Fig 6 - uploaded by Reza Fotohi
Content may be subject to copyright.
Black hole attack in AODV  

Black hole attack in AODV  

Source publication
Article
Full-text available
Mobile ad hoc networks are regarded as a group of networks consisted of wireless systems which developing together a network with self-arrangement capability. no constant communication infrastructure and use central nodes to communicate with other nodes. Despite lots of advantages, these networks face severe security challenges, since their channel...

Context in source publication

Context 1
... node reply will be received by the requesting node before the reception of reply from actual node; hence a black hole and forged route is created. When this route is establishing, now it's up to the node whether to drop all the packets or forward it to the unknown address. The Solution how black hole node Proportional in the data routes varies. Fig. 6 shows how black hole Problems, here node "E" want to send data packets to destination node "D" and The initial process of route discovery. So if node "F" is a black hole node then it will claim that it has active route to the specified destination as soon as it receives RREQ packets. It will then send the response to node "E" before ...

Similar publications

Article
Full-text available
Mobile Ad-hoc Network " are wireless N\W which are characterized by the absence of fixed infrastructure. It is a dynamic network which consists a collection of wireless mobile nodes that communicate with each other without the use of any centralized authority (device). The devices belonging to the network must be able not only to transmit and recei...
Article
Full-text available
Ad Hoc network is a kind of wireless mobile network that does not depend on any fixed infrastructure. It has the characteristics of no center, self-organization, and high dynamic and limited energy. Therefore, Ad Hoc network has security risks. The Ad Hoc secure routing based on the trust model and the reference node strategy provides a secure envi...
Article
Full-text available
Many wireless protocols wait a small and random amount of time which is called jitter before sending a packet to avoid high contention and packet collision. Jitter has been already proposed for many routing protocols including AODV and LOADng. However, since they do not consider any link quality parameters or metrics (such as ETX) in routing, they...
Article
Full-text available
Mobile Ad-hoc Network" are wireless N\W which are characterized by the absence of fixed infrastructure. It is a dynamic network which consists a collection of wireless mobile nodes that communicate with each other without the use of any centralized authority (device). The devices belonging to the network must be able not only to transmit and receiv...
Article
Full-text available
For last few years, MobileAd hoc Networks (MANETs) have attracted a great interest in case of wireless and multimedia technologies. Infrastructure less nature of MANETs makes Quality of Service (QoS) provisioning very challenging and important research aspect. To find a QoS constrained route from source to destination, we should be able to effectiv...

