Int. J. of Wireless and Mobile Computing   »   2016 Vol.11, No.3

 

 

Title: EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks

 

Authors: Immanuel John Raja Jebadurai; Elijah Blessing Rajsingh; Getzi Jeba Leelipushpam Paulraj; Salaja Silas

 

Addresses:
Department of Computer Sciences Technology, Karunya University, Coimbatore, India
Department of Computer Sciences Technology, Karunya University, Coimbatore, India
Department of Computer Sciences Technology, Karunya University, Coimbatore, India
Department of Computer Sciences Technology, Karunya University, Coimbatore, India

 

Abstract: Reactive routing protocols in Mobile Ad Hoc Networks (MANETs) such as Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) are vulnerable to sinkhole attack. Sinkhole attack is a route disruption attack. The malicious sinkhole nodes attempt to lure almost all the traffic by propagating false routing information and disrupting the normal operation of the network. The sinkhole nodes should be detected and isolated from the MANET as early as possible. Hence, a consistent, reliable and effective method of detecting sinkhole nodes is required. We have developed a method to detect the sinkhole nodes by observing the behaviour of the mobile nodes in the neighbourhood and isolating them from the MANET. The proposed method was simulated and the experimental analysis was carried out. The results show that the proposed method is consistent, reliable and effective in detecting and isolating the sinkhole nodes in MANET.

 

Keywords: ad hoc on-demand distance vector; AODV; sinkhole attacks; route disruption attacks; malicious nodes; route requests; attack detection; network security; destination sequence number; routing; attack detection; node isolation; MANETs; mobile ad hoc networks; simulation.

 

DOI: 10.1504/IJWMC.2016.10002149

 

Int. J. of Wireless and Mobile Computing, 2016 Vol.11, No.3, pp.171 - 181

 

Submission date: 28 Feb 2016
Date of acceptance: 23 Sep 2016
Available online: 24 Dec 2016

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article