Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile adhoc networks (MANETs) suffer from various types of security attacks. In this paper, a novel probabilistic approach is proposed to detect and to isolate the Black Hole attack from MANET. Routing algorithms that are used nowadays are not designed to handle these types of attacks. This paper proposes a technique which is known as NHBADI, which uses Honeypot methodology to detect and isolate Black Hole attacks. Unlike existing techniques, the proposed Honeypot technique enhances the security of the MANET by reducing the network overhead. To measure the effectiveness of the proposed system, NS-2 simulator is used. The proposed technique not only detects malicious Black Hole nodes but also isolates the vulnerable Black Hole nodes from the network. The proposed NHBADI scheme reduces network overhead, normalized routing load and packet drop ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Agrawal, P, Ghosh, R. K., & Das, S.K. (2008). Cooperative black and gray hole attacks in MANETs. In Proceedings of ACM second international conference on ubiquitous information management and communication, pp. 310–314.

  2. Nasipuri, A, Casaneda, R., & Das, S. R. (1999). On-demand multipath routing for MANETs. In Proceedings of IEEE INFOCOM, pp. 64–70.

  3. Ning, P., & Sun, K. (2003). How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols. In Proceedings of the fourth annual IEEE information assurance workshop, pp. 60–67.

  4. Dorri, A., Kamel, S. R., & Kheyrkhah, E. (2015). Security challenges in mobile adhoc networks: A survey. International Journal of Computer Science and Engineering Survey (IJCSES), 6(1), 15–29.

    Article  Google Scholar 

  5. Pranusha, A., & Murali, G. (2015). A hybrid key management scheme for secure MANET communications. International Journal of Research in Engineering and Technology, 4(38–40), 2015.

    Google Scholar 

  6. Alem, Y. F., Xuan, Z. C. (2010). Preventing Black Hole attack in mobile ad hoc networks using anomaly detection. In Proceedings of second international conference on future computer and communication (ICFCC), pp. 21–24.

  7. Basabaaa, A., Sheltamia, T., & Shakshukib, E. (2014). Implementation of A3ACKs intrusion detection system under various mobility speeds. Proceedings of Computer Science, 32, 1–10.

    Article  Google Scholar 

  8. Dhir, A., & Sengupta, J. (2009). Security-aware optimized link routing protocol for mobile ad-hoc networks. KSII Transactions on Internet and Information Systems, 3(1), 52–83.

    Article  Google Scholar 

  9. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Journal of Ad Hoc Networks, 1(3), 293–315.

    Article  Google Scholar 

  10. Tang, Y., & Chen, S. Defending against internet worms: A signature-based approach. In Proceedings of IEEE INFOCOM, Vol. 2, pp. 1384–1394.

  11. Djahel, S., Nait-abdesselam, F., & Zhang, Zonghua. (2008). Mitigating packet dropping problem in MANETs: Proposals and challenges. IEEE Communication Survey and Tutorials, 13(4), 658–672.

    Article  Google Scholar 

  12. Patel, M., & Sharma, S. (2013). Detection of malicious attack in MANET a behavioural approach. In Proceedings of IEEE third international conference on advance computing, pp. 388–393.

  13. Wu, C. Y., Wu, T. K., Cheng, R. H., & Chang, S. C. (2007). A distributed and cooperative Black Hole node detection and elimination mechanism for ad hoc network. Lecture Notes in Computer Science, 4819, 538–549.

    Article  Google Scholar 

  14. Mistry, N., Jinwala, D. C., & Zaveri, M. (2010). Improving AODV protocol against Black Hole attacks. In Proceedings of international multiconference of engineers and computer scientists, pp. 17–19.

  15. Su, M. Y. (2011). Prevention of selective Black Hole attacks on MANETs through intrusion detection systems. Journal of Computer Communication, 34(1), 107–117.

    Article  Google Scholar 

  16. Nadeem, A., & Howarth, M. (2013). Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Proceedings of Springer Telecommunication Systems, 52(4), 2047–2058.

    Article  Google Scholar 

  17. Rutvji, H. J., Patel, S. J., & Jinwala, D. C. (2012). A novel approach for GrayHole and BlackHole attacks in mobile ad hoc networks. In Proceedings of IEEE advanced computing & communication technologies, pp. 556–560.

  18. Hoepers, C., Vijaykumar, N. L., & Montes, A. (2008). HIDEF: A data exchange format for information collected in Honeypots and honey nets. INFOCOMP Journal of Computer Science, 7(1), 87–96.

    Google Scholar 

  19. Wang, H., & Chen, Q (2010). Design of cooperative deployment in distributed honey net system. In Proceedings of the international conference on computer supported cooperative work in design, pp. 711–716.

  20. Nakayama, H., Kurosawa, S., Jamalipour, S., Nemoto, Y., & Kato, N. (2009). A dynamic anomaly detection scheme for AODV based MANETs. IEEE Transactions on Vehicular Technology, 58(5), 2471–2481.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Usha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rajesh Babu, M., Usha, G. A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET. Wireless Pers Commun 90, 831–845 (2016). https://doi.org/10.1007/s11277-016-3229-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3229-5

Keywords