Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Article Metrics in Dimensions
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
2024-07-22
Vol. 19, No. 7 has been published online!
Home
>
Published Issues
>
2022
>
Volume 17, No. 10, October 2022
>
BDAODV: A Security Routing Protocol to detect the Black hole Attacks in Mobile Ad Hoc Networks
Le Duc Huy
1
, Truong Thi Thu Ha
2
, and Nguyen Van Tam
3
1. Faculty of Information Technology; Ha Noi University of Business and Technology, Viet Nam
2. Faculty of Information Technology; Huu Nghi University of Management and Technology, Ha Noi, Viet Nam
3. Graduate University of Sciences and Technology; Vietnam Academy of Science and Technology, Ha Noi, Viet Nam
Abstract
—One of the challenges of Mobile Ad Hoc Networks (MANET) is black hole attack. This is a form of destructive attack, causing very heavy damage to network performance once successfully implemented. By replying to the route with HC=1 and the largest SN, the malicious node fools the source node into thinking that it has the best and freshest cost-effective route to the destination node. As a result, all the data packets get caught in the malicious node and go missing without being able to reach the destination node. Most of the previous research was based on the characterization of black hole attacks or simple check mechanisms to detect cyberattacks. This leads to limitations that need to be overcome such as: Error rate in malicious node detection algorithm, routing waste, data routing efficiency in normal network scenario. This paper proposes a black hole attack detection algorithm (BDA) based on statistical theory. BDA collects information in real time so it can detect and prevent black hole attacks as they begin to act. The proposed solution uses a balance threshold value, calculated based on statistical theory, as the threshold for detecting black hole attack. A node that replies to the route with an SN value greater than the threshold is identified as a malicious node and isolated immediately upon attack. The article also proposes a black hole attack detection routing protocol (BDAODV) by improving the AODV protocol using BDA solution. The performance of the BDAODV protocol is evaluated and compared with related solutions on a network model with random mobile nodes. The simulation results have shown that the proposed protocol has very good performance in the network scenario under black hole attack with different number of malicious nodes.
Index Terms
—AODV, Black hole attacks, BDAODV, MANET, Statistical theory.
Cite: Le Duc Huy, Truong Thi Thu Ha, and Nguyen Van Tam, "BDAODV: A Security Routing Protocol to detect the Black hole Attacks in Mobile Ad Hoc Networks," Journal of Communications vol. 17, no. 10, pp. 803-811, October 2022. Doi: 10.12720/jcm.17.10.803-811
Copyright © 2022 by the authors. This is an open access article distributed under the Creative Commons Attribution License (
CC BY-NC-ND 4.0
), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.
4-JCM-4476
PREVIOUS PAPER
Energy Efficient Routing Protocol for IoT Networks Using Ns2 Simulation
NEXT PAPER
Cooperative Spectrum Sensing in Cognitive Radio Networks via an Adaptive Gaussian Mixture Model Based on Machine Learning