Minimizing Packet Drop Due to Black Hole Attack in Wireless Ad-Hoc Network Using Intrusion Detection System

Submission Deadline-31st May 2024
May 2024 Issue : Publication Fee: 30$ USD Submit Now
Submission Open
Special Issue of Education: Publication Fee: 30$ USD Submit Now

International Journal of Research and Innovation in Applied Science (IJRIAS) | Volume VII, Issue IV, April 2022 | ISSN 2454–6194

Minimizing Packet Drop Due to Black Hole Attack in Wireless Ad-Hoc Network Using Intrusion Detection System

Constance Nneka Eze1, Chikani N.I2, Nnaji .B.Ugochukwu3
1Department of Computer Engineering Enugu State Polytechnic Iwollo Enugu.
2,3Department of Electrical and Electronic Engineering Enugu State Polytechnic Iwollo Enugu.

IJRISS Call for paper

Abstract: A black hole attack is a place in computer networking whereby incoming and outgoing traffic are silently discarded or dropped without notifying the source that the data sent was unable to reach its destination. A highly successfully black hole attack can prevent all data from reaching its destination and are undetectable. This attack is a significant threat to any wireless Ad-hoc Network because it causes isolation in the Network and does that untraced. The aim of this research work focus on minimizing black hole attack in wireless Ad-hoc Network. To do this, the effect of black hole attack on wireless Ad-hoc Network in terms of packet delivery ratio was first determined. This was done by comparing the packet delivery ratio when intrusion detection system was activated and when it was not activated. Next was to reduce the rate of packet loss as a result of black hole attack this was achieved by generating a packet transmission scheme, which will enable the nodes to gain authentication in the network before packets will be sent to them, thereby reducing the rate of packet loss. After this an intrusion detection system was implemented in all the node. Then a sequence number model and Wi-Fi mini point adapter method was used in modeling intrusion detection system and the corresponding throughput was achieved by calculating the amount of data transferred from source to destination in a given amount of time. All the above work was performed by simulation using PHP-MYSQL and MATLAB. The results obtained showed that the packet loss in ad-hoc wireless network under attack was reduced by 1% when compared by the work done by other researchers.

I. INTRODUCTION

Nowadays, there is an increasing interest on research focused on the provision of proposals for securing ad hoc routing protocols against black hole attack. A highly successful Black Hole attack can prevent all data from reaching its destination and are undetectable. Therefore, this attack is a significant threat to any wireless ad hoc network because it causes isolation in the network and does that untraced.
Researchers have proposed various techniques to minimize black hole attack in wireless ad-hoc networks. Recent efforts are directed towards the use of multiple RREP (Route Reply) and IDS (Intrusion Detection System) approaches. The IDS approach can cooperatively isolate the malicious node, but has failed to deal with collaborative black hole attack, while the RREP approach have a major drawback of adding network