Abstract
This paper addresses a novel method to detect and defend against the blackhole attack and cooperative blackhole attack using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the underlying AODV routing protocol. Eventually, this HDC is one of the high potential candidates for advanced wireless ad hoc networks, which require less communication bandwidth and memory in comparison with other cryptographic systems. The simulation results of this proposed method provide better security and network performances as compared to existing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dasgupta, M. (2012). Network modelling of a blackhole prevention mechanism in mobile ad-hoc network. In Fourth International Conference on Computational Intelligence and Communication Networks.
Woungang, I. (2012). Detecting blackhole attacks on DSR-based mobile ad hoc networks. IEEE International Conference on Computer, Information and Telecommunication Systems (CITS).
Lu, S., Li, L., Lam, K.-Y., & Jia, L. (2009). SAODV: A MANET routing protocol that can withstand black hole attack. Proceedings of International. Conference on Computational Intelligence and Security, December 11–14, Beijing, China (pp. 421–425).
Perkins, C. E., & Royer, E. M. (2001). The ad hoc on-demand distance-vector protocol. In C. E. Perkins (Ed.), Ad Hoc Networking (Chap. 6, pp. 173–220). Reading, MA: Addison-Wesley.
Ning, K. (2009). A pseudo DNA cryptography method CoRR 2009, abs/0903.2693.
Capkun, S., Buttyan, L., & Hubaux, J. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1), 1–13.
Gehani, A., LaBean, T. H., & Reif, J. H. (1999). DNA-based cryptography. In Winfree & Gifford, (Eds.), Proceedings 5th DIMACS Workshop on DNA Based Computers (Vol. 54, pp. 233–249). MIT, Cambridge, MA, USA.
Chen, J. (2003). A DNA-based, biomolecular cryptography design. In IEEE International Symposium on Circuits and Systems (ISCAS) (pp. 822–825).
Suresh Babu, E., Nagaraju, C., & Krishna Prasad, M. H. M. (2015). Light-weighted DNA based cryptographic mechanism against chosen cipher text attacks. 2nd International Doctoral Symposium on Applied Computation and Security Systems, Kolkata, India. LNCS, Springer.
Andoni, A. (2009). Nearest neighbor search. In PhD Thesis. MIT, September 2009.
Hod, B. (2005). Cooperative and reliable packet-forwarding on top of AODV. Israel: School of Engineering and Computer Science The Hebrew University of Jerusalem.
Sanzgiri, K., LaFlamme, D., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, M. (2005). Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications, 23(3), 598–610.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Suresh Babu, E., Nagaraju, C., Krishna Prasad, M.H.M. (2016). Efficient DNA-Based Cryptographic Mechanism to Defend and Detect Blackhole Attack in MANETs. In: Satapathy, S., Joshi, A., Modi, N., Pathak, N. (eds) Proceedings of International Conference on ICT for Sustainable Development. Advances in Intelligent Systems and Computing, vol 408. Springer, Singapore. https://doi.org/10.1007/978-981-10-0129-1_72
Download citation
DOI: https://doi.org/10.1007/978-981-10-0129-1_72
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0127-7
Online ISBN: 978-981-10-0129-1
eBook Packages: EngineeringEngineering (R0)