[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Advertisement

An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET

  • Neural Networks
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Today, more than ever, the necessity for remote availability, independent of a client’s location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a few of the wireless technologies that have facilitated the widespread availability of the internet on mobile phones, PDAs, laptops, and other portable electronic devices, and the ease with which users may exchange and sync data between them. MANET, or mobile ad hoc network, is one of the newer ways for nodes to connect because of its decentralized structure and self-configuring nature. Many different protocols control the MANET, and because of its dynamic topology, new problems have emerged in recent years. The black hole attacks put ad hoc networks at risk of data loss. These attacks trick the source into thinking it is sending data through the shortest path possible when, in reality, it is not. It’s a cosmic black hole metaphor where everything vanishes. This research aims to investigate the implications of the Blackhole attack on the On-Demand Multicast Routing Protocol in a MANET and propose solutions to counteract it. MATLAB is used to test the efficacy of our strategy. In addition, the suggested method is evaluated using standard performance measures like packet delivery ratio, throughput, packet loss, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Algorithm 1
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data Availability

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

Code Availability

The code of the current study are not publicly available due to the ongoing research as a part of future work of this version but are available from the corresponding author on reasonable request.

References

  • Arqub OA, Al-Smadi M (2020) Fuzzy conformable fractional differential equations: novel extended approach and new numerical solutions. Soft Comput 24(16):12501–12522

    Article  MATH  Google Scholar 

  • Arqub OA, Al-Smadi M, Momani S, Hayat T (2017) Application of reproducing kernel algorithm for solving second-order, two-point fuzzy boundary value problems. Soft Comput 21:7191–7206

    Article  MATH  Google Scholar 

  • Delkesh T, Jabraeil Jamali MA (2019) Eaodv: detection and removal of multiple black hole attacks through sending forged packets in manets. J Ambient Intell Humaniz Comput 10(5):1897–1914

    Article  Google Scholar 

  • Dhiman A, Kumar R (2019) A comparative study of position based routing protocols in vanets. In: 2019 international conference on intelligent sustainable systems (ICISS). IEEE, pp 306–311

  • Dorri A (2017) An edri-based approach for detecting and eliminating cooperative black hole nodes in manet. Wirel Netw 23(6):1767–1778

    Article  MATH  Google Scholar 

  • El-Semary AM, Diab H (2019) Bp-aodv: blackhole protected aodv routing protocol for manets based on chaotic map. IEEE Access 7:95197–95211

    Article  Google Scholar 

  • Gupta P, Goel P, Varshney P, Tyagi N (2019) Reliability factor based aodv protocol: prevention of black hole attack in manet. In: Tiwari S, Trivedi MC, Mishra KK, Misra AK Kumar KK (eds) Smart innovations in communication and computational sciences. Springer, Berlin, pp 271–279

  • Juneja K (2020) Random-session and k-neighbour based suspected node analysis approach for cooperative blackhole detection in manet. Wirel Pers Commun 110(1):45–68

    Article  MATH  Google Scholar 

  • Kowsigan M, Rajeshkumar J, Baranidharan B, Prasath N, Nalini S, Venkatachalam K (2021) A novel intrusion detection system to alleviate the black hole attacks to improve the security and performance of the manet. Wirel Pers Commun 127:1–21

  • Maayah B, Arqub OA, Alnabulsi S, Alsulami H (2022a) Numerical solutions and geometric attractors of a fractional model of the cancer-immune based on the Atangana–Baleanu–Caputo derivative and the reproducing kernel scheme. Chin J Phys 80:463–483

  • Maayah B, Moussaoui A, Bushnaq S, Abu Arqub O (2022b) The multistep Laplace optimized decomposition method for solving fractional-order coronavirus disease model (covid-19) via the Caputo fractional approach. Demonstr Math 55(1):963–977

  • Mohammad SN, Singh R, Dey A, Ahmad SJ (2019) Esmbcrt: enhance security to manets against black hole attack using mcr technique. In: Saini HS, Kishore Singh R, Patel VM (eds) Innovations in electronics and communication engineering. Springer, Berlin, pp 319–326

