Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Detection of Black Hole Attack Using Cross Layer Concept in MANET


Affiliations
1 Department of Electronics Engineering, Dhar Polytechnic College, India
     

   Subscribe/Renew Journal


Mobile Nodes can communicate mutually if it falls in the sensing range of the neighboring nodes. Connected nodes can transmit, receive and forward packets to connected nodes. In this paper, we focus on detection of Black Hole attack in the MANET using the cross-layer techniques that can optimize the energy consumption. The proposed cross-layer framework contains three layers and uses parameters like mobile nodes, area and the data in network layer. The MAC and data-link layer is used as a sub-layer, and a full-duplex interface is developed through the physical (PHY) layer. Our focus here is make a secure mechanism particularly to counter Black Hole Attacks through cross-layer proposal. The proposed framework is simulated using NS-3 version NS-3.17. Our examination observes the correlation between Cross Layer and Black Hole Cross-Layer scenario. This correlation is noticed between the simulation time and mobile nodes in view of the QoS parameter like execution time, redundancy gain, average end to end delay, average throughput, and network reliability. A redundancy gain performing 100% in Cross Layer with respect to Black Hole Cross Layer, thus increases the performance of the network. The simulation results show that Cross Layer approach and detection of Black Hole in Cross Layer Network is better than Black Hole Cross Layer.

Keywords

Cross Layer, Black Hole Attack, MANET, Security.
Subscription Login to verify subscription
User
Notifications
Font Size

  • M. Arifuzzaman, M. Matsumoto and T. Sato, “An Intelligent Hybrid MAC with Traffic-Differentiation-based QoS for Wireless Sensor Networks,” IEEE Sensors Journal, Vol. 13, No. 6, pp. 2391-2399, 2013.
  • S. Ping, A. Aijaz, O. Holland and A.H. Aghvami, “SACRP: A Spectrum Aggregation-based Cooperative Routing Protocol for Cognitive Radio Ad-Hoc Networks,” IEEE Transactions on Communications, Vol. 63, No. 6, pp. 2015-2030, 2015.
  • J. Wang, D. Li, G. Xing and H. Du, “Cross-Layer Sleep Scheduling Design in Service-Oriented Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 9, No. 11, pp. 1622-1633, 2010.
  • C.C. Weng, C.W. Chen, P.Y. Chen and K.C. Chang, “Design of An Energy-Efficient Cross-Layer Protocol for Mobile Ad Hoc Networks”, IET Communications, Vol. 7, No. 3, pp. 217-228, 2013.
  • L. Karim and N. Nasser, “Reliable Location-Aware Routing Protocol for Mobile Wireless Sensor Network,” IET Communications, Vol. 6, No. 14, pp. 2149-2158, 2012.
  • L. Zhang and Y. Zhang, “Energy-Efficient Cross-Layer Protocol of Channel-Aware Geographic-Informed Forwarding in Wireless Sensor Networks,” IEEE Transactions on Vehicular Technology, Vol. 58, No. 6, pp. 3041-3052, 2009.
  • X. Ji, Y. He, J. Wang, W. Dong, X. Wu and Y. Liu, “Walking Down the STAIRS: Efficient Collision Resolution for Wireless Sensor Networks”, Proceedings of IEEE International Conference on Computer Communications, pp. 961-969, 2014.
  • J. Ben-Othman and B. Yahya, “Energy Efficient and QoS based Routing Protocol for Wireless Sensor Networks”, Journal of Parallel and Distributed Computing, Vol. 70, No. 8, pp. 849-857, 2010.
  • Sandeep Sharma and Rajesh Mishra. “A Cross Layer Approach for Intrusion Detection in MANETs”, International Journal of Computer Applications, Vol. 93, No. 9, pp. 34-41, 2014.
  • X. Yang and L. Wang, “A Multichannel Transmitting and Assistant Nodes MAC Protocol for Mobile Ad Hoc Networks”, Proceedings of IEEE International Conference on Global Communication, pp.1-5, 2015.
  • V. Nguyen, O.T.T. Kim, T.N. Dang and C.S. Hong, “Improving Time Slot Acquisition through RSU's Coordination for TDMA-based MAC Protocol in VANETs”, Proceedings of International Conference on Information Networking, pp. 406-411, 2016.
  • S.H.R. Bukhari, M.H. Rehmani and S. Siraj, “A Survey of Channel Bonding for Wireless Networks and Guidelines of Channel Bonding for Futuristic Cognitive Radio Sensor Networks”, IEEE Communications Surveys and Tutorials, Vol. 18, No. 2, pp. 924-948, 2016.
  • A. Mohammed, H.S. Boukli and F. Kamel Mohamed, “A Cross Layer for Detection and Ignoring Black Hole Attack in MANET”, International Journal of Computer Network and Information Security, Vol. 7, No.10, pp. 42-49, 2015.
  • S. Sharma, R. Mishra and K. Singh, “Current Trends and Future Aspects in Cross-Layer Design for the Wireless Networks”, Proceedings of International Conference on Computer Science and Information Technology, pp.283-296, 2012.
  • Sandeep Sharma and Mukul Saini, “Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks”, Proceedings of IEEE 3rd International Conference on Computing for Sustainable Global Development, pp. 2993-2996, 2016.
  • Y.A. Huang, W. Fan, W. Lee and P.S. Yu, “Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies”, Proceedings of International Conference on Distributed Computing Systems, pp. 478-487, 2003.
  • S. Dhama, Sandeep Sharma, and Mukul Saini, “Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks”, Proceedings of IEEE 3rd International Conference on Computing for Sustainable Global Development, pp.2293-2296, 2016.

Abstract Views: 243

PDF Views: 1




  • Detection of Black Hole Attack Using Cross Layer Concept in MANET

Abstract Views: 243  |  PDF Views: 1

Authors

Shyam Sunder Karma
Department of Electronics Engineering, Dhar Polytechnic College, India

Abstract


Mobile Nodes can communicate mutually if it falls in the sensing range of the neighboring nodes. Connected nodes can transmit, receive and forward packets to connected nodes. In this paper, we focus on detection of Black Hole attack in the MANET using the cross-layer techniques that can optimize the energy consumption. The proposed cross-layer framework contains three layers and uses parameters like mobile nodes, area and the data in network layer. The MAC and data-link layer is used as a sub-layer, and a full-duplex interface is developed through the physical (PHY) layer. Our focus here is make a secure mechanism particularly to counter Black Hole Attacks through cross-layer proposal. The proposed framework is simulated using NS-3 version NS-3.17. Our examination observes the correlation between Cross Layer and Black Hole Cross-Layer scenario. This correlation is noticed between the simulation time and mobile nodes in view of the QoS parameter like execution time, redundancy gain, average end to end delay, average throughput, and network reliability. A redundancy gain performing 100% in Cross Layer with respect to Black Hole Cross Layer, thus increases the performance of the network. The simulation results show that Cross Layer approach and detection of Black Hole in Cross Layer Network is better than Black Hole Cross Layer.

Keywords


Cross Layer, Black Hole Attack, MANET, Security.

References