Title: Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach
Authors: Khurram Gulzar Rana; Cai Yongquan; Muhammad Azeem; Allah Ditta; Haiyang Yu; Sijjad Ali Khuhro
Addresses: College of Computer Science and Technology, Beijing University of Technology, Beijing 100124, China; Institute of Information Technology, Quaid-i-Azam University Islamabad, Islamabad 44000, Pakistan ' College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China ' College of Computer Science and Technology, Faculty of Information Science and Technology, Beijing University of Technology (BJUT), Beijing 100124, China ' Division of Science & Technology, University of Education, College Road, Township, Lahore, Pakistan ' College of Computer Science, Beijing University of Technology, Beijing 100124, China ' School of Computer Science and Technology, University of Science and Technology, Hefei, China
Abstract: Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing.
Keywords: ad hoc networks; black hole attack; AODV-BDR; validation packet; previous hop node; PHN; next hope node; NHN; neighbour list; gratuitous route reply.
International Journal of Wireless and Mobile Computing, 2018 Vol.14 No.1, pp.16 - 24
Available online: 13 Feb 2018 *Full-text access for editors Access for subscribers Free access Comment on this article