An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks
The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attac...
Saved in:
Main Authors: | , , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2021-02-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02467 am a22003133u 4500 | ||
---|---|---|---|
001 | ijeecs23127_14660 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Mahmood, Baban Ahmed |e author |
100 | 1 | 0 | |e contributor |
700 | 1 | 0 | |a Majeed, Aso Ahmed |e author |
700 | 1 | 0 | |a Shakir, Ahmed Chalak |e author |
245 | 0 | 0 | |a An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks |
260 | |b Institute of Advanced Engineering and Science, |c 2021-02-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23127 | ||
520 | |a The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol. | ||
540 | |a Copyright (c) 2021 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc/4.0 | ||
546 | |a eng | ||
690 | |||
690 | |a Black hole attacks; Reactive routing; Routing in MANETs; Security of routing in MANETs | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 21, No 2: February 2021; 1193-1200 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v21.i2 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23127/14660 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23127/14660 |z Get fulltext |