Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks

Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks

P. Subathra, S. Sivagurunathan
ISBN13: 9781466647077|ISBN10: 1466647078|EISBN13: 9781466647084
DOI: 10.4018/978-1-4666-4707-7.ch056
Cite Chapter Cite Chapter

MLA

Subathra, P., and S. Sivagurunathan. "Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks." Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2014, pp. 1127-1144. https://doi.org/10.4018/978-1-4666-4707-7.ch056

APA

Subathra, P. & Sivagurunathan, S. (2014). Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks. In I. Management Association (Ed.), Crisis Management: Concepts, Methodologies, Tools, and Applications (pp. 1127-1144). IGI Global. https://doi.org/10.4018/978-1-4666-4707-7.ch056

Chicago

Subathra, P., and S. Sivagurunathan. "Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks." In Crisis Management: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1127-1144. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4707-7.ch056

Export Reference

Mendeley
Favorite

Abstract

A Mobile Ad hoc Network (MANET) is a collection of wireless nodes communicating over multi-hop paths without any infrastructure. Nodes must cooperate to provide necessary network functionalities. The security in routing protocols like Dynamic Source Routing (DSR) can be compromised by a “Black Hole” attack. Here, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops them, leading to performance degradation. The situation becomes worse when two or more nodes cooperate and perform the “Cooperative black hole” attack. This chapter proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating the attacking nodes. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio, and false negative probability in comparison with trust and probe based schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.