Open Access Open Access  Restricted Access Subscription Access

Prevention of Blackhole Attack in MANET Using Certificateless Signature Scheme


Affiliations
1 School of Computing Science and Engineering, Galgotias University, Greater Noida 201 310, UP, India
2 Babu Banarasi Das Institute of Technology & Management, Lucknow 226 028, UP, India
3 Government Polytechnic Bighapur Unnao, Board of Technical Education, Bighapur 209 865 UP, India
4 Departement of CEA, GLA University, Mathura 281 406, UP, India
5 ABES Engineering College, Ghaziabad 201 009, UP, India
6 Department of Computer Application, CSJM University, Kanpur 208 024, UP, India
 

Mobile AdHoc Networks (MANETs) are the network of self-configuring nodes. Such nodes communicate through single as well as multi-hop modes without the aid of any centralized administrator or pre-existing network infrastructure. Due to this reason, MANETs have gained a highly significance in modern wireless networking technologies. Such networks are extremely vulnerable to one of the security attack i.e. blackhole attack. It is a malicious node when an attacker is able to send a fake route reply to the originator of a route request packet. Such attackers discard the legitimate packets and replay packets in the whole network thereby adversely affecting network performance. Most of the security protocols for MANET are using bilinear pairing methods to provide security against security attacks and it takes high computing cost for the computation of pairing operations. Nowadays, researchers are using certificate-less signature schemes in distributed environments to provide efficient security. This signature scheme is very popular because it does not use any certificate authority for the management of security certificates. In this paper, we proposed an efficient technique to prevent blackhole attack in MANET using RSA-based certificateless signature scheme without using any bilinear pairing operations. Our scheme provides security against forgery and blackhole attacks and is evaluated under a discrete logarithm problem. Proposed scheme outperforms existing schemes in terms of these metrics viz., throughput, packet delivery ratio, routing overhead and end-to-end delay when we are varying mobility and fixed percentage of malicious nodes. Our proposed scheme not only detects or prevents the blackhole attack but it is also capable to provide important security services viz., integrity, authentication and non-repudiation.

Keywords

Ad Hoc Network, AODV, Malicious, Route Discovery, RSA.
User
Notifications
Font Size