Citations

... Therefore, designing an appropriate security measure in these networks seems essential. [1][2][3][4][5] In general, the operations in mobile networks can be categorized into key management, secure routing, authentication, denial of service attack prevention, and misbehavior and intrusion detection. Various routing protocols are used in MANETs. ...
Article
Full-text available
The wireless nature of mobile networks makes it vulnerable to all kinds of attacks. Therefore, designing a secure method for detecting intrusive nodes in this type of network seems necessary. Among the types of attacks on mobile ad‐hoc networks, the Grayhole attack is one of the most dangerous attacks. In this type of attack, a malicious node absorbs network traffic and then selectively deletes a number of received packets. In this paper, a method called RSA‐GRAY HOLE is used to detect and isolate the Grayhole attack. The proposed method not only detects the malicious node, but also disconnects it from the network and does not allow it to participate in the next routing process. The proposed method detects a malicious node in two steps; in the first step, it examines the validity of the nodes of a route to select a valid route. In the second step, the destination node detects the presence of malicious nodes in the route and after detecting the malicious nodes, disconnects them from the network. To demonstrate the efficiency of the proposed RSA‐GRAY HOLE method, the NS‐2 simulator was used and this method was compared with the DSR protocol under Grayhole attack. The simulation results show the superior performance of the proposed RSA‐GRAY HOLE method compared to the Grayhole DSR method in terms of throughput (23%), package delivery rate (26%), average delay (19%) and number of lost packets (20%).
... The global market for mobile phone advertising is growing and has reached more than 100 billion dollars. According to statistics, more than half the digital advertising incomes in 2016 is obtained through mobile phone [6]. Mobile phone marketing has a deep effect on the global business environment [20][21][22][23][24][25][26][27][28][29]. ...
Preprint
Full-text available
Nowadays, customers play a very important and vital role in the field of global economy. As a result, companies give special significance to the customers to survive and grow in the field of economic competition in the modern world and increase their relationship with the buyers of their products and services throughout their lifetime. Marketing growth through mobile phones has provided further motives for performing more researches in the field of customer behavior and attitude in mobile marketing. The goal of the current study is to analyze the effective factors on customer behavior in mobile marketing. The variables used in this study are perceived ease of use, individual knowledge, user’s mobile phone technology, customers’ negative attitudes, and customers’ positive attitudes. The current research is practical in terms of objective and is descriptive-analytic in terms of methodology. Data were gathered by distributing a questionnaire among 284 students of Tehran University. Data were analyzed by structural equation modeling using Lisrel and Expert Choice software. Test results showed that ease of use, individual knowledge, mobile phone technology, positive attitude, and negative attitude variables have a meaningful effect on customer behavior in mobile marketing. The confirmation of all the assumptions of the research supports the importance of the customer behavior analysis in mobile phone services.
... The Time-Slot Distribution Algorithm for Children (TSDAC) of each tree has also been proposed which can help determine optimal time slot for child nodes and reduce delay performance of the network. According to simulation and accurate theoretical analysis of the proposed design, the evaluation results suggest that UBA can improve measurement information by 25% and reduce delay by 14%-18% over the same lifetime compared to EASDC and DAS [3]. ...
... Algorithm Performance Clustering Type Table Advantages Disadvantages / Limitations [3] Hierarchical clustering method with a scheduling program to maximize data collection Tree (hierarchical) ...
Preprint
Cluster-based routing in Mobile Ad-Hoc Networks is considered one of the convenient methods of routing. The existence of Cluster Head (CH) in a group of nodes for data forwarding improves the performance of routing in terms of routing overhead and power consumption. In this paper, a clustering algorithm using hierarchical routing for mobile ad hoc networks is proposed. In the proposed method, first, clusters are formed by the FLOC clustering method with low overlapping. Then, according to the most important network criteria, including hop count, noise ratio, distance, remaining energy, and link expiration time, head clusters are selected based on the weighting algorithm. To transfer data in the proposed method, two types of communication are used, e.g., inter-cluster communication and intra-cluster communication in which the shortest path to the target cluster is selected. The proposed P-METHOD technique is based on hierarchy and clustering as well as using a weighted algorithm that reduces delay in data transmission on the network. Moreover, P-METHOD is evaluated here via extensive simulations carried out in NS-2. The simulation results indicate that the MANET network performance metrics are improved in terms of average throughput, Packet Delivery Ratio (PDR), delay, residual energy, and lifetime.
