Visible to the public Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing

TitleAnalysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing
Publication TypeConference Paper
Year of Publication2020
AuthorsNaveena, S., Senthilkumar, C., Manikandan, T.
Conference Name2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)
KeywordsAd-doc On-Demand Distance Vector (AODV) protocol, Ad-hoc On-demand Distance Vector, and trust-based scheme, Attacker node, Black hole attack, Black hole attacks, black-hole attack, data packet, data retrieval, data transaction, Energy states, MANET, mobile ad hoc network, mobile ad hoc networks, mobile nodes, node data transfer mechanism, packet delivery ratio, pubcrawl, reactive protocol, Resiliency, Routing, routing environment, Routing Protocol, Routing protocols, Scalability, telecommunication security, Trust Routing, trust-based routing, trust-based routing scheme
AbstractA self-governing system consisting of mobile nodes that exchange information within a cellular area and is known as a mobile ad hoc network (MANET). Due to its dynamic nature, it is vulnerable to attacks and there is no fixed infrastructure. To transfer a data packet Ad-hoc On-Demand Distance Vector (AODV) is used and it's another form of a reactive protocol. The black-hole attack is a major attack that drastically decreases the packet delivery ratio during a data transaction in a routing environment. In this attack, the attacker's node acts as the shortest path to the target node itself. If the attacker node receives the data packet from the source node, all obtained data packets are excluded from a routing network. A trust-based routing scheme is suggested to ensure secure routing. This routing scheme is divided into two stages, i.e., the Data retrieval (DR), to identify and preserve each node data transfer mechanism in a routing environment and route development stage, to predict a safe path to transmit a data packet to the target node.
Citation Keynaveena_analysis_2020