  • Abel Vikas S, Survey of attacks on mobile adhoc wireless networks, Int J Comput Sci, 3 (2011) 826–829.
  • Saha S, Chaki R & Chaki N, A new reactive secure routing protocol for mobile ad-hoc networks, Proc Comput Info Sys & Indus Manag Appl, 84 (2008) 103–108.
  • Nadeem A & Howarth M P, A survey of MANET intrusion detection & prevention approaches for network layer attacks, IEEE Commun Surv, 15 (2013) 2027–2045.
  • Perkins C E, Ad hoc networking: An introduction, Ad Hoc Netw, 40 (2001) 20–22.
  • Kumar S & Dutta K, Security issues in mobile ad-hoc networks: A survey in Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, (IGI Global, USA) 2014, 176–221.
  • Wu B, Chen J, Wu J & Cardei M, A survey of attacks and countermeasures in mobile ad hoc networks in Wirel Netw, (Signals and Communication Technology, Springer, Boston, USA) 2007, 103–135.
  • Biswas K & Ali M, Security Threats in Mobile Ad Hoc Network, Master Thesis, Blekinge Institute of Technology, Sweden, 2007.
  • Rai A K, Tewari R R & Upadhyay S K, Different types of attacks on integrated manet-internet communication, Int J Comput Sci & Sec, 4 (2010) 265–274.
  • Djenouri D, Khelladi L & Badache N, A survey of security issues in mobile ad hoc networks, IEEE Commun Surv, 4 (2005) 2–28.
  • Goyal P, Batra S & Singh A, A literature review of security attack in mobile ad-hoc networks, Int J Comput Appl, 12 (2010) 11–15.
  • She C, Yi P, Wang J & Yang H, Intrusion detection for black hole and gray hole in MANETs, KSII Trans Internet Inf Syst, 7 (2013) 1721–1736.
  • Kannhavong B, Nakayama H, Nemoto Y, Kato N & Jamalipour A, A survey of routing attacks in mobile ad hoc networks, IEEE Wirel Commun, 5 (2007) 85–91.
  • Khanna A & Dere P U, A Review on intrusion detection and security of wormhole attacks in MANET, Int J Sci Res, 12 (2014) 873–876.
  • Kumar V & Kumar R, An adaptive approach for detection of blackhole attack in mobile ad hoc network, Procedia Comput Sci, 48 (2015) 472–479.
  • Kumar V & Kumar R, A cooperative black hole node detection and mitigation approach for MANETs, Lect Notes Comput Sci, 2015 171–183.
  • Tseng F, Chou Li & Chao H, A survey of black hole attacks in wireless mobile ad hoc networks, Hum-centric Comput Inf Sci, 1 (2011) 1–16.
  • Ullah I & Rehman S U, Analysis of Black Hole Attack on Manets using Different MANET Routing Protocols, Master Thesis, Blekinge Institute of Technology, Sweden, 2010.
  • Zhang X, Sekiya Y & Wakahara Y, Proposal of a method to detect black hole attack in MANET, Proc Int Sympo Auton Decent Sys, (Athens, Greece) 2009, 1–6.
  • Sowmya K S, Rakesh T & Hudedagaddi D P, Detection and prevention of blackhole attack in MANET using ACO, Int J Comput Netw Secur, 12 (2012) 21–24.
  • Tamilselvan L & Sankaranarayanan V, Prevention of co-operative black hole attack in MANET, J Netw, 3 (2008) 13–20.
  • Panda G, Mishra G S & Sahoo A K, Prevention of black hole attack in AODV protocols for Mobile Ad Hoc network by key authentication, Int J Comput Sci Inf Technol, 2 (2012) 651–657.
  • Zapata M G, Secure ad hoc on-demand distance vector routing, Mob Comput Commun Rev, 6 (2002) 106–107.
  • Raj P N & Swadas P B, Dpraodv: A dyanamic learning system against blackhole attack in AODV based MANET, Int Comput Sci I, 2 (2009) 54–59.
  • Hu Y C, Perrig A & Johnson D B, Ariadne: A secure on-demand routing protocol for ad hoc networks, Wirel Netw, 11 (2005) 21–38.
  • Kurosawa S, Nakayama H, Kato N, Jamalipour A & Nemoto Y, Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method, Int J Netw Secur, 5 (2007) 338–346.
  • Deng H, Li W & Agrawal D P, Routing security in wireless ad hoc networks, IEEE Commun Mag, 40 (2002) 70–75.
  • Ghosh T, Pissinou N & Makki K, Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks, Proc L Comput Netw, (Tampa, Florida, U.S.A.) 2004, 224–231.
  • Gajera M & Sowmya K S, Prevention of black hole attack in secure routing protocol, Int J Sci Res, 2 (2013) 221–224.
  • Jaiswal P & Kumar R, Prevention of black hole attack in MANET, Int J Comput Netw Commun, 2 (2012) 599–606.
  • Maheshwar K & Singh D, Black hole effect analysis and prevention through IDS in MANET environment, Eur J Sci Res, 1 (2012) 84–90.
  • Singh H & Singh M, Securing MANETs Routing Protocol under Black Hole Attack, Int J Innov RES Comput Commun Eng, 1 (2013) 808–813.
  • Kumar V & Kumar R, Security Solutions for Hyperconnectivity and the Internet of Things: Prevention of blackhole attack using certificateless signature (CLS) scheme in MANET (IGI Global) 2017, 130–150.
  • Zhang J & Mao J, An efficient RSA-based certificateless signature scheme, J Syst Softw, 85 (2012) 638–642.
  • Sharma G & Verma A K, Breaking the RSA-based certificateless signature scheme, Information, 16 (2013) 7831–7836.
  • Zeadally S, Hunt R, Chen Y S, Irwin A & Hassan A, Vehicular ad hoc networks (VANETS): status, results, and challenges, Telecommun Syst, 50 (2010) 217–241.
  • Samara G, Al-Salihy W A & Sures R, Security analysis of vehicular Ad Hoc networks, Proc Netw Appli Protoc Serv (Alor Setar, Kedah, Malaysia) 2010, 55–60.
  • Bekmezci I, Sahingoz O K & Temel Ş, Flying ad-hoc networks (FANETs): A survey, Ad Hoc Netw, 11 (2013) 1254–1270.
  • Gurung S & Chauhan S, A dynamic threshold based approach for mitigating black-hole attack in MANET, Wirel Netw, 24 (2018) 2957–2971.
  • Gupta P, Goel P, Varshney P & Tyagi N, Reliability factor based AODV protocol: Prevention of black hole attack in MANET, Proc S Innovat Commun & Comput Sci (Vaigai College Engineering, Madurai, India) 851 (2018) 271–279.
  • Gurung S & Chauhan S, A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability, Wirel Netw, 26 (2019) 1981–2011.
  • Rani P, Verma S & Nguyen G N, Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network, IEEE Access, 8 (2020) 121755–121764.
  • Karthigha M, Latha L & Sripriyan K, A comprehensive survey of routing attacks in wireless mobile ad hoc networks, Proc Invent Comput Tech (Coimbatore, India) 2020, 396–402.
  • Shukla M, Joshi B K & Singh U, Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET, Wirel Pers Commun, 121 (2021) 503–526.
  • Hussain K, Abdullah A H, Iqbal S, Awan K M & Ahsan F, Efficient cluster head selection algorithm for MANET, J Comput Netw Commun (2013).