... Despite the full application of this issue, its practical implementation is a little difficult, because the most fundamental challenge of this issue is that this belongs to the NP-complete set [2][3][4][5][6]33]. Therefore, with an increase in the problem scale, achieving a practical solution for the problem in a suitable time could be difficult or even impossible. ...
Preprint
Nowadays, the wasting of resources is one of the fundamental challenges of the industrial sector. The rectangle packing problem can be very effective in this context. Practical applications of this issue in the timing and designing of the industries and businesses are very remarkable. The purpose of this issue is to arrange a set of rectangles with specific dimensions in a rectangular page with a specific width and unlimited height without overlapping. The fundamental challenge in this issue is that this is an NP-complete issue. Therefore, it is difficult to achieve the best arrangement, which has the maximum rate of resource utilization and also has a linear running time. Many algorithms have been presented to estimate a practical solution for this issue. In the past decades, the best fit method has been one of the most useful methods for this purpose. This study presents a combinatorial algorithm based on two algorithms, including the lowest front-line strategy and the best-fit algorithm. The running results indicate that the suggested algorithm performs well, despite its simplicity. The time complexity of the suggested algorithm is O(nm), in which n is the number of input rectangles and m is the number of the created front lines.
... Achieved results with altered parameters determine that the suggested routing protocol has better performance than traditional routing protocols regarding to efficiency, packet delivery rate, and average end to end delay. Consequently, total performance of the network enhances using the suggested routing method [5]. ...
... Table 1, summarizes the investigated efforts to design multi-path routing for IoT. Paying no attention to the remaining energy and lifetime of the node [5] Routing in the internet of things based on the AOMDV protocol ...
... The average difference of information is calculated as follows. (5) If the value of the measurement difference is high, the node is faulty. When the measurement difference between a node and its neighbors is lower in a route, this route is better. ...
Preprint
Full-text available
Internet of things (IoT) is a network of smart things. This indicates the ability of these physical things to transfer information with other physical things. The characteristics of these networks, such as topology dynamicity and energy constraint, challenges the routing problem in these networks. Previous routing methods could not achieve the required performance in this type of network. Therefore, developers of this network designed and developed specific methods in order to satisfy the requirements of these networks. One of the routing methods is utilization of multi-path protocols which send data to its destination using routes with separate links. One of such protocols is AOMDV routing protocol. In this paper, this method is improved using gray system theory which chooses the best paths used for separate routes to send packets. To do this, AOMDV packet format is altered and some fields are added to it so that energy criteria, link expiration time, and signal to noise ratio can also be considered while selecting the best route. The proposed method named RMPGST-IoT is introduced which chooses the routes with highest rank for concurrent transmission of data, using a specific routine based on the gray system theory. In order to evaluate and report the results, the proposed RMPGST-IoT method is compared to the ERGID and ADRM-IoT approaches with regard to throughput, packet receiving rate, packet loss rate, average remaining energy, and network lifetime. The results demonstrate the superior performance of the proposed RMPGST-IoT compared to the ERGID and ADRM-IoT approaches.
... The P-Method for against network layer attacks in MANETs, based on hop count and Round-Trip Time, is proposed in [15]. The proposed algorithm is implemented to increase the security of the AODV, under different scenarios. ...
Article
Full-text available
Wireless Sensor Networks (WSNs) have become extremely popular for sensing, collecting, and transmitting data across different environments. In particular, the AODV protocol is widely used to improve the behavior of WSNs in various applications. A bottleneck in the protocol's performance is the amount of data that need to be moved between different nodes. This bottleneck becomes evident in applications based on multimedia contents, such as images or videos, in which huge chunks of data need to be delivered over long distances. In this article, we propose a new method to enhance the performance of the AODV protocol. Simulation results show that the proposed method improves the performance of the AODV protocol for image-based applications. The technique increases the quality of the delivered images, extends the network's lifetime, and reduces the delay and the network overhead associated with providing such images. INDEX TERMS AODV, routing protocols, images transmission, wireless video sensor networks.
... DR is calculated by Eq. (7). Table 9 lists the parameters used for DR [22][23][24][25][26][27]. Table 9 The parameters specified for DR ...
Article
Full-text available
The internet of things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present services. Because of wide openness, relatively high processing power, and wide distribution of IoT things, they are ideal for attacks of the gray hole. In the gray hole attack, the attacker fakes itself as the shortest path to the destination that is a thing here. This causes the routing packets not to reach the destination. The proposed method is based on the AODV routing protocol and is presented under the MTISS-IoT name which means for the reduction of gray hole attacks using check node information. In this paper, a hybrid approach is proposed based on cryptographic authentication. The proposed approach consists of four phases, such as the verifying node trust in the IoT, testing the routes, gray hole attack discovery, and the malicious attack elimination process in MTISS-IoT. The method is evaluated here via extensive simulations carried out in the NS-3 environment. The experimental results of four scenarios demonstrated that the MTISS-IoT method can achieve a false positive rate of 14.104%, a false negative rate of 17.49%, and a detection rate of 94.5% when gray hole attack was launched.
... FN It is the rate of the malicious node to total normal nodes that were mistakenly marked as a normal node [20][21][22][23][24][25]. Equation (3) demonstrates FN calculation. ...
Article
Full-text available
Internet of Things (IoTs) is a new concept in computer science that connects the objects with limited resources to unreliable internet through different technologies. The fundamental components of IoT (e.g., the wireless sensor networks and the internet) have an unsecured foundation that leads to different vulnerabilities such as vulnerability against a blackhole attack. In a blackhole attack, the attacker fakes itself as the shortest path to the destination, which is a node here. This causes the routing packets to not reach the destination. In this study, we offer a novel intelligent agent-based strategy using the hello packet table (NIASHPT) to deal with these problems by discovering the blackhole attacks. The proposed NIASHPT method provides an intrusion detection system scheme to defend against blackhole attacks and reduce or eliminate such attacks. This method consists of three phases: In the first phase, each node listens to its adjacent nodes and then applies a pre-routing process. In the stages of adjacent node listening and pre-routing, we attempt to find the blackhole attacks. In the second phase of the proposed method, the malicious nodes are detected and separated from the IoT network to avoid emerging attacks along the route from the source to the destination. In the third phase, the selected route from the source to the destination is checked. The method is evaluated here via extensive simulations carried out in the NS-3 environment. The experimental results of four scenarios demonstrated that the NIASHPT method can achieve a false positive rate of 19.453%, a false negative rate of 22.19%, a detection rate of 80.5%, a PDR of 89.56%, and a packet loss rate of 10.04% in the case of launching a blackhole attack.
... The DoSA is one of the WSNs' power exhausting attacks as a special denial of service (DoS) trying to maintain the sensor nodes awake to use further energy of the controlled power supply. In addition, the energy consumption of the sensors increases in DoSA by preventing the sensor from sleeping [3,4]. The attacker node can transfer dummy data packets to authorized nodes, which causes an unnecessary transmission as well as increasing the energy consumption. ...
Article
Full-text available
Wireless sensor networks (WSNs) contain numerous nodes that their main goals are to monitor and control environments. Also, sensor nodes distribute based on network usage. One of the most significant issues in this type of network is the energy consumption of sensor nodes. In fixed-sink networks, nodes which are near the sink act as an interface to transfer data of other nodes to sink. This causes the energy consumption of sensors reduces rapidly. Therefore, the lifetime of the network declines. Sensor nodes owing to their weaknesses are susceptible to several threats, one of which is denial-of-sleep attack (DoSA) threatening WSN. Hence, the DoSA refers to the energy loss in these nodes by maintaining the nodes from entering energy-saving and sleep mode. In this paper, a hybrid approach is proposed based on mobile sink, firefly algorithm based on leach, and Hopfield neural network (WSN-FAHN). Thus, mobile sink is applied to both improve energy consumption and increase network lifetime. Firefly algorithm is proposed to cluster nodes and authenticate in two levels to prevent from DoSA. In addition, Hopfield neural network detects the direction route of the sink movement to send data of CH. Furthermore, here WSN-FAHN technique is assessed through wide simulations performed in the NS-2 environment. The WSN-FAHN procedure superiority is demonstrated by simulation outcomes in comparison with contemporary schemes based on performance metrics like packet delivery ratio (PDR), average throughput, detection ratio, and network lifetime while decreasing the average residual energy.
... This kind of attack deletes some or the entire recipient packs instead of sending them and consequently it makes the result of packet delivery rate low. Black hole attack is divided into two groups: single black hole attack is applied via one of the existence nodes in the network and total black hole attack that corporates together for an attack more than one node [4]. The node, which executes the black hole attack, waits to receive a RREQ. ...
Preprint
Full-text available
MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.