  • Mondal M, Ray KS (2019) Review on dna cryptography. arXiv:1904.05528

  • Noguchi T, Hayakawa M (2018) Black hole attack prevention method using multiple rreps in mobile ad hoc networks. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE). IEEE, pp 539–544

  • Panda N, Pattanayak BK (2018) Defense against co-operative black-hole attack and gray-hole attack in manet. Int J Eng Technol 7(3.4):84–89

    Article  MATH  Google Scholar 

  • Pavithran P, Mathew S, Namasudra S, Lorenz P (2021) A novel cryptosystem based on dna cryptography and randomly generated mealy machine. Comput Secur 104:102160

    Article  MATH  Google Scholar 

  • Rani P, Verma S, Nguyen GN et al (2020) Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access 8:121755–121764

    Article  Google Scholar 

  • Saudi NAM, Arshad MA, Buja AG, Fadzil AFA, Saidi RM (2019) Mobile ad-hoc network (manet) routing protocols: a performance assessment. In: Proceedings of the third international conference on computing, mathematics and statistics (iCMS2017). Springer, pp 53–59

  • Singh A, Hasan M (2018) An improved mechanism to prevent blackhole attack in manet. In: Saeed K, Chaki N, Pati B, Bakshi S, Mohapatra DP (eds) Progress in advanced computing and intelligent engineering. Springer, Berlin, pp 511–520

    Chapter  MATH  Google Scholar 

  • Sivanesh S, Sarma Dhulipala V (2022) Analytical termination of malicious nodes (atom): an intrusion detection system for detecting black hole attack in mobile ad hoc networks. Wirel Pers Commun 124(2):1511–1524

    Article  Google Scholar 

  • Srivastava A (2016a) Simulation based performance of AODV (reactive) and DSDV (proactive) routing protocol for manet. Int J Res Appl Sci Eng Technol (IJRASET) 4(XI):372–376

  • Srivastava A (2016b) Simulation based performance in terms of node energy for different proactive and reactive routing protocols of manet. Int J Res Appl Sci Eng Technol (IJRASET) 4(XII):210–216

  • Srivastava A, Mishra A, Upadhyay B, Yadav AK (2014a) Survey and overview of mobile ad-hoc network routing protocols. In: 2014 international conference on advances in engineering & technology research (ICAETR-2014), pp 1–6. https://doi.org/10.1109/ICAETR.2014.7012959

  • Srivastava A, Mishra A, Upadhyay S (2014b) A conceptual overview of energy consumption based routing protocol-ecbr. Int J Comput Appl 92(3):18–22

  • Tamilselvi P, Ganesh Babu C (2019) An efficient approach to circumvent black hole nodes in manets. Clust Comput 22(5):11401–11409

  • Tripathi A, Srivastava A (2016) Design of an energy efficient routing approach based on AODV routing protocol for mobile ad hoc networks. IJSTE - Int J Sci Technol Eng 3(5):78–80

  • Tseng F-H, Chiang H-P, Chao H-C (2018) Black hole along with other attacks in manets: a survey. J Inf Process Syst 14(1):56–78

    MATH  Google Scholar 

  • Upadhyay B, Srivastava A, Mishra A, Upadhyay S (2014) Distinctive approach for quality of service (qos) routing in manet. In: 2014 international conference on advances in engineering & technology research (ICAETR-2014), pp 1–4. https://doi.org/10.1109/ICAETR.2014.7012889

  • Yaseen QM, Aldwairi M (2018) An enhanced aodv protocol for avoiding black holes in manet. Procedia Comput Sci 134:371–376

    Article  MATH  Google Scholar 

  • Yasin A, Abu Zant M (2018) Detecting and isolating black-hole attacks in manet using timer based baited technique. Wirel Commun Mob Comput 2018

Download references

Funding

No funding was received for this research.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Rahul Chakravorty or Ashish Srivastava.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chakravorty, R., Prakash, J. & Srivastava, A. An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET. Soft Comput 28, 4667–4679 (2024). https://doi.org/10.1007/s00500-023-09386-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-09386-0

Keywords