An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks

The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attac...

Full description

Saved in:
Bibliographic Details
Main Authors: Mahmood, Baban Ahmed (Author), Majeed, Aso Ahmed (Author), Shakir, Ahmed Chalak (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2021-02-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02467 am a22003133u 4500
001 ijeecs23127_14660
042 |a dc 
100 1 0 |a Mahmood, Baban Ahmed  |e author 
100 1 0 |e contributor 
700 1 0 |a Majeed, Aso Ahmed  |e author 
700 1 0 |a Shakir, Ahmed Chalak  |e author 
245 0 0 |a An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks 
260 |b Institute of Advanced Engineering and Science,   |c 2021-02-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23127 
520 |a The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol. 
540 |a Copyright (c) 2021 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a Black hole attacks; Reactive routing; Routing in MANETs; Security of routing in MANETs 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 21, No 2: February 2021; 1193-1200 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v21.i2 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23127/14660 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/23127/14660  |z Get fulltext