packet deliver rate, throughput and routing overhead. Then, they are removed from routing tables of nodes via sending an RREP message. According to the proposed method, malicious nodes in a network are detected through sending forged route request (RREQ) and route reply (RREP) routing packets which include the address of unreal destination node. In this paper, a routing algorithm is proposed based on sending forged packets so as to enhance the accuracy of detecting and removing malicious nodes. Hence, rather than delivering them to the next node, the malicious nodes discard data packets. Malicious nodes existing on the delivery route of packets change a secure route into an insecure route in these networks. Detecting and removing black hole attacks are considered to be one major routing security issue in mobile ad hoc networks (MANETs).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |