Title: EDIS: an effective method for detection and isolation of sinkhole attacks in mobile ad hoc networks

Authors: Immanuel John Raja Jebadurai; Elijah Blessing Rajsingh; Getzi Jeba Leelipushpam Paulraj; Salaja Silas

Addresses: Department of Computer Sciences Technology, Karunya University, Coimbatore, India ' Department of Computer Sciences Technology, Karunya University, Coimbatore, India ' Department of Computer Sciences Technology, Karunya University, Coimbatore, India ' Department of Computer Sciences Technology, Karunya University, Coimbatore, India

Abstract: Reactive routing protocols in Mobile Ad Hoc Networks (MANETs) such as Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) are vulnerable to sinkhole attack. Sinkhole attack is a route disruption attack. The malicious sinkhole nodes attempt to lure almost all the traffic by propagating false routing information and disrupting the normal operation of the network. The sinkhole nodes should be detected and isolated from the MANET as early as possible. Hence, a consistent, reliable and effective method of detecting sinkhole nodes is required. We have developed a method to detect the sinkhole nodes by observing the behaviour of the mobile nodes in the neighbourhood and isolating them from the MANET. The proposed method was simulated and the experimental analysis was carried out. The results show that the proposed method is consistent, reliable and effective in detecting and isolating the sinkhole nodes in MANET.

Keywords: ad hoc on-demand distance vector; AODV; sinkhole attacks; route disruption attacks; malicious nodes; route requests; attack detection; network security; destination sequence number; routing; attack detection; node isolation; MANETs; mobile ad hoc networks; simulation.

DOI: 10.1504/IJWMC.2016.081161

International Journal of Wireless and Mobile Computing, 2016 Vol.11 No.3, pp.171 - 181

Received: 01 Mar 2016
Accepted: 23 Sep 2016

Published online: 24 Dec 2016 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article