Abstract Views: 107

PDF Views: 74




  • Prevention of Blackhole Attack in MANET Using Certificateless Signature Scheme

Abstract Views: 107  |  PDF Views: 74

Authors

Vimal Kumar
School of Computing Science and Engineering, Galgotias University, Greater Noida 201 310, UP, India
Mahima Shanker
Babu Banarasi Das Institute of Technology & Management, Lucknow 226 028, UP, India
Aanjey Mani Tripathi
School of Computing Science and Engineering, Galgotias University, Greater Noida 201 310, UP, India
Vikash Yadav
Government Polytechnic Bighapur Unnao, Board of Technical Education, Bighapur 209 865 UP, India
Anjani Kumar Rai
Departement of CEA, GLA University, Mathura 281 406, UP, India
Uzair Khan
ABES Engineering College, Ghaziabad 201 009, UP, India
Mayur Rahul
Department of Computer Application, CSJM University, Kanpur 208 024, UP, India

Abstract


Mobile AdHoc Networks (MANETs) are the network of self-configuring nodes. Such nodes communicate through single as well as multi-hop modes without the aid of any centralized administrator or pre-existing network infrastructure. Due to this reason, MANETs have gained a highly significance in modern wireless networking technologies. Such networks are extremely vulnerable to one of the security attack i.e. blackhole attack. It is a malicious node when an attacker is able to send a fake route reply to the originator of a route request packet. Such attackers discard the legitimate packets and replay packets in the whole network thereby adversely affecting network performance. Most of the security protocols for MANET are using bilinear pairing methods to provide security against security attacks and it takes high computing cost for the computation of pairing operations. Nowadays, researchers are using certificate-less signature schemes in distributed environments to provide efficient security. This signature scheme is very popular because it does not use any certificate authority for the management of security certificates. In this paper, we proposed an efficient technique to prevent blackhole attack in MANET using RSA-based certificateless signature scheme without using any bilinear pairing operations. Our scheme provides security against forgery and blackhole attacks and is evaluated under a discrete logarithm problem. Proposed scheme outperforms existing schemes in terms of these metrics viz., throughput, packet delivery ratio, routing overhead and end-to-end delay when we are varying mobility and fixed percentage of malicious nodes. Our proposed scheme not only detects or prevents the blackhole attack but it is also capable to provide important security services viz., integrity, authentication and non-repudiation.

Keywords


Ad Hoc Network, AODV, Malicious, Route Discovery, RSA.

References