Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 8
Page No. 1382 - 1388

Avoidance of Blackhole Attack Using Enhanced OLSR with ABHA Algorithm

Authors : T. Manikandan, N. Kamaraj, S. Rakeshkumar and J. Gautam

References

Abdalla, A.M., I.A. Saroit, A. Kotb and A.H. Afsari, 2011. Misbehavior nodes detection and isolation for MANETs OLSR protocol. Procedia Comput. Sci., 3: 115-121.
CrossRef  |  Direct Link  |  

Asokan, N. and P. Ginzboorg, 2000. Key agreement in ad hoc networks. Comput. Commun., 23: 1627-1637.
CrossRef  |  

Augustine, A. and M. James, 2015. Detection and isolation of black hole node in MANET. Int. J. Curr. Eng. Technol., 5: 2347-5161.
Direct Link  |  

Awerbuch, B., D. Holmer, C.N. Rotaru and H. Rubens, 2002. An on-demand secure routing protocol resilient to byzantine failures. Proceedings of the 1st ACM Workshop on Wireless Security, September 28, 2002, ACM, New York, USA., ISBN:1-58113-585-8, pp: 21-30.

Cai, J., P. Yi, J. Chen, Z. Wang and N. Liu, 2010. An adaptive approach to detecting black and gray hole attacks in ad hoc network. Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, April 20-23, 2010, IEEE, New York, USA., ISBN: 978-0-7695-4018-4, pp: 775-780.

Deng, H., W. Li and D.P. Agrawal, 2002. Routing security in wireless ad hoc networks. IEEE Commun. Mag., 40: 70-75.
CrossRef  |  Direct Link  |  

Djahel, S., F. Nait-Abdesselam and A. Khokhar, 2008. An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol. Proceedings of the IEEE International Conference on Communications, May 19-23, 2008, Beijing, pp: 2780-2785.

Hu, Y.C., A. Perrig and D.B. Johnson, 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11: 21-38.
CrossRef  |  

Marti, S., T.J. Giuli, K. Lai and M. Baker, 2000. Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 255-265.

Mohanapriya, M. and I. Krishnamurthi, 2014. Modified DSR protocol for detection and removal of selective black hole attack in MANET. Comput. Electr. Eng., 40: 530-538.
CrossRef  |  Direct Link  |  

Murty, M.S. and M.V. Das, 2011. Performance evaluation of MANET routing protocols using reference point group mobility and random waypoint models. Int. J. Ad Hoc Sens. Ubiquitous Comput., 2: 33-43.
Direct Link  |  

Perkins, C.E. and P. Bhagwat, 1994. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications, August 31-September 2, 1994, England, UK., pp: 234-244.

Perrig, A., R. Canetti, D. Song and J.D. Tygar, 2001. Efficient and secure source authentication for multicast. Proceedings of the Internet Society Network and Distributed System Security Symposium, February 23-26, 2001, San Diego, CA., USA., pp: 35-46.

Perrig, A., R. Canetti, J.D. Tygar and D. Song, 2000. Efficient authentication and signing of multicast streams over lossy channels. Proceedings of the IEEE Symposium on Security and Privacy, May 14-17, 2000, Berkeley, CA., USA., pp: 56-73.

Rahman, A.A. and S. Hailes, 1998. A distributed trust model. Proceedings of the 1997 Workshop on New Security Paradigms, September 23-26, 1997, ACM, New York, USA., ISBN:0-89791-986-6, pp: 48-60.

Ramya, V. and S. Mylsamy, 2016. Removal of malicious nodes launching blackhole attack in MANETs. Wireless Commun., 8: 6-10.
Direct Link  |  

Raza, I. and S.A. Hussain, 2008. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Comput. Commun., 31: 1796-1802.
CrossRef  |  Direct Link  |  

Repantis, T. and V. Kalogeraki, 2006. Decentralized trust management for ad-hoc peer-to-peer networks. Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-Hoc Computing, (MPAC 2006), New York, Pages: 6-.

Singh, Y. and S.K. Jena, 2011. Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks. In: Advances in Parallel Distributed Computing. Nagamalai, D. and E. Renault (Eds.). Springer Berlin Heidelberg, Heidelberg, Germany, ISBN: 978-3-642-24037-9, pp: 410-419.

Stajano, F. and R. Anderson, 2000. The resurrecting duckling: Security issues for Ad Hoc wireless networks. Proceedings of the 7th International Workshop on Security Protocols, April 19-21, 1999, Cambridge, UK., pp:172-194.

Su, M.Y., 2011. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comp. Commun., 34: 107-117.
CrossRef  |  Direct Link  |  

Vishnu, K. and A.J. Paul, 2010. Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks. Int. J. Comput. Appl., 1: 38-42.
Direct Link  |  

Weerasinghe, H. and H. Fu, 2008. Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation. Int. J. Software Eng. Appl., 2: 39-54.
Direct Link  |  

Zhang, D. and C.K. Yeo, 2011. Distributed court system for intrusion detection in mobile ad hoc networks. Comput. Secur., 30: 555-570.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved