Abstract
Today, more than ever, the necessity for remote availability, independent of a client’s location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a few of the wireless technologies that have facilitated the widespread availability of the internet on mobile phones, PDAs, laptops, and other portable electronic devices, and the ease with which users may exchange and sync data between them. MANET, or mobile ad hoc network, is one of the newer ways for nodes to connect because of its decentralized structure and self-configuring nature. Many different protocols control the MANET, and because of its dynamic topology, new problems have emerged in recent years. The black hole attacks put ad hoc networks at risk of data loss. These attacks trick the source into thinking it is sending data through the shortest path possible when, in reality, it is not. It’s a cosmic black hole metaphor where everything vanishes. This research aims to investigate the implications of the Blackhole attack on the On-Demand Multicast Routing Protocol in a MANET and propose solutions to counteract it. MATLAB is used to test the efficacy of our strategy. In addition, the suggested method is evaluated using standard performance measures like packet delivery ratio, throughput, packet loss, etc.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data Availability
The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.
Code Availability
The code of the current study are not publicly available due to the ongoing research as a part of future work of this version but are available from the corresponding author on reasonable request.
References
Arqub OA, Al-Smadi M (2020) Fuzzy conformable fractional differential equations: novel extended approach and new numerical solutions. Soft Comput 24(16):12501–12522
Arqub OA, Al-Smadi M, Momani S, Hayat T (2017) Application of reproducing kernel algorithm for solving second-order, two-point fuzzy boundary value problems. Soft Comput 21:7191–7206
Delkesh T, Jabraeil Jamali MA (2019) Eaodv: detection and removal of multiple black hole attacks through sending forged packets in manets. J Ambient Intell Humaniz Comput 10(5):1897–1914
Dhiman A, Kumar R (2019) A comparative study of position based routing protocols in vanets. In: 2019 international conference on intelligent sustainable systems (ICISS). IEEE, pp 306–311
Dorri A (2017) An edri-based approach for detecting and eliminating cooperative black hole nodes in manet. Wirel Netw 23(6):1767–1778
El-Semary AM, Diab H (2019) Bp-aodv: blackhole protected aodv routing protocol for manets based on chaotic map. IEEE Access 7:95197–95211
Gupta P, Goel P, Varshney P, Tyagi N (2019) Reliability factor based aodv protocol: prevention of black hole attack in manet. In: Tiwari S, Trivedi MC, Mishra KK, Misra AK Kumar KK (eds) Smart innovations in communication and computational sciences. Springer, Berlin, pp 271–279
Juneja K (2020) Random-session and k-neighbour based suspected node analysis approach for cooperative blackhole detection in manet. Wirel Pers Commun 110(1):45–68
Kowsigan M, Rajeshkumar J, Baranidharan B, Prasath N, Nalini S, Venkatachalam K (2021) A novel intrusion detection system to alleviate the black hole attacks to improve the security and performance of the manet. Wirel Pers Commun 127:1–21
Maayah B, Arqub OA, Alnabulsi S, Alsulami H (2022a) Numerical solutions and geometric attractors of a fractional model of the cancer-immune based on the Atangana–Baleanu–Caputo derivative and the reproducing kernel scheme. Chin J Phys 80:463–483
Maayah B, Moussaoui A, Bushnaq S, Abu Arqub O (2022b) The multistep Laplace optimized decomposition method for solving fractional-order coronavirus disease model (covid-19) via the Caputo fractional approach. Demonstr Math 55(1):963–977
Mohammad SN, Singh R, Dey A, Ahmad SJ (2019) Esmbcrt: enhance security to manets against black hole attack using mcr technique. In: Saini HS, Kishore Singh R, Patel VM (eds) Innovations in electronics and communication engineering. Springer, Berlin, pp 319–326
Mondal M, Ray KS (2019) Review on dna cryptography. arXiv:1904.05528
Noguchi T, Hayakawa M (2018) Black hole attack prevention method using multiple rreps in mobile ad hoc networks. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE). IEEE, pp 539–544
Panda N, Pattanayak BK (2018) Defense against co-operative black-hole attack and gray-hole attack in manet. Int J Eng Technol 7(3.4):84–89
Pavithran P, Mathew S, Namasudra S, Lorenz P (2021) A novel cryptosystem based on dna cryptography and randomly generated mealy machine. Comput Secur 104:102160
Rani P, Verma S, Nguyen GN et al (2020) Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access 8:121755–121764
Saudi NAM, Arshad MA, Buja AG, Fadzil AFA, Saidi RM (2019) Mobile ad-hoc network (manet) routing protocols: a performance assessment. In: Proceedings of the third international conference on computing, mathematics and statistics (iCMS2017). Springer, pp 53–59
Singh A, Hasan M (2018) An improved mechanism to prevent blackhole attack in manet. In: Saeed K, Chaki N, Pati B, Bakshi S, Mohapatra DP (eds) Progress in advanced computing and intelligent engineering. Springer, Berlin, pp 511–520
Sivanesh S, Sarma Dhulipala V (2022) Analytical termination of malicious nodes (atom): an intrusion detection system for detecting black hole attack in mobile ad hoc networks. Wirel Pers Commun 124(2):1511–1524
Srivastava A (2016a) Simulation based performance of AODV (reactive) and DSDV (proactive) routing protocol for manet. Int J Res Appl Sci Eng Technol (IJRASET) 4(XI):372–376
Srivastava A (2016b) Simulation based performance in terms of node energy for different proactive and reactive routing protocols of manet. Int J Res Appl Sci Eng Technol (IJRASET) 4(XII):210–216
Srivastava A, Mishra A, Upadhyay B, Yadav AK (2014a) Survey and overview of mobile ad-hoc network routing protocols. In: 2014 international conference on advances in engineering & technology research (ICAETR-2014), pp 1–6. https://doi.org/10.1109/ICAETR.2014.7012959
Srivastava A, Mishra A, Upadhyay S (2014b) A conceptual overview of energy consumption based routing protocol-ecbr. Int J Comput Appl 92(3):18–22
Tamilselvi P, Ganesh Babu C (2019) An efficient approach to circumvent black hole nodes in manets. Clust Comput 22(5):11401–11409
Tripathi A, Srivastava A (2016) Design of an energy efficient routing approach based on AODV routing protocol for mobile ad hoc networks. IJSTE - Int J Sci Technol Eng 3(5):78–80
Tseng F-H, Chiang H-P, Chao H-C (2018) Black hole along with other attacks in manets: a survey. J Inf Process Syst 14(1):56–78
Upadhyay B, Srivastava A, Mishra A, Upadhyay S (2014) Distinctive approach for quality of service (qos) routing in manet. In: 2014 international conference on advances in engineering & technology research (ICAETR-2014), pp 1–4. https://doi.org/10.1109/ICAETR.2014.7012889
Yaseen QM, Aldwairi M (2018) An enhanced aodv protocol for avoiding black holes in manet. Procedia Comput Sci 134:371–376
Yasin A, Abu Zant M (2018) Detecting and isolating black-hole attacks in manet using timer based baited technique. Wirel Commun Mob Comput 2018
Funding
No funding was received for this research.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare that they have no known competing conflicts of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Chakravorty, R., Prakash, J. & Srivastava, A. An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET. Soft Comput 28, 4667–4679 (2024). https://doi.org/10.1007/s00500-023-09386-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-09386-0