Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015 (2015), Article ID 715820, 11 pages
http://dx.doi.org/10.1155/2015/715820
Research Article

Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

1Department of CSE, Karpagam College of Engineering, Coimbatore 641032, India
2Department of CSE, Shanmuganathan Engineering College, Pudukkottai District 622507, India
3Department of IT, Nandha Engineering College, Erode 638052, India
4Department of CSE, Sri Ramakrishna Engineering College, Coimbatore 641022, India

Received 9 April 2015; Accepted 18 August 2015

Academic Editor: Venkatesh Jaganathan

Copyright © 2015 M. Rajesh Babu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Coskun, T. Pfeifer, A. Elmangoush, and A. Al-Hezmi, “Open M2M data—position paper,” in Proceedings of the 1st IEEE Workshop on Machine to Machine Communications Interfaces and Platforms (M2MCIP '13), in Conjunction with the 38th IEEE Conference on Local Computer Networks (IEEE LCN), Sydney, Australia, October 2013.
  2. S. Silberstein, D. Levi, V. Kogan, and R. Gazit, “Vision-based pedestrian detection for rear-view cameras,” in Proceedings of the 25th IEEE Intelligent Vehicles Symposium (IV '14), pp. 853–860, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Giusto, A. Iera, G. Morabito, and L. Atzori, The Internet of Things, Springer, 2010. View at Publisher · View at Google Scholar
  4. L. Atzori, A. Iera, and G. Morabito, “The internet of things: a survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2011. View at Google Scholar
  5. K. Tarnay, G. Adamis, and T. Dulai, Advanced Communication Protocol Technologies: Solutions, Methods, and Applications, 2011, http://www.igi-global.com/.
  6. A. Dunkels, T. Voigt, and J. Alonso, “Connecting wireless sensor networks with the internet,” ERCIM News 57, R&D and Technology Transfer, 2004. View at Google Scholar
  7. D. Culler, D. Estrin, and M. Srivastava, “Guest Editors’ introduction: overview of sensor networks,” Computer, vol. 37, no. 8, pp. 41–49, 2004. View at Publisher · View at Google Scholar · View at Scopus
  8. A. V. Panicker and G. Jisha, “Network layer attacks and protection in MANETA survey,” International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 3437–3443, 2014. View at Google Scholar
  9. P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, “Convergence of MANET and WSN in IoT urban scenarios,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3558–3567, 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Udhayan and R. Babu, “Lightweight vigilant procedure to implement security measures in highly roving military operations,” Journal of Computer Science, vol. 9, no. 10, pp. 1420–1426, 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. E. M. Royer and C.-K. Toh, “Review of current routing protocols for ad hoc mobile wireless networks,” IEEE Personal Communications, vol. 6, no. 2, pp. 46–55, 1999. View at Publisher · View at Google Scholar · View at Scopus
  12. H. Deng, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks,” IEEE Communications Magazine, vol. 40, no. 10, pp. 70–75, 2002. View at Publisher · View at Google Scholar · View at Scopus
  13. C. E. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing,” RFC 3561, The Internet Engineering Task Force (IETF), 2003. View at Google Scholar
  14. Y. Yu, L. Guo, X. Wang, and C. Liu, “Routing security scheme based on reputation evaluation in hierarchical ad hoc networks,” Computer Networks, vol. 54, no. 9, pp. 1460–1469, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  15. C.-H. Wei, M.-S. Hwang, and Y.-H. C. Augustin, “An authentication protocol for low-cost RFID tags,” International Journal of Mobile Communications, vol. 9, no. 2, pp. 208–223, 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. R. Kayalvizhi, M. Vijayalakshmi, and V. Vaidehi, “Energy analysis of RSA and ELGAMAL algorithms for wireless sensor networks,” in Recent Trends in Network Security and Applications, vol. 89 of Communications in Computer and Information Science, pp. 172–180, Springer, 2010. View at Google Scholar
  17. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” in Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), pp. 1976–1986, April 2003. View at Scopus
  18. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, “Prevention of cooperative black hole attack in wireless ad hoc networks,” in Proceedings of the International Conference on Wireless Networks, pp. 570–575, CSREA Press, Las Vegas, Nev, USA, June 2003.
  19. B. Wu, J. Chen, J. Wu, and M. Cardei, “A survey on attacks and countermeasures in mobile ad hoc networks,” in Wireless/Mobile Network Security, Springer, Berlin, Germany, 2006. View at Google Scholar
  20. A. Bhattacharyya, A. Banerjee, and D. Bose, “Different types of attacks in Mobile ADHOC Network: prevention and mitigation techniques,” http://www.doc88.com/p-410724870368.html.
  21. A. Gagandeep and P. Kumar, “Analysis of different security attacks in MANETs on protocol stack A-review,” International Journal of Engineering and Advanced Technology, vol. 1, no. 5, pp. 269–275, 2012. View at Google Scholar
  22. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Rushing attacks and defense in wireless Ad hoc network routing protocols,” in Proceedings of the ACM Workshop on Wireless Security (WiSe '03), pp. 30–40, September 2003. View at Scopus
  23. S. Yinbiao, “Internet of things: wireless sensor networks,” White Paper, International Electrotechnical Commission, http://www.iec.ch.
  24. C.-T. Li, C.-C. Yang, and M.-S. Hwang, “A secure routing protocol with node selfishness resistance in MANETs,” International Journal of Mobile Communications, vol. 10, no. 1, pp. 103–118, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003. View at Publisher · View at Google Scholar · View at Scopus
  26. M.-Y. Su, K.-L. Chiang, and W.-C. Liao, “Mitigation of black-hole nodes in mobile ad hoc networks,” in Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA '10), pp. 162–167, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. N.-W. Lo, “A secure routing protocol to prevent cooperative black hole attack in MANET,” in Intelligent Technologies and Engineering Systems, pp. 59–65, Springer, 2013. View at Google Scholar
  28. L. Tamilselvan and V. Sankaranarayanan, “Prevention of co-operative black hole attack in MANET,” Journal of Networks, vol. 3, no. 5, pp. 13–20, 2008. View at Google Scholar · View at Scopus
  29. N. H. Mistry, D. C. Jinwala, and M. A. Zaveri, “MOSAODV: solution to secure AODV against blackhole attack,” International Journal of Computer Science and Network Security, vol. 1, no. 3, pp. 42–45, 2009. View at Google Scholar
  30. P. N. Raj and P. B. Swadas, “DPRAODV: a dynamic learning system against blackhole attack in AODV based MANET,” International Journal of Computer Science Issues, vol. 2, pp. 54–59, 2009. View at Google Scholar
  31. P. Khatri, M. Rajput, A. Shastri, and K. Solanki, “Performance study of ad-hoc reactive routing protocols,” Journal of Computer Science, vol. 6, no. 10, pp. 1159–1163, 2010. View at Publisher · View at Google Scholar · View at Scopus