Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
CHEMAS: Identify suspect nodes in selective forwarding attacks
Journal of Parallel and Distributed Computing
Prevention of Blackhole Attack in MANET
AUSWIRELESS '07 Proceedings of the The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications
A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Computers and Electrical Engineering
SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack
CIS '09 Proceedings of the 2009 International Conference on Computational Intelligence and Security - Volume 02
Routing security scheme based on reputation evaluation in hierarchical ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Channel-aware detection of gray hole attacks in wireless mesh networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A Context Adaptive Intrusion Detection System for MANET
Computer Communications
Towards reliable self-clustering Mobile Ad Hoc Networks
Computers and Electrical Engineering
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Hi-index | 0.00 |
A black hole attack in ad hoc network refers to an attack by malicious nodes, which forcibly acquires the route from a source to destination by falsely advertising shortest hop count to reach the destination node. In this paper, we present a Modified Dynamic Source Routing Protocol (MDSR) to detect and prevent selective black hole attack. Selective black hole attack is a special kind of black hole attack where malicious nodes drop the data packets selectively. We proposed an Intrusion Detection System (IDS) where the IDS nodes are set in promiscuous mode only when required, to detect the abnormal difference in the number of data packets being forwarded by a node. When any anomaly is detected, the nearby IDS node broadcast the block message, informing all nodes on the network to cooperatively isolate the malicious node from the network. The proposed technique employs Glomosim to validate the effectiveness of proposed intrusion detection system.