Abstract
Identifying a trusted and secure route in an un-trusted environment is always a challenging problem. Lack of centralized infrastructure and dependence on other nodes for routing data, always pose security threats in ad hoc networks. So routing in ad hoc networks demands a secure end-to-end route that is free of malicious nodes for reliable packet forwarding. In this paper, we have designed a routing solution called Trust Based Dynamic Source Routing that enables the Dynamic Source Routing (DSR) Protocol to find a secure end-to-end route free of black hole nodes with cooperation from the neighbors. Also our solution can be able to protect the network in the presence of colluding attackers without the need of promiscuous monitoring the neighbor nodes. Extensive simulation has been carried out to evaluate the design of our protocol. The experiment results show that our protocol is able to achieve routing security with 42 % increase in packet delivery ratio and 37 % reduction in packet loss rate when compared to standard DSR under cooperative black hole attack.

Similar content being viewed by others
References
Sanzgiri, K.; et al.: A secure routing protocol for ad hoc networks. In: Proceeding of the 10th IEEE International Conference on Network Protocols (ICNP’02) (2002)
Hu, Y.-C.; Perrig, A.; Johnson, D.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. J. (2005)
Zapata, M.G.; Asokan, N.: Securing ad hoc routing protocols. In: WiSe’02 (2002)
Luo, J.; Fan, M.; Ye, D.: Black hole attack prevention based on authentication mechanism. In: Proceeding of the IEEE Singapore International Conference on Communication Systems (ICCS) (2008)
Eissa, T.; Razak, S.A.; Ngadi, M.A.: A novel lightweight authentication scheme for mobile ad hoc networks. Arab. J. Sci. Eng. 37, (2012)
Seno S.A.H., Budiarto R., Wan T.-C.: A secure mobile ad hoc network based on distributed certificate authority. Arab. J. Sci. Eng. 36, 245–257 (2011)
Buchegger, S.; Le Boudec, J.-Y.: Performance analysis of the CONFIDANT protocol (cooperation of nodes: fairness in dynamic ad-hoc networks). In: MOBIHOC ’02 (2002)
Marti, S.; Giuli, T.J.; Lai, K.: Mitigating routing misbehavior in mobile ad hoc networks. In: Mobile Computing and Networking (MOBICOM), pp. 255–265 (2000)
Bhalaji N., Kanakeri A.V., Chaitanya K.P., Shanmugam A.: Trust based strategy to resist collaborative blackhole attack in MANET. Int. J. Inf. Process. Manag. 70, 465–474 (2010)
Li, J.-S.; Lee, C.-T.: Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks. Comput. Commun., 1121–1132 (2006)
Raza, I.; Hussain, S.A.: Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Comput. Commun., 1796–1802 (2008)
Kurosawa, S.; Nakayama, H.; Kato, N.; Jamalipour, A.; Nemoto, Y.: Detecting black hole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int. J. Netw. Secur., 338–346 (2007)
Tamilselvan L., Sankaranarayanan V.: Prevention of co-operative blackhole attack in MANET. J. Netw. 3, 13–20 (2008)
Deng H., Agarwal P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40, 70–75 (2002)
Jiang N., Sheu S., Hua K.A., Ozyer O.: A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 4, 3–16 (2010)
Djenouri D., Badache N.: A gradual solution to detect selfish nodes in mobile ad hoc networks. Int. J. Wirel. Mob. Comput. 4, 264–274 (2010)
Johnson, D.B.; Maltz, D.A.; Hu, Y.-C.: The dynamic source routing protocol for mobile ad-hoc network (DSR). IETF Internet Draft (2004)
Zeng, X.; Bagrodia, R.; Gerla, M.: GloMoSim: a library for parallel simulation of large-scale wireless networks. In: Proceedings of the 12th workshop on parallel and distributed simulation (1998)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mohanapriya, M., Krishnamurthi, I. Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks. Arab J Sci Eng 39, 1825–1833 (2014). https://doi.org/10.1007/s13369-013-0764-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-013-0